Chandana Gamage
Chandana Gamage
Senior Lecturer, University of Moratuwa, Sri Lanka
cse.mrt.ac.lk üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Encrypted message authentication by firewalls
C Gamage, J Leiwo, Y Zheng
International Workshop on Public Key Cryptography, 69-81, 1999
1331999
Taking sensor networks from the lab to the jungle
AS Tanenbaum, C Gamage, B Crispo
Computer 39 (8), 98-100, 2006
1152006
An efficient scheme for secure message transmission using proxy-signcryption
C Gamage, J Leiwo, Y Zheng
Proceedings of the Twenty Second Australasian Computer Science Conference, 18-21, 1999
1001999
An identity-based ring signature scheme with enhanced privacy
C Gamage, B Gras, B Crispo, AS Tanenbaum
2006 Securecomm and Workshops, 1-5, 2006
73*2006
Enabling DRM-preserving digital content redistribution
SK Nair, BC Popescu, C Gamage, B Crispo, AS Tanenbaum
Seventh IEEE International Conference on E-Commerce Technology (CEC'05), 151-158, 2005
532005
Security for the mythical air-dropped sensor network
C Gamage, K Bicakci, B Crispo, AS Tanenbaum
11th IEEE Symposium on Computers and Communications (ISCC'06), 41-47, 2006
232006
Employee perception towards electronic monitoring at work place and its impact on job satisfaction of software professionals in Sri Lanka
V Samaranayake, C Gamage
Telematics and Informatics 29 (2), 233-244, 2012
222012
Organizational modeling for efficient specification of information security requirements
J Leiwo, C Gamage, Y Zheng
East European Conference on Advances in Databases and Information Systems …, 1999
211999
A framework for whole-body gesture recognition from video feeds
CN Joseph, S Kokulakumaran, K Srijeyanthan, A Thusyanthan, ...
2010 5th International Conference on Industrial and Information Systems, 430-435, 2010
192010
One-time sensors: A novel concept to mitigate node-capture attacks
K Bicakci, C Gamage, B Crispo, AS Tanenbaum
European Workshop on Security in Ad-hoc and Sensor Networks, 80-90, 2005
152005
A security design for a wide-area distributed system
J Leiwo, C Hänle, P Homburg, C Gamage, AS Tanenbaum
International Conference on Information Security and Cryptology, 236-256, 1999
151999
Canning spam in wireless gossip networks
D Gavidia, GP Jesi, C Gamage, M van Steen
2007 Fourth Annual Conference on Wireless on Demand Network Systems and …, 2007
13*2007
Enhanced real-time machine inspection with mobile augmented reality for maintenance and repair: Demo abstract
M Jayaweera, I Wijesooriya, D Wijewardana, T De Silva, C Gamage
Proceedings of the Second International Conference on Internet-of-Things …, 2017
12*2017
Quantitative and qualitative evaluation of performance and robustness of image stitching algorithms
V Dissanayake, S Herath, S Rasnayaka, S Seneviratne, ...
2015 International Conference on Digital Image Computing: Techniques and …, 2015
112015
Case study of WSN as a replacement for SCADA
C Amarawardhana, KS Dayananada, H Porawagama, C Gamage
2009 International Conference on Industrial and Information Systems (ICIIS …, 2009
112009
A secure peer sampling service
GP Jesi, D Gavidia, C Gamage, M van Steen
UBLCS, 2006
10*2006
Chaos theory based cryptography in digital image distribution
MHP Ranmuthugala, C Gamage
2010 International Conference on Advances in ICT for Emerging Regions (ICTer …, 2010
92010
Towards reusing esb services in different esb architectures
I Kumara, C Gamage
2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010
72010
Harmonizer—A Tool for Processing Information Security Requirements in Organization
J Leiwo, C Gamage, Y Zheng
Proceedings of the 3rd Nordic Workshop on Secure Computer Systems (NORDSEC’98), 1998
71998
Real-time gesture prediction using mobile sensor data for vr applications
V Dissanayake, S Herath, S Rasnayaka, S Seneviratne, ...
International Journal of Machine Learning and Computing 6 (3), 215, 2016
52016
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20