Back close
Publications
Virtual labs in engineering education: Modeling perceived critical mass of potential adopter teachers

Authors : Raghu Raman, Dr. Krishnashree Achuthan, Prof. Prema Nedungadi

Publisher : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),

Publications
User-Adaptive Energy-aware Security for Mobile Devices

Authors : Sriram Sankaran, Ramalingam Sridhar

Publisher : IEEE Conference on Communications and Network Security (CNS)

Publications
Survey On Privacy Preserving Data Publishing Of Numerical Sensitive Data

Authors : Santhya R

Publisher : International Journal of Emerging Technology Advanced Engineering

Publications
Setting a Low-Cost Remote-triggered Biotechnology Laboratory: Case Study on Light Microscopy

Authors : Mithula Parangan, Dhanush Kumar, Hareesh Singanamala, Dr. Shyam Diwakar, Dr. Bipin G. Nair, Dr. Krishnashree Achuthan

Publisher : International Conference on Biotechnology for innovative applications, Amrita Vishwa Vidyapeetham, Kerala.

Publications
Remote Triggered Biotechnology Labs: Implementation Issues and Challenges

Authors : Dhanush Kumar, Mithula Parangan, Hareesh Singanamala, Dr. Shyam Diwakar, Dr. Bipin G. Nair, Dr. Krishnashree Achuthan

Publisher : International Conference on Biotechnology for innovative applications, Amrita Vishwa Vidyapeetham, Kerala,

Publications
Remote Laboratory: Controlling a Robotic Articulator

Authors : Hareesh Singanamala, Dhanush Kumar, Mithula Parangan, Dr. Bipin G. Nair, Dr. Shyam Diwakar, Dr. Krishnashree Achuthan

Publisher : International Conference on Biotechnology for innovative applications, Amrita Vishwa Vidyapeetham, Kerala.

Publications
Secret image sharing using steganography with different cover images

Authors : Jagadeesh, N., Nandakumar, A., Harmya, P., Anju, S.S.

Publisher : Communications in Computer and Information Science

Publications
A secure data hiding scheme based on combined steganography and visual cryptography methods

Authors : Nandakumar, A., Harmya, P., Jagadeesh, N., Anju, S.S.

Publisher : Communications in Computer and Information Science

Publications
Preventing Insider Attacks in the Cloud

Authors : Sundararajan, Sudharsan, N. N. Hari, Pavithran, Vipin, Vorungati, Kaladhar, Achuthan, Krishnashree

Publisher : Springer Berlin Heidelberg

Publications
Matrix embedding using random linear codes and its steganalysis

Authors : Harmya, P., Anju, S.S., Jagadeesh, N., Nandakumar, A.

Publisher : Communications in Computer and Information Science

Publications
Cognitive environment for pervasive learners

Authors : Sharma, S., Sreevathsan, R., Srikanth, M.V.V.N.S., Harshith, C., Dr. Gireesh K. T.

Publisher : Communications in Computer and Information Science

Publications
Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM

Authors : Raj, Ashji S., Dr. Srinivasan C.

Publisher : Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011

Admissions Apply Now