Programs
- M. Tech. in Automotive Engineering -Postgraduate
- B. Tech. in Computer Science and Engineering (Quantum Computing) 4 Years -Undergraduate
Citation : Reshma, R.S., Anjusha, P.P., Anisha, G.S. (2022). Implementing the Comparative Analysis of AES and D ...
Citation : Sundaresan, A., Vinod, M., Nair, S.M., Rajalakshmi, V.R. (2022). Enabling Identity-Based Data Securi ...
Publisher :Springer Link
Citation : Murali, M., Satish, M. & Rajalakshmi, V.R. Prediction and Analysis of Air Pollution Using Machine Le ...
Publisher :Springer Link
Citation : S. E. Jose, P. V. Nayana and N. S. Nair, "The Enforcement of Context Aware System Security Protocols ...
Publisher :IEEE
Citation : R. Ram Kumar, S. Menon and N. S. Nair, "Blockchain Solutions for Security Threats in Smart Industrie ...
Citation : Menon, G.M., Nivedya, N.V., Nair, N.S. (2022). Ensuring Security in IoT Applications by Detecting Sy ...
Publisher :Springer Link
Citation : Mathankumar, M., Karthick, K., Nanda kumar, A. K., Kundu, S., &Balasubramanian, S. (2021). In situ d ...
Publisher :Inorganic Chemistry
Citation : A. Sreekumar, A. A R and N. S. Nair, "An Enhancement to CoAP Protocol for Internet of Medical Thing ...
Publisher :IEEE
Citation : Bhattacharjee, L., Mohanta, K., Batabyal, S. K., Saha, A., &Bhattacharjee, R. R. (2020). Reversible ...
Publisher :The Journal of Physical Chemistry Letters
Citation : Rajan, S. T., VV, A. T., Terada-Nakaishi, M., Chen, P., Hanawa, T., Nandakumar, A. K., & Subramanian ...
Citation : Athira Shaji, Nima S Nair, “A Novel Trust Based Two Phase Algorithm to Detect Sybil Attack in IoMT ...
Citation : R. R. Lekshmi, D. Annirudh, R. Surya, S. Kousik Harish and S. Srilekha, "Hardware Prototype Model of ...
Publisher :Springer