Follow
P.Pandiaraja
Title
Cited by
Cited by
Year
Privacy preserving E-voting cloud system based on ID based encryption
A Shankar, P Pandiaraja, K Sumathi, T Stephan, P Sharma
Peer-to-Peer Networking and Applications 14, 2399-2409, 2021
752021
Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks
K Sumathi, P Pandiaraja
Peer-to-Peer Networking and Applications 13, 2001-2010, 2020
592020
Hybrid Context Aware Recommendation System for E-Health Care by merkle hash tree from cloud using evolutionary algorithm
N Deepa, P Pandiaraja
Soft Computing 24 (10), 7149-7161, 2020
572020
An efficient secure communication for healthcare system using wearable devices
P Vijayakumar, P Pandiaraja, M Karuppiah, LJ Deborah
Computers & Electrical Engineering 63, 232-245, 2017
552017
E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption
N Deepa, P Pandiaraja
Journal of Ambient Intelligence and Humanized Computing, 1-11, 2020
51*2020
A Novel Performance enhancing Task Scheduling Algorithm for Cloud based E-Health Environment
P Pandiaraja
International Journal of E-Health and Medical Communications 10 (2), 102-117, 2019
49*2019
A Novel Data Privacy-Preserving Protocol for Multi-data Users by using genetic algorithm
P Pandiaraja, N Deepa
Soft Computing 23 (18), 8539-8553, 2019
482019
Ensuring CIA triad for user data using collaborative filtering mechanism
S Deepika, P Pandiaraja
2013 international conference on information communication and embedded …, 2013
372013
An Efficient Sentiment Analysis Approach for Product Review using Turney Algorithm
PP P.Rajesh Kanna
Procedia Computer Science 165 (2019), 356-362, 2020
34*2020
OPTIMAL ROUTING PATH FOR HETEROGENOUS VEHICULAR ADHOC NETWORK
P Pandiaraja
International Journal of Advanced Science and Technology 29 (7s), 1762-771, 2020
332020
EFFICIENT CLOUD STORAGE USING DATA PARTITION AND TIME BASED ACCESS CONTROL WITH SECURE AES ENCRYPTION TECHNIQUE
P Pandiaraja
International Journal of Advanced Science and Technology 29 (7s), 1698-706, 2020
322020
An analysis of a secure communication for healthcare system using wearable devices based on elliptic curve cryptography
P Perumal, S Subha
World Review of Science, Technology and Sustainable Development 18 (1), 51-58, 2022
302022
Improve Efficient Keywords Searching Data Retrieval Process in Cloud Server
S Saravanan, T Abirami, P Pandiaraja
2018 International Conference on Intelligent Computing and Communication for …, 2018
252018
Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud.
P Pandiaraja, P Vijayakumar, V Vijayakumar, R Seshadhri
Journal of Information Science & Engineering 33 (3), 695-712, 2017
222017
Wireless multimedia sensor network QoS bottleneck alert mechanism based on fuzzy logic
A Shankar, K Sumathi, P Pandiaraja, T Stephan, X Cheng
Journal of Circuits, Systems and Computers 31 (11), 2250198, 2022
202022
Efficient Multi-keyword Search over Encrypted Data in Untrusted Cloud Environment
P Pandiaraja
Second International Conference on Recent Trends and Challenges in …, 2017
202017
Applying secure authentication scheme to protect DNS from rebinding attack using proxy
P Pandiaraja, S Parasuraman
2015 international conference on circuits, power and computing technologies …, 2015
192015
A graph-based model for discovering host-based hook attacks
P Pandiaraja, K Muthumanickam, R Palani Kumar
Smart Technologies in Data Science and Communication: Proceedings of SMART …, 2023
182023
An analysis of document summarization for educational data classification using NLP with machine learning techniques
P Pandiaraja, KB Boopesh, T Deepthi, M Laksmi Priya, R Noodhana
International Conference on Computing in Engineering & Technology, 127-143, 2022
182022
A survey on machine learning and text processing for pesticides and fertilizer prediction
P Pandiarajaa
Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (2 …, 2021
182021
The system can't perform the operation now. Try again later.
Articles 1–20