School of Computing and Information Technology, REVA University, Bengaluru
Verified email at - Homepage
Cited by
Cited by
A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing
N Thillaiarasu, S ChenthurPandian
Cluster Computing 22 (1), 1179-1188, 2019
Enforcing security and privacy over multi-cloud framework using assessment techniques
N Thillaiarasu., S ChenthurPandian.
Intelligent Systems and Control (ISCO), 2016 10th International Conference …, 2016
A survey on acquiring integrity of shared data with effective user termination in the cloud
N Shyamambika, N Thillaiarasu
2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016
A Survey of Secure Routing Protocols of Mobile AdHoc Network
NT S Ranjithkumar
SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE …, 2015
Attaining Integrity, Secured Data Sharing and Removal of Misbehaving Client in the Public Cloud using an External Agent and Secure Encryption Technique
NT N. Shyamambika
Advances in Natural and Applied Sciences. 10(9) 10 (9), 421-431, 2016
Paddy Plant Disease Recognition, Risk Analysis, and Classification Using Deep Convolution Neuro-Fuzzy Network
VV Kumar, KMK Raghunath, N Rajesh, M Venkatesan, RB Joseph, ...
Journal of Mobile Multimedia, 325–348-325–348, 2021
Enforcing confidentiality and authentication over public cloud using hybrid cryptosystems
N Thillaiarasu, S Chenthur Pandian, G Naveen Balaji, RM Benitha Shierly, ...
International conference on intelligent data communication technologies and …, 2018
Designing a trivial information relaying scheme for assuring safety in mobile cloud computing environment
N Thillaiarasu, SC Pandian, V Vijayakumar, S Prabaharan, L Ravi, ...
Wireless Networks, 1-14, 2019
An effective digit recognition model using enhanced convolutional neural network based chaotic grey wolf optimization
P Preethi, R Asokan, N Thillaiarasu, T Saravanan
Journal of Intelligent & Fuzzy Systems, 1-11, 2021
Hyper Elliptic Curve Cryptography (HECC) to Ensure Data Security in the Cloud
RC K.Nagendran, N.Thillaiarasu ,P.Chandrika 7 (Special …, 2018
Design of a Confidentiality Model Using Semantic-Based Information Segmentation (SBIS) and Scattered Storage in Cloud Computing
N Thillaiarasu, N Gowthaman, S Chenthur Pandian
IoT and IoE Driven Smart Cities, 183-213, 2022
Internet of Everything (IoE) in Smart City Paradigm Using Advanced Sensors for Handheld Devices and Equipment
P Malini, N Gowthaman, A Gautami, N Thillaiarasu
IoT and IoE Driven Smart Cities, 121-141, 2022
Novel Heuristic Scheme to Enforce Safety and Confidentiality Using Feature-Based Encryption in Multi-cloud Environment (MCE)
N Thillaiarasu, SC Pandian, N Gowthaman
Information and Knowledge in Internet of Things, 441-456, 2022
Solar powered fire extirpation robot with night vision camera
N Thillaiarasu, M Susmitha, D Devadharshini, T Anantharaj
2019 5th International Conference on Advanced Computing & Communication …, 2019
ChenthurPandian. S," Enforcing Security and Privacy over Multi–Cloud Framework Using Assessment Techniques,"
N Thillaiarasu
IEEE, 2016
Analysing the user actions and location for identifying online scam in internet banking on cloud
AJP Lazar, S Sengan, LPL Cavaliere, T Nadesan, D Sharma, MK Gupta, ...
Wireless Personal Communications, 1-24, 2021
Design Schema to Offer Security and Confidentiality to Healthcare Data in Cloud Environment
N Thillaiarasu, R Shanmugam, K Thirunavukkarasu, S Khan
Global Healthcare Disasters, 179-195, 2022
A Deep Learning-based Semi-Supervised GAN to detect Alzheimer's illness efficiently
S Saravanakumar, T Saravanan, N Thillaiarasu
2022 2nd International Conference on Advance Computing and Innovative …, 2022
A Survey on Different Computer Vision Based Human Activity Recognition for Surveillance Applications
A Shenoy, N Thillaiarasu
2022 6th International Conference on Computing Methodologies and …, 2022
Investigation Of Comparison on Modified CNN Techniques to Classify Fake Face in Deepfake Videos
A Gowda, N Thillaiarasu
2022 8th International Conference on Advanced Computing and Communication …, 2022
The system can't perform the operation now. Try again later.
Articles 1–20