Cryptographic Cloud Storage with Anonymous Authentication
- S. Meera, G. N. H. Banu, V. Vaishnavi, S. Rani
- Computer Science
- 25 April 2015
The cloud verifies the authenticity without knowing the user’s identity before storing data and has the added feature of access control in which only validated users are able to decrypt the stored information.
Crosscap two of class of graphs from commutative rings
- S. Karthik, S. Meera, K. Selvakumar
- Mathematics, ArtDiscret. Math. Algorithms Appl.
- 2 December 2021
Let [Formula: see text] be a commutative ring with identity and [Formula: see text] be the set of all nonzero zero-divisors of [Formula: see text]. The annihilator graph of commutative ring [Formula:…
Enhanced Packet Delivery Techniques Using CryptoLogic on Jamming Attacks for Wireless Communication Medium
- A. Malladi, M. Naik, S. Meera
- Computer Science
- 2013
This paper addresses the problem of jamming under an internal threat model, presenting a challenger model for selective jamming attacks, and develops three schemes that prevent real-time packet classification by combining cryptographic primitives with physicallayer attributes.
A Novel Approach for Attribute Based Encryption in Cloud Computing
- S. Meera, Chebrolu Mandal, C. Scalability
- Computer Science
- 2013
A CP-ABE based encryption scheme that provides fine-grained access control and a set of attributes based on which the user’s private key is generated is described.