default search action
E. A. Mary Anita
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]R. Pitchandi@sankaralingam, C. Arunachalaperumal, E. A. Mary Anita:
Improved reptile search algorithm with sequential assignment routing based false packet forwarding scheme for source location privacy protection on wireless sensor networks. J. Intell. Fuzzy Syst. 46(1): 1801-1812 (2024) - 2023
- [j18]S. Lakshmi, E. A. Mary Anita, J. Jenefa:
A Hybrid Approach Against Black Hole Attackers Using Dynamic Threshold Value and Node Credibility. IEEE Access 11: 91595-91603 (2023) - [j17]D. Vinodha, E. A. Mary Anita:
Integrity assured multi-functional multi-application secure data aggregation in wireless sensor networks (IAMFMA-SDA). J. Intell. Fuzzy Syst. 45(1): 1453-1472 (2023) - [j16]S. Prabhu, E. A. Mary Anita, D. Mohanageetha:
Blocking intrusion logic using optimized multi-head convolution in wireless sensor network. J. Intell. Fuzzy Syst. 45(4): 6897-6909 (2023) - [j15]S. Sajini, E. A. Mary Anita, J. Janet:
Improved Security of the Data Communication in VANET Environment Using ASCII-ECC Algorithm. Wirel. Pers. Commun. 128(2): 759-776 (2023) - 2022
- [j14]Thamba Meshach W, Hemajothi S, E. A. Mary Anita:
Smart Affect Recognition System for Real-Time Biometric Surveillance Using Hybrid Features and Multilayered Binary Structured Support Vector Machine. Comput. J. 65(4): 897-917 (2022) - [j13]J. Jenefa, E. A. Mary Anita:
Secure Authentication Schemes for Vehicular Adhoc Networks: A Survey. Wirel. Pers. Commun. 123(1): 31-68 (2022) - 2021
- [j12]M. Renukadevi, E. A. Mary Anita, D. Mohana Geetha:
An efficient privacy-preserving model based on OMFTSA for query optimization in crowdsourcing. Concurr. Comput. Pract. Exp. 33(24) (2021) - [j11]E. A. Mary Anita, S. Lakshmi, J. Jenefa:
A self-cooperative trust scheme against black hole attacks in vehicular ad hoc networks. Int. J. Wirel. Mob. Comput. 21(1): 59-65 (2021) - [j10]R. Barona, E. A. Mary Anita:
Optimal Cryptography Scheme and Efficient Neutrosophic C-Means Clustering for Anomaly Detection in Cloud Environment. J. Circuits Syst. Comput. 30(5): 2150084:1-2150084:26 (2021) - [j9]D. Vinodha, E. A. Mary Anita:
Discrete Integrity Assuring Slice-Based Secured Data Aggregation Scheme for Wireless Sensor Network (DIA-SSDAS). Wirel. Commun. Mob. Comput. 2021: 8824220:1-8824220:17 (2021) - [j8]D. Vinodha, E. A. Mary Anita, D. Mohana Geetha:
A novel multi functional multi parameter concealed cluster based data aggregation scheme for wireless sensor networks (NMFMP-CDA). Wirel. Networks 27(2): 1111-1128 (2021) - [j7]J. Jenefa, E. A. Mary Anita:
Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks. Wirel. Networks 27(5): 3093-3108 (2021)
2010 – 2019
- 2019
- [j6]J. Jenefa, E. A. Mary Anita:
An Enhanced Secure Authentication Scheme for Vehicular Ad Hoc Networks Without Pairings. Wirel. Pers. Commun. 106(2): 535-554 (2019) - 2018
- [j5]J. Jenefa, E. A. Mary Anita:
Secure Vehicular Communication Using ID Based Signature Scheme. Wirel. Pers. Commun. 98(1): 1383-1411 (2018) - 2015
- [j4]E. A. Mary Anita, R. Geetha, E. Kannan:
A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks. Wirel. Pers. Commun. 82(3): 1419-1433 (2015) - 2014
- [j3]R. Pavithra, D. Mohanageetha, E. A. Mary Anita, M. Subramaniam:
A New Compact Microstrip Integrated E-Array Patch Antenna with High Gain and High Aperture Efficiency. Wirel. Pers. Commun. 78(2): 1011-1020 (2014) - 2011
- [c1]E. A. Mary Anita:
Sybil Secure Architecture for Multicast Routing Protocols for MANETs. ACC (1) 2011: 111-118
2000 – 2009
- 2009
- [j2]E. A. Mary Anita, V. Vasudevan:
Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure. Inf. Secur. J. A Glob. Perspect. 18(5): 248-256 (2009) - [j1]E. A. Mary Anita, V. Vasudevan:
Black Hole Attack on Multicast Routing Protocols. J. Convergence Inf. Technol. 4(2): 64-68 (2009) - [i1]E. A. Mary Anita, V. Vasudevan:
Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack. CoRR abs/0908.0222 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint