![]() | ![]() |
2008 | ||
---|---|---|
6 | EE | K. Komathy, P. Narayanasamy: Secure Data Forwarding against Denial of Service Attack Using Trust Based Evolutionary Game. VTC Spring 2008: 31-35 |
5 | EE | K. Komathy, P. Narayanasamy: Trust-based evolutionary game model assisting AODV routing against selfishness. J. Network and Computer Applications 31(4): 446-471 (2008) |
2007 | ||
4 | EE | K. Komathy, P. Narayanasamy: Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network. Computer Communications 30(18): 3721-3735 (2007) |
2003 | ||
3 | K. Komathy, P. Vivekanandan, V. Ramachandran: Secure SOAP-based web services. Comput. Syst. Sci. Eng. 18(1): 27-33 (2003) | |
2 | EE | K. Komathy, V. Ramachandran, P. Vivekanandan: Security for XML messaging services - a component-based approach. J. Network and Computer Applications 26(2): 197-211 (2003) |
2002 | ||
1 | EE | K. Komathy, V. Ramachandran, P. Vivekanandan: Component-Based Security Model for XML Messaging Services. LCN 2002: 132-133 |
1 | P. Narayanasamy | [4] [5] [6] |
2 | V. Ramachandran | [1] [2] [3] |
3 | P. Vivekanandan | [1] [2] [3] |