Back close
Publications
Assured Privacy and Authentication of Health Data in Cloud Using Cryptographic Algorithm

Citation : T. R. Poojitha and Dr. S. Santhanalakshmi, “Assured Privacy and Authentication of Health Data in C ...

Publisher :2018 3rd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology

Publications
Raspberry Pi based Remote Controlled Car using Smartphone Accelerometer

Citation : V. Vishwa Kiran and Dr. S. Santhanalakshmi, “Raspberry Pi based Remote Controlled Car using Smartp ...

Publisher :2019 International Conference on Communication and Electronics Systems (ICCES), IEEE

Publications
Implementing Vehicle Black Box System by IoT based approach

Citation : S. Sethuraman and Dr. S. Santhanalakshmi, “Implementing Vehicle Black Box System by IoT based appr ...

Publisher :2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)

Publications
Design of group key agreement protocol using neural key synchronization

Citation : Dr. S. Santhanalakshmi, Sangeeta, K., and Patra, G. K., “Design of group key agreement protocol us ...

Publisher :Journal of Interdisciplinary Mathematics, Taylor & Francis,

Publications
Blockchain Applications with Privacy using Efficient Multiparty Computation Protocols

Citation : A. Threse A. Innocent and Dr. Prakash G., “Blockchain Applications with Privacy using Efficient Mu ...

Publisher :2019 PhD Colloquium on Ethically Driven Innovation and Technology for Society (PhD EDITS)

Publications
Multisystem inflammatory syndrome in a neonate, temporally associated with prenatal exposure to SARS-CoV-2: a case report

Citation : Prof Mahesh Kappanayil, Suma Balan, Sujata Alawani, Satish Mohanty, Sreelakshmi P Leeladharan, Sreja ...

Publisher :Lancet Child Adolesc Health,

Publications
Enhanced key establishment technique for secure data access in cloud

Citation : V. Reddy and Dr. Prakash G., “Enhanced key establishment technique for secure data access in cloud ...

Publisher :2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)

Publications
Experimental Study and Theoretical Simulation of Thermal Behavior of TPS Material in Re-Entry Space Capsule

Citation : K. Jayaram, Dr. Prakash G., and Vishakantaiah, J., “Experimental Study and Theoretical Simulation ...

Publisher :Proceedings of the 32nd International Symposium on Shock Waves (ISSW32 2019)

Publications
Automated Hydroponic Drip Irrigation Using Big Data

Citation : A. Ani and Dr. Prakash G., “Automated Hydroponic Drip Irrigation Using Big Data”, in 2020 Second ...

Publisher :2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA)

Publications
A Generic Framework to Enhance Two-Factor Authentication in Cryptographic Smart Card Applications

Citation : Dr. Prakash G. and Kannan, M., “A Generic Framework to Enhance Two-Factor Authentication in Crypto ...

Publisher :International Journal of Engineering and Technology

Publications
ENHANCING SECURITY IN CRYPTOGRAPHIC SMART CARDS THROUGH ELLIPTIC CURVE CRYPTOGRAPHY AND OPTIMIZED MODIFIED MATRIX ENCODING ALGORITHMS

Citation : Dr. Prakash G. and Kannan, M., “ENHANCING SECURITY IN CRYPTOGRAPHIC SMART CARDS THROUGH ELLIPTIC C ...

Publisher :Journal of Theoretical and Applied Information Technology

Publications
Improving the Security of Smart Cards through Multi- Curve ECC

Citation : Dr. Prakash G. and S., S., “Improving the Security of Smart Cards through Multi- Curve ECC”, Cur ...

Publisher :Currently researchers are focusing on the techniques that could withstand and prevent the user’s secret data from the attacks. Cryptographic Smart cards are vulnerable to traditional mathematical attacks that exploit defects in cryptographic algorithms. H,

Admissions Apply Now