Follow
Lydia Elizabeth
Lydia Elizabeth
Verified email at annauniv.edu
Title
Cited by
Cited by
Year
An improved list-based task scheduling algorithm for fog computing environment
R Madhura, BL Elizabeth, VR Uthariaraj
Computing 103 (7), 1353-1389, 2021
352021
Bayesian based confidence model for trust inference in MANETs
BL Elizabeth, R Aaishwarya, P Kiruthika, MN Shrada, AJ Prakash, ...
2011 International Conference on Recent Trends in Information Technology …, 2011
132011
A grid based iris biometric watermarking using wavelet transform
C Duraipandi, A Pratap, R Uthariaraj
2014 International Conference on Recent Trends in Information Technology, 1-6, 2014
92014
Beyond Statistical Analysis in Chaos‐Based CSPRNG Design
JP Arockiasamy, LE Benjamin, RU Vaidyanathan
Security and Communication Networks 2021 (1), 5597720, 2021
72021
Verifiable top-k searchable encryption for cloud data
BL Elizabeth, AJ Prakash
Sādhanā 45 (1), 9, 2020
62020
An efficient list‐based task scheduling algorithm for heterogeneous distributed computing environment
R Madhura, VR Uthariaraj, BL Elizabeth
Software: Practice and Experience 53 (2), 390-412, 2023
42023
HIDE: hyperchaotic image encryption using DNA computing
BL Elizabeth, J Gayathri, S Subashini, AJ Prakash
Journal of Real-Time Image Processing 19 (2), 429-443, 2022
42022
Pindex: Private multi-linked index for encrypted document retrieval
AJ Prakash, BL Elizabeth
PLoS One 16 (8), e0256223, 2021
42021
Efficient key management protocol with predictive rekeying for dynamic networks
AJ Prakash, VR Uthariaraj, BL Elizabeth
2016 2nd International Conference on Green High Performance Computing …, 2016
42016
Trust based cloud service provider selection
S Rajasree, BL Elizabeth
International Journal of Engineering and Computer Science 5, 16708-16713, 2016
42016
TSED: Top-k Ranked Searchable Encryption for Secure Cloud Data Storage
B. Lydia Elizabeth, A. John Prakash, V. Rhymend Uthariaraj
Advances in Intelligent Systems and Computing, 113-121, 2018
2*2018
Performance Evaluation of Multicrypt Encryption Mechanism
JP Arockiasamy, LE Benjamin, RU Vaidyanathan
American Journal of Applied Sciences 9 (11), 1849, 2012
22012
Trustworthy mechanisms for selecting cloud service providers
BL Elizabeth, K Ramya, AJ Prakash, VR Uthariaraj
2014 International Conference on Recent Trends in Information Technology, 1-5, 2014
12014
ASAKE: Adaptive Secure Authenticated Key Establishment Mechanism for Dynamic Networks
LEB John Prakash A
Asian Journal of Information Technology 15 (18), 3562-3576, 2016
2016
T-Select : Trust based cloud provider selection
L Elizabeth B, R K, J Prakash A, R Uthariaraj V
International Journal of Applied Engineering Research 10 (1), 979-996, 2015
2015
An Improved Uncertainty Reduction Scheme Based on Bayesian Prediction in MANETs
B Lydia Elizabeth, S Sudha, AJ Prakash, V Rhymend Uthariaraj
Advances in Network Security and Applications: 4th International Conference …, 2011
2011
2014 Fourth International Conference on Recent Trends in Information Technology (ICRTIT)
BL Elizabeth, K Ramya, AJ Prakash, VR Uthariaraj
The system can't perform the operation now. Try again later.
Articles 1–17