Konnect: An Internet of Things (IoT) based smart helmet for accident detection and notification S Chandran, S Chandrasekar, NE Elizabeth 2016 IEEE Annual India Conference (INDICON), 1-4, 2016 | 105 | 2016 |
Sustainable agriculture using eco-friendly and energy efficient sensor technology S Srisruthi, N Swarna, GMS Ros, E Elizabeth 2016 IEEE International Conference on Recent Trends in Electronics …, 2016 | 56 | 2016 |
Network's server monitoring and analysis using Nagios J Renita, NE Elizabeth 2017 International Conference on Wireless Communications, Signal Processing …, 2017 | 32 | 2017 |
Verification based authentication scheme for bogus attacks in VANETs for secure communication AA Celes, NE Elizabeth 2018 International Conference on Communication and Signal Processing (ICCSP …, 2018 | 22 | 2018 |
Analysis and implementation of ECC algorithm in lightweight device A Shantha, J Renita, EN Edna 2019 International conference on communication and signal processing (ICCSP …, 2019 | 17 | 2019 |
SRT-Secure Routing using Trust Levels in MANETs NSK Edna Elizabeth. N., Radha. S., Priyadarshini. S., Jayasree. S. European Journal of Scientific Research 75 (3), pp. 409-422, 2012 | 16* | 2012 |
A Novel method for Detection and Elimination of Modification Attack and TTL attack in NTP based routing algorithm Vaithiyanathan, G Sheeba R., E Elizabeth N., S Radha Recent Trends in Information, Telecommunication and Computing (ITC), 2010 …, 2010 | 16* | 2010 |
Secured backscatter communication between smart cars in a vehicular ad-hoc network V Hansini, NE Elizabeth, R Hemapriya, S Kavitha 2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016 | 10 | 2016 |
Design of a two-factor authentication ticketing system for transit applications S Nivetha 2016 IEEE Region 10 Conference (TENCON), 2496-2502, 2016 | 8 | 2016 |
Secure authentication process in smart cards S Nivetha, NE Elizabeth, TP Padmasha, I Gohulalakshmi 2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016 | 7 | 2016 |
Enhanced Security Key Management Scheme for MANETS SR Edna Elizabeth N., Subasree S. WSEAS Transactions on Communications, 13 (Art. #3, Print ISSN: 1109-2742 …, 2014 | 7 | 2014 |
An optimized time bounded routing on solar based vehicuar ad-hoc networks using particle swarm optimization SS Aqeel, NE Elizabeth 2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016 | 4 | 2016 |
Registration and Verification of Vehicles in VANET’s NEEN P.Suresha Barani International Conference on Communication and Signal Processing, pp 1102-1107, 2015 | 4* | 2015 |
Intelligent Counter System for Generating Attendance N Edna Elizabeth, TK Gowthaman, J Joannes Sam Mertens, ... Microelectronics, Electromagnetics and Telecommunications: Proceedings of …, 2018 | 2 | 2018 |
Opportunistic routing to forgo flooding attacks in MANETs EEN Elakkiya.M International Journal of Engineering Development and Research, pp 34 - 40, 2014 | 2 | 2014 |
Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network VSGS Edna Elizabeth.Nallathambi, Radha Sankararajan Journal of Computer Science 7 (6), pp 924-936, 2011 | 2 | 2011 |
A novel method for self management of the energy consumption of nodes dying out of low battery capacity in a NTP based routing environment of MANETs S Vaithiyanathan, NE Elizabeth 2010 International Conference on Networking and Information Technology, 86-90, 2010 | 2 | 2010 |
“Implementation and Performance Analysis of Elliptic Curve Cryptography using an Efficient Multiplier”, Renita J, Edna Elizabeth N, Nandhini Asokan Journal of Semiconductor Technology and Science 22 (No. 2), 53-60, 2022 | 1 | 2022 |
Design of smart vest to monitor physical activities of children SA Arivu, R Amutha, K Muthumeenakshi, EN Edna 2018 Fourth International Conference on Advances in Electrical, Electronics …, 2018 | 1 | 2018 |
Velocity Optimized Solar-Time bound Traffic free Routing (VOSTTR) EE Protocol for VANET's EN Elizabeth, SA Shahul International Journal of Computer Science and Information Security 14 (12), 438, 2016 | 1 | 2016 |