Vimal Kumar
Title
Cited by
Cited by
Year
Sensor Cloud: A Cloud of Virtual Sensors
S Madria, V Kumar, R Dalvi
Software 31 (2), 70-77, 2014
2082014
Secure hierarchical data aggregation in wireless sensor networks: Performance evaluation and analysis
V Kumar, SK Madria
2012 IEEE 13th International Conference on Mobile Data Management, 196-201, 2012
432012
Challenges in secure sensor-cloud computing
N Poolsappasit, V Kumar, S Madria, S Chellappan
Secure Data Management, 70-84, 2011
302011
Pip: Privacy and integrity preserving data aggregation in wireless sensor networks
V Kumar, S Madria
Reliable Distributed Systems (SRDS), 2013 IEEE 32nd International Symposium …, 2013
282013
Secure Data Aggregation in Wireless Sensor Networks
V Kumar, S Madria
Wireless Sensor Network Technologies for the Information Explosion Era, 77-107, 2010
172010
Multi-party encryption (mpe): secure communications in delay tolerant networks
R Cabaniss, V Kumar, S Madria
Wireless Networks 21 (4), 1243-1258, 2015
142015
Personal Data Collection in the Workplace: Ethical and Technical Challenges
J Bowen, A Hinze, C Griffiths, V Kumar, D Bainbridge
112017
Distributed attribute based access control of aggregated data in sensor clouds
V Kumar, S Madria
2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), 218-227, 2015
102015
A test-bed for secure hierarchical data aggregation in wireless sensor networks
V Kumar, J McCarville-Schueths, S Madria
The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems …, 2010
72010
Data Security in Cloud Computing
V Kumar, S Chaisiri, R Ko
Institution of Engineering and Technology, 2017
62017
Efficient and Secure Code Dissemination in Sensor Clouds
V Kumar, S Madria
Mobile Data Management, 2014
62014
Using Machine Learning Techniques to Track Individuals & Their Fitness Activities
T Reichherzer, M Timm, N Earley, N Reyes, V Kumar
International Conference on Computers and Their Applications, 2017
52017
A survey of trust and trust management in cloud computing
V Kumar, B Chejerla, S Madria, M Mohania
Managing Trust in Cyberspace, 41, 2013
52013
Three point encryption (3PE): Secure communications in delay tolerant networks
R Cabaniss, V Kumar, S Madria
2012 IEEE 31st Symposium on Reliable Distributed Systems, 479-480, 2012
42012
Performance Analysis of Secure Hierarchical Data Aggregation in Wireless Sensor Networks
V Kumar, S Madria
2010 Eleventh International Conference on Mobile Data Management, 299-300, 2010
42010
A Bilinear Pairing Based Secure Data Aggregation Scheme for WSNs
V Kumar
2019 15th International Wireless Communications & Mobile Computing …, 2019
32019
Behaviour Based Ransomware Detection
C Chew, V Kumar
34th International Conference on Computers and Their Applications 58, 127-136, 2019
22019
ESCAPADE: Encryption-type-ransomware: System Call based Pattern Detection
C Chew, V Kumar, P Patros, R Malik
14th International Conference on Network and System Security, 2020
12020
Using Audio Characteristics for Mobile Device Authentication
M Dekker, V Kumar
13th International Conference on Network and System Security, NSS 2019 1198 …, 2019
12019
Fine Grained Attribute Based Access Control of Healthcare Data
E Mrema, V Kumar
12th International Symposium on Medical Information and Communication Technology, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20