Energy efficient cluster based key management technique for wireless sensor networks T Lalitha, R Umarani International Journal of Advances in Engineering & Technology 3 (1), 186, 2012 | 23 | 2012 |
Security in wireless sensor networks: key management module in EECBKM T Lalitha, AJ Devi 2014 World Congress on Computing and Communication Technologies, 306-308, 2014 | 10 | 2014 |
Soft Computing: Fuzzy Logic Approach in Wireless Sensors Networks MV Kumar, T Lalitha Circuits and Systems 7 (8), 1242-1249, 2016 | 8 | 2016 |
Efficient key management and authentication scheme for wireless sensor networks T Lalitha, RS Kumar, R Hamsaveni American Journal of Applied Sciences 11 (6), 969, 2014 | 5 | 2014 |
Attribute-based encryption for securing healthcare data in cloud environment C Krishnan, T Lalitha PalArch's Journal of Archaeology of Egypt/Egyptology 17 (9), 10134-10143, 2020 | 2 | 2020 |
Mobility based key management security scheme for wireless sensor networks T Lalitha, S Jayaprabha Wireless Personal Communications 87, 349-367, 2016 | 2 | 2016 |
Cluster based efficient key management and authentication technique for wireless sensor networks [J] T Lalitha, R Umaran International journal of computer applications 39 (16), 40-43, 2012 | 2 | 2012 |
Methods for spectrum assignment, pricing and access in dual technologies AJ Devi, T Lalitha, GMK Nawaz International Journal of Computer Applications in Engineering Sciences …, 2011 | 2 | 2011 |
Deep Learning-based Automatic 3D Printer Anomaly Detection during the Printing Process T Lalitha, NK Anushkannan, S Shreepad, S Sasireka, H Anandaram, ... 2022 3rd International Conference on Smart Electronics and Communication …, 2022 | 1 | 2022 |
Energy efficient cluster based key management & authentication technique for wireless sensor networks T Lalitha European Journal of scientific research 76 (3), 403-410, 2012 | 1 | 2012 |
Analyzing and Comparing the Cryptographic Hash Algorithms T Lalitha, R Umarani Networking: Proceedings of the International Conference on Computer …, 2010 | 1 | 2010 |
Brain tumour edge detection by segmentation technique T Lalitha, T Sreelatha, S Chaudhary, RB Mapari, J Saikumar, H Patil 2023 3rd International Conference on Innovative Practices in Technology and …, 2023 | | 2023 |
Analysis of COVID-19 vaccination progress using machine learning approach T Lalitha, R Parimala, S Muralidharan, R Karthikeyan AIP Conference Proceedings 2405 (1), 2022 | | 2022 |
Implementing Machine Learning Classifiers In Breast Cancer Diagnosis T Lalitha Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (10 …, 2021 | | 2021 |
Mobility of sink-based data collection protocol for energy balancing in WSN T Lalitha, R SaravanaKumar International Journal of Cloud Computing 10 (1-2), 4-16, 2021 | | 2021 |
Energy efficiency sink based data collection protocol in WSN T Lalitha, K Nandhini, S Fairose IOP Conference Series: Materials Science and Engineering 872 (1), 012019, 2020 | | 2020 |
SECURE ROUTING PROTOCOL FOR DATA TRANSMITTING IN CLUSTER BASED WIRELESS SENSOR NETWORK T Lalitha, K Kamaraj International Journal of Research in Management & Social Science, 65, 2018 | | 2018 |
Advanced Computing (ICCTAC-2015)© 2015 by IJCA Journal ICCTAC 2015-Number 1 Year of Publication: 2015 A Jayanthiladevi, T Lalitha International Journal of Computer Applications 18 (8), 2015 | | 2015 |
Attacks and Intrusion Detection Systems Network Policies in Wireless Sensor Networks T Lalitha, S Jayapraba History 12 (30), 95-103, 2015 | | 2015 |
Challenges and Surveys in Key Management and Authentication Scheme for Wireless Sensor Networks T Lalitha, AJ Devi, GMK Nawaz Abstract of Emerging Trends in Scientific Research 1, 1-97, 2014 | | 2014 |