Follow
Dr. K. Anitha Kumari
Title
Cited by
Cited by
Year
Estimating Software Development Efforts Using a Random Forest-Based Stacked Ensemble Approach
PV AG, V K, Anitha Kumari, Varadarajan
Electronics 10 (10), 1195, 2021
502021
A novel authentication service for hadoop in cloud environment
GS Sadasivam, KA Kumari, S Rubika
2012 IEEE International Conference on Cloud Computing in Emerging Markets …, 2012
302012
Comparative analysis of Machine learning and Deep learning algorithms for Software Effort Estimation
AGP Varshini, KA Kumari, D Janani, S Soundariya
Journal of Physics: Conference Series 1767 (1), 012019, 2021
292021
Preserving Health Care Data Security and Privacy Using Carmichael's Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing …
KA Kumari, A Sharma, C Chakraborty, M Ananyaa
Big Data 10 (1), 1-17, 2022
262022
Securing Internet of Medical Things (IoMT) Using Private Blockchain Network
K Anitha Kumari, R Padmashani, R Varsha, V Upadhayay
Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm, 305-326, 2020
262020
Predictive analytics approaches for software effort estimation: A review
AG Priya Varshini, K Anitha Kumari
Indian Journal of Science and Technology 13 (21), 2094-2103, 2020
212020
An Efficient 3D Elliptic Curve Diffie–Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security
K Anitha Kumari, GS Sadasivam, L Rohini
IETE Journal of Research 62 (6), 762-773, 2016
202016
Automated image captioning for flickr8k dataset
K Anitha Kumari, C Mouneeshwari, RB Udhaya, R Jasmitha
Proceedings of International Conference on Artificial Intelligence, Smart …, 2020
142020
Automated Image Captioning for Flickr8K Dataset
K Anitha Kumari, C Mouneeshwari, RB Udhaya, R Jasmitha
Proceedings of International Conference on Artificial Intelligence, Smart …, 2019
142019
An Approach for End-to-End (E2E) Security of 5G Applications
K Anitha Kumari, G Sudha Sadasivam, S Gowri S, SA Akash A, R EG
2018 IEEE 4th International Conference on Big Data Security on Cloud …, 2018
122018
A Secure Android Application with Integration of Wearables for Healthcare Monitoring System Using 3D ECCDH PAKE Protocol
KA Kumari, GS Sadasivam, SA Akash
Journal of Medical Imaging and Health Informatics 6 (6), 1548-1551, 2016
82016
Edge Computing: Fundamentals, Advances and Applications
KA Kumari, GS Sadasivam, D Dharani, M Niranjanamurthy
CRC Press, 2022
72022
Analysis on DGHV and NTRU Fully Homomorphic Encryption Schemes
B Santhiya, K Anitha Kumari
Proceedings of International Conference on Artificial Intelligence, Smart …, 2019
72019
A survey on anomaly detection using unsupervised learning techniques
BR Priyanga, D Kumari, D Dharani
Int J Creat Res Thoughts 6 (2), 2320-2882, 2018
72018
Enhanced human activity recognition based on activity tracker data using secure homomorphic encryption techniques
KA Kumari, M Indusha, D Dharani
2021 2nd International Conference for Emerging Technology (INCET), 1-7, 2021
52021
Two-Server 3D ElGamal Diffie-Hellman Password Authenticated and Key Exchange Protocol Using Geometrical Properties
K Anitha Kumari, G Sudha sadasivam
Mobile Networks and Applications 24 (3), 1104-1119, 2019
52019
A SYMMETRIC TWO-SERVER PASSWORD BASED AUTHENTICATION AND KEY EXCHANGE PROTOCOL DEPLOYED IN PAAS
A Kumari K, S Sadasivam G, R L
IJCA Proceedings on International Conference on Innovations in Computing …, 2015
42015
IoE-Enabled Healthcare 4.0 Systems
P Kamatchi, K Anitha Kumari, SA Akash
Cases on Edge Computing and Analytics, 203-234, 2021
3*2021
Dynamic Ontology Construction for E-Trading
K AnithaKumari, G SudhaSadasivam, T Aruna, SC Sajitha
Advances in Computing and Information Technology 178, 439-449, 2013
32013
Hyperelliptic curve Diffie–Hellman-based two-server password-only authenticated key exchange protocol for edge computing systems
K Anitha Kumari, TP Kamatchi, R Senthil Prabha, BK Samanthula
IETE Journal of Research 69 (7), 4311-4322, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20