Research Publications for Vimal Kumar

Welcome to the University of Waikato research publications search. This database includes all research publications produced by the University from 1998.

Author's Publications

Publications ByKUMAR, Vimal

  Search our Staff Profiles to contact our current staff members.

  • Roodt, D., Speidel, U., Kumar, V., & Ko, R. (2021). On random editing in LZ-End. In A. Bilgin, M. W. Marcellin, J. Serra-Sagrista, & J. A. Storer (Eds.), 2021 Data Compression Conference (DCC 2021) (pp. 366). Snowbird, UT, USA: IEEE. doi:10.1109/dcc50243.2021.00074

  • Phua, T. W., Patros, P., & Kumar, V. (2021). Towards embedding data provenance in files. In R. Paul (Ed.), Proc 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (pp. 1319-1325). USA, Virtual: IEEE. doi:10.1109/CCWC51732.2021.9375947

  • Kumar, A., Singh, K. U., Hsieh, S. Y., Kumar, V. D. A., & Kumar, A. (2021). Distribution key scheme for secure group management in VANET using polynomial interpolation. In L. Lin, Y. Liu, & C. W. Lee (Eds.), Security and Privacy in Social Networks and Big Data. SocialSec 2021. Communications in Computer and Information Science Vol. 1495 (pp. 3-14). doi:10.1007/978-981-16-7913-1_1

  • Chew, C., Kumar, V., Patros, P., & Malik, R. (2020). ESCAPADE: Encryption-type-ransomeware: system call based pattern detection. In M. Kutylowski, J. Zhang, & C. Chen (Eds.), Proc 14th International Conference on Network and System Security (NSS 2020), LNCS 12570 (pp. 388-407). Virtual, Melbourne, Australia. doi:10.1007/978-3-030-65745-1_23

  • Dekker, M., & Kumar, V. (2019). Using audio characteristics for mobile device authentication. In J. K. Liu, & X. Huang (Eds.), Proc International Conference on Network and System Security (NSS 2019) LNCS 11928 (pp. 98-113). Sapporo, Japan. doi:10.1007/978-3-030-36938-5_6

  • Chew, C., & Kumar, V. (2019). Behaviour based ransomware detection. In G. Lee, & Y. Jin (Eds.), Proc 34th International Conference on Computers and Their Applications (CATA 2019) Vol. 58 (pp. 127-136). EasyChair. doi:10.29007/t5q7

  • Kumar, V. (2019). A bilinear pairing based secure data aggregation scheme for WSNs. In Proc 15th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 102-107). Tangier, Morocco: IEEE. doi:10.1109/iwcmc.2019.8766759

  • Kumar, V., Spanias, A., Sen, A., & Madria, S. (2018). Secure Sensor Cloud. Morgan & Claypool. doi:10.2200/S00886ED1V01Y201811ASE018

  • Mrema, E., & Kumar, V. (2018). Fine grained attribute based access control of healthcare data. In Proc 12th International Symposium on Medical Information and Communication Technology (ISMICT 2018) (pp. 5 pages). Conference held Sydney, Australia: IEEE. doi:10.1109/ISMICT.2018.8573699

  • Kumar, V., Chaisiri, S., & Ko, R. (Eds.) (2017). Data security in cloud computing. Institution of Engineering and Technology.

See Also: Research Links | Student Research Theses | Research Commons

This page has been reformatted for printing.