Dr.R.FELISTA SUGIRTHA LIZY

@apcmcollege.ac.in

Assistant Professor in Computer Science
A.P.C. Mahalaxmi College for Women



                    

https://researchid.co/felislizy

RESEARCH INTERESTS

Network Security, Cryptography

4

Scopus Publications

17

Scholar Citations

3

Scholar h-index

Scopus Publications

  • Industry 4.0 in manufacturing, communication, transportation, healthcare
    R. Felista Sugirtha Lizy, Ibrahim M. H., and Chinnadurai Manthiramoorthy

    IGI Global
    This chapter gives a summary of the effects of Industry 4.0 (I 4.0) on various sectors, including manufacture, communication, transportation, and healthcare. A new wave of technical improvements called “Industry 4.0” focuses on automation, connectivity, and data exchange in manufacturing processes. The chapter highlights how I 4.0 is transforming manufacturing processes by improving productivity, efficiency, and reducing operational costs. Additionally, the chapter discusses I 4.0 adoption in the communications and transportation sectors, leading to better connectivity, safety, and improved customer experience. The healthcare sector is also benefiting from I 4.0 by enhancing patient care through personalized medicine, remote monitoring, and data analytics. The chapter concludes by addressing the possible advantages and difficulties of implementing I 4.0 in various industries, offering insightful information for academics, professionals, and decision-makers.

  • Comparative Analysis of RSA-RK and ECC-RK for Aadhaar Card
    R. Felista Sugirtha Lizy

    Springer Nature Singapore

  • Energy aware clustering for biomedical wireless sensor networks
    G. Vennira Selvi, N. Rathna, R. Felista Sugirtha Lizy, S. Prabavathy, and P. Aurchana

    AIP Publishing

  • Performance of ECC Algorithm U sing Game Theory for Aadhaar Card
    R. Felista Sugirtha Lizy, V. Joseph Raj, and K. Balasubramanian

    IEEE
    In the Aadhaar Card security is a crucial aspect. Hence it should be kept as private as possible, we will require some data-handling strategies. This document would be useful for data security. The advantage of this technique is in terms of text encryption and decryption security. Asymmetric algorithms like RSA (Rivest, Adi Shamir, and Leonard Adleman) and ECC (Elliptic Curve Cryptography) are used. The RSA algorithm is used to create a pair of keys: one is a public key and another one is a private key. In both smart cards and Aadhaar cards, the RSA algorithm is the most secure algorithm for data protection. The performance of the ECC algorithm with GT (Game Theory) Methods is examined in this research paper. Combining ECC and GT approaches improves the speed and security of this paper. The GT-ECC algorithm's performance is recommended to be improved by increasing the Speed, Avalanche Effect, Speed, power consumption and Throughput. The experimental findings of the GT -ECC technique show improved performance. There is also a detailed mathematical justification for the GT -ECC algorithm.

RECENT SCHOLAR PUBLICATIONS

  • Comparative Analysis of RSA-RK and ECC-RK for Aadhaar Card
    RFS Lizy
    Power Engineering and Intelligent Systems: Proceedings of PEIS 2023, Volume 2023

  • Performance of RSA Algorithm Using Game Theory for Aadhaar Card
    R Felista Sugirtha Lizy, V Joseph Raj
    Sentiment Analysis and Deep Learning: Proceedings of ICSADL 2022, 83-95 2023

  • A Hybrid Algortihm for Aadhaar Card Security Using Rsa With Rk and Gt
    RFS Lizy, VJ Raj
    2022

  • Machine Learning Based Data Seclusion in Image and Audio Files
    DVJ Raj, DMP Rani, RFS Lizy
    IN Patent App. 202241020068 A 2022

  • Performance of ECC Algorithm Using Game Theory for Aadhaar Card
    RFS Lizy, VJ Raj, K Balasubramanian
    2022 International Virtual Conference on Power Engineering Computing and 2022

  • Construction of APP Using Augmented Reality and Virtual Reality
    DGV Selvi, S Prabavathy, RFS Lizy, B Anbarasan, GJS Perciya, P Roselin, ...
    IN Patent App. 2021141052461 A 2021

  • Improvement of RSA algorithm using euclidean technique
    RFS Lizy
    Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (3 2021

  • Image encryption using RK-RSA algorithm in aadhaar card
    RFS Lizy
    Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (3 2021

  • Performance Enhancement of RSA Using Runge-Kutta Technique
    RFS Lizy
    Test Engineering and Management 83, 11850-11857 2020

  • Performance enhancement of RSA using runge-kutta technique
    V Joseph Raj, R Felista Sugirtha Lizy
    Test Engineering and Management, 11850-11857 2020

  • Emerging Trends in Network Security Using Cryptography
    RFS Lizy
    International Journal for Scientific Research and Development, 41-45 2019

MOST CITED SCHOLAR PUBLICATIONS

  • Improvement of RSA algorithm using euclidean technique
    RFS Lizy
    Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (3 2021
    Citations: 9

  • Image encryption using RK-RSA algorithm in aadhaar card
    RFS Lizy
    Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (3 2021
    Citations: 5

  • Performance enhancement of RSA using runge-kutta technique
    V Joseph Raj, R Felista Sugirtha Lizy
    Test Engineering and Management, 11850-11857 2020
    Citations: 3

Publications

R. Felista Sugirtha Lizy and V. Joseph Raj, “Performance Enhancement of RSA Using Runge-Kutta Technique”, Test Engineering and Management, 2020, pp. 11850-11857
R. Felista Sugirtha Lizy, V. Joseph Raj and K. Balasubramanian, “Performance of ECC Algorithm Using Game Theory for Aadhaar Card”, 2022 International Virtual Conference on Power Engineering Computing and Control: Developments in Electric Vehicles and Energy Sector for Sustainable Future (PECCON), 2022, pp. 1-6, doi: 10.1109/ (Scopus Indexed)
R. Felista Sugirtha Lizy and V. Joseph Raj, “Image Encryption Using RK-RSA Algorithm in Aadhaar Card”, Turkish Journal of Computer and Mathematics Education, 2021, pp. 4683-4693
R. Felista Sugirtha Lizy and V. Joseph Raj, “Improvement of RSA Algorithm Using Euclidean Technique”, Turkish Journal of Computer and Mathematics Education, 2021, pp. 4694-4700
R. Felista Sugirtha Lizy and V. Joseph Raj, “Image Encryption Using RK-ECC Algorithm in Aadhaar Card”, A.P.C. Proceedings in International Conference Advances in Science and Engineering (ICASE’22)
R. Felista Sugirtha Lizy and V. Joseph Raj, “Novel Approach to Security for Aadhaar Card Using RK and ECC Algorithm”, National Conference on “Current Trends and Future Perspectives In Computing and Information Technology (CTFSCIT’22)”

RESEARCH OUTPUTS (PATENTS, SOFTWARE, PUBLICATIONS, PRODUCTS)

“Machine Learning Based Data Seclusion in Image and Audio Files” on 08.04.2022, Journal , pp. 21859.
“Construction of APP Using Augmented Reality and Virtual Reality” on 10.12.2021, Journal 50/2021, pp. 59938.