A novel trust model for secure group communication in distributed computing N Ramu, V Pandi, JD Lazarus, S Radhakrishnan Journal of Organizational and End User Computing (JOEUC) 32 (3), 1-14, 2020 | 54 | 2020 |
An efficient group key agreement protocol for secure P2P communication P Vijayakumar, R Naresh, L Jegatha Deborah, SK Hafizul Islam Security and Communication Networks 9 (17), 3952-3965, 2016 | 44 | 2016 |
Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm R Naresh, M Sayeekumar, GM Karthick, P Supraja Soft Computing 23, 2561-2574, 2019 | 32 | 2019 |
Efficient mobile security for E health care application in cloud for secure payment using key distribution A Saranya, R Naresh Neural Processing Letters 55 (1), 141-152, 2023 | 27 | 2023 |
Cloud based efficient authentication for mobile payments using key distribution method A Saranya, R Naresh Journal of Ambient Intelligence and Humanized Computing, 1-8, 2021 | 26 | 2021 |
An effective key distribution for secure internet pay‐TV using access key hierarchies P Vijayakumar, R Naresh, SKH Islam, LJ Deborah Security and Communication Networks 9 (18), 5085-5097, 2016 | 26 | 2016 |
Efficient study of Smart Garbage Collection for Ecofriendly Environment R Naresh, M Meenakshi, G Niranjana Journal of Green Engineering 10 (1), 1-10, 2020 | 22 | 2020 |
MALICIOUS URL DETECTION SYSTEM USING COMBINED SVM AND LOGISTIC REGRESSION MODEL R Naresh, AyonGupta, Sanghamitra International Journal of Advanced Research in Engineering and Technology …, 2020 | 21 | 2020 |
An efficient key validation mechanism with VANET in real-time cloud monitoring metrics to enhance cloud storage and security KL Narayanan, R Naresh Sustainable Energy Technologies and Assessments 56, 102970, 2023 | 17 | 2023 |
The concept of Privacy and Standardization of Microservice Architectures in cloud computing RD Mounika, R Naresh European Journal of Molecular & Clinical Medicine 7 (2), 5349-5370, 2020 | 17 | 2020 |
Smart Home: Security and Acuteness in Automation of IOT Sensors M Meenakshi, R Naresh, S Pradeep | 13 | 2019 |
Real time door security system with three point authentication CNSV Kumar, V Babu, R Naresh, V Bharathi 2021 4th International Conference on Recent Trends in Computer Science and …, 2022 | 11 | 2022 |
Effective energy estimation technique to classify the nitrogen and temperature for crop yield based green house application S Sakthipriya, R Naresh Sustainable Computing: Informatics and Systems 35, 100687, 2022 | 9 | 2022 |
Improved Security for Cloud Storage Using Elgamal Algorithms Authentication Key Validation KL Narayanan, R Naresh 2023 International Conference for Advancement in Technology (ICONAT), 1-5, 2023 | 7 | 2023 |
Soil health analysis and fertilizer prediction for crop image identification by Inception-V3 and random forest M Meenakshi, R Naresh Remote Sensing Applications: Society and Environment 28, 100846, 2022 | 7 | 2022 |
A Effective Encryption and Different Integrity Schemes to Improve the Performance of Cloud Services R Naresh, L Narayanan IEEE Xplore 10 (1), 1-5, 2022 | 7* | 2022 |
Opinion Mining On Web-Based Communities Using Optimised Clustering Algorithms R.Naresh, SB Younis Turkish Journal of Computer and Mathematics Education 12 (9), 438-447, 2021 | 7* | 2021 |
An Hybrid Edge Algorithm for Vehicle License Plate Detection M Mozumder, S Biswas, L Vijayakumari, R Naresh, CNSV Kumar, ... International Conference on Intelligent Sustainable Systems, 209-219, 2023 | 6 | 2023 |
Survey on Cloud Auditing by Using Integrity Checking Algorithm and Key Validation Mechanism M Mageshwari, R Naresh Smart Trends in Computing and Communications: Proceedings of SmartCom 2022 …, 2022 | 6 | 2022 |
Dual Authentication for Payment Request Verification Over Cloud using Bilinear Dual Authentication Payments Transaction Protocol A Saranya International Journal of Advanced Computer Science and Applications (IJACSA …, 2022 | 6 | 2022 |