Citation : Praveen, K., G. Indhu,M. Sethumadhavan., OR Operation Based Deterministic Extended Visual Cryptograp ...
Publisher :Springer
Citation : Mohan, Thanusree, Praveen, K., Fraud Detection in Medical Insurance Claim with Privacy Preserving Da ...
Publisher :Springer
Citation : Sidhardhan, Manasa, Praveen, K., Data Obfuscation Using Secret Sharing, ICAICR 2019, Communications ...
Publisher :Springer
Citation : Naveen, Devarapalli, Praveen, K., PUF Authentication using Visual Secret Sharing Scheme, ICACCS 2019 ...
Publisher :IEEE
Citation : Anjana, K., Praveen, K., et al., Variant of Nearest Neighborhood Fingerprint Storage System by Reduc ...
Publisher :Springer
Citation : Mohan, Meghna Ashoka, T. V. Jayakumar, Praveen, K., Preserving the Privacy of Audio File Using Ideal ...
Publisher :Springer
Citation : R. M. Jacob, Praveen, K., Amritha. P.P., Application of Visual Cryptography Scheme in Software Water ...
Publisher :IEEE
Citation : Athulya. A.A., Praveen, K., Towards the Detection of Phishing Attacks, ICOEI 2020, IEEE Xplore.
Publisher :IEEE
Citation : Aravind. D. D., Praveen, K., Role Mining in Distributed Firewall Using Matrix Factorization Methods, ...
Publisher :IEEE
Citation : Aiswarya K.K., Praveen, K., Amritha P.P., Sethumadhavan M., Application of Secret Sharing Scheme in ...
Publisher :Springer
Citation : V. Vivekananthan, Praveen, K., M. Sethumadhavan., Dynamic Watermarking Using Python AST, Proceedings ...
Publisher :Springer
Citation : L. Chandana Priya, Praveen, K., (t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using ...
Publisher :Springer