Bibliographic Database

Found 13 results
Filters: Author is Deepti, C.  [Clear All Filters]
2018
Deepti, C.., "An Insight into Identity based Authentication Techniques for the Internet of Things Environment", International Conference on Electrical, Electronics, Computers,Communication, Mechanical and Computing, 2018.
2016
Deepti, C.., M. N. Renuka Devi, and G.. Madhavi, "An Analysis of the Current Challenges in Efficient Video Processing", International Conference on Advances in Computing Logic, Sciences and Technology - 2016, vol. 6: AnanthaLakshmi Institute of Technology and Sciences,Anantpur,Andhra Pradesh, pp. 4-11, 2016.
Kumar, A., S. Das, and C.. Deepti, "A Wi-Fi Direct based Mobile Application for Early Response to Persons in Emergency Situations", The SIJ Transactions on Computer Networks & Communication Engineering (CNCE), vol. 4, issue 2, pp. 19-24, 2016.
2014
Rathod, S.., and C.. Deepti, "An Integrated Fast Reroute Approach for Routing Protection in IP Networks", Int. Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), vol. 2, issue 5, pp. 4015-4020, 2014.
2013
Shivanagu, R.., and C.. Deepti, "An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wireless Sensor Networks", Int.Journal of Foundations in Computer Science and Technology(IJFCST),, vol. 3, issue 3, pp. 31-40,, 2013.
Syama, M.., and C.. Deepti, "Energy Efficient Source Authentication method for False Data Filtering in WSN", International Conference on Electrical Engineering and Computer Science: IRNET, 2013.
Syama, M.., and C.. Deepti, "An Evaluation of Energy Efficient Source Authentication M Methods for False Data Filtering in WSN", Int. Journal of Security, Privacy and Trust Management(IJSPTM), vol. 2, issue 2, pp. 33-41, 2013.
Syama, M.., and C.. Deepti, "An Evaluation of enroute filtering methods for False Data Injection attacks in WSN", Int. Journal of Engineering Research and Technology(IJERT), vol. 2, issue 4, pp. 345-350, 2013.
Deepti, C.., "A Framework for Monitoring Interface for Local Area Networks via Personal Bluetooth Computing", Int. Journal of Computer Applications (IJCA), vol. 63, issue 17, pp. 27-30, 2013.
Shivanagu, R.., and C.. Deepti, "A Security Mechanism against Reactive Jammer Attack in Wireless Sensor Networks Using Trigger Identification Service", Int. Journal of Security, Privacy and Trust Management(IJSPTM), vol. 2, issue 2, pp. 43-54, 2013.
Shivanagu, R.., and C.. Deepti, "A Security Mechanism against Reactive Jammer Attack in Wireless Sensor Networks Using Trigger Identification Service", Int. Journal of Security, Privacy and Trust Management(IJSPTM), vol. 2, issue 2, pp. 43-54, 2013.
2010
Deepti, C.., "Design and Implementation of a Monitoring Interface using Bluetooth Ad hoc Networking", National Level Paper Presentation Conference: Sathyabhama University, Chennai, 2010.
2008
Deepti, C.., and R.. Selvarani, "Unisys Safe Guard Disaster Recovery Solution", National Level Paper Presentation Conference: Dayananda Sagar Institutions, 2008.