Back close
Publications
Remote Triggered Biotechnology Labs: Implementation Issues and Challenges

Authors : Dhanush Kumar, Mithula Parangan, Hareesh Singanamala, Dr. Shyam Diwakar, Dr. Bipin G. Nair, Dr. Krishnashree Achuthan

Publisher : International Conference on Biotechnology for innovative applications, Amrita Vishwa Vidyapeetham, Kerala,

Publications
Remote Laboratory: Controlling a Robotic Articulator

Authors : Hareesh Singanamala, Dhanush Kumar, Mithula Parangan, Dr. Bipin G. Nair, Dr. Shyam Diwakar, Dr. Krishnashree Achuthan

Publisher : International Conference on Biotechnology for innovative applications, Amrita Vishwa Vidyapeetham, Kerala.

Publications
Secret image sharing using steganography with different cover images

Authors : Jagadeesh, N., Nandakumar, A., Harmya, P., Anju, S.S.

Publisher : Communications in Computer and Information Science

Publications
A secure data hiding scheme based on combined steganography and visual cryptography methods

Authors : Nandakumar, A., Harmya, P., Jagadeesh, N., Anju, S.S.

Publisher : Communications in Computer and Information Science

Publications
Preventing Insider Attacks in the Cloud

Authors : Sundararajan, Sudharsan, N. N. Hari, Pavithran, Vipin, Vorungati, Kaladhar, Achuthan, Krishnashree

Publisher : Springer Berlin Heidelberg

Publications
Matrix embedding using random linear codes and its steganalysis

Authors : Harmya, P., Anju, S.S., Jagadeesh, N., Nandakumar, A.

Publisher : Communications in Computer and Information Science

Publications
Cognitive environment for pervasive learners

Authors : Sharma, S., Sreevathsan, R., Srikanth, M.V.V.N.S., Harshith, C., Dr. Gireesh K. T.

Publisher : Communications in Computer and Information Science

Publications
Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM

Authors : Raj, Ashji S., Dr. Srinivasan C.

Publisher : Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011

Publications
Vulnerability assessment methods – A review

Authors : Nath, H.V

Publisher : Communications in Computer and Information Science

Publications
Verifying security properties of internet protocol stacks: The split verification approach

Authors : Jayaraj Poroor, B. Jayaraman

Publisher : Elsevier

Publications
Modelling The Impact Of Code Obfuscation On Energy Usage

Authors : Raj, A., Jithish, J., Sriram Sankaran

Publisher : CEUR Workshop Proceedings, CEUR-WS,

Publications
An Efficient Embedding and Restoration Steganographic Scheme for Secure Multimedia Communication

Authors : Dr. Gireesh K. T., Sasidharan, Sapna, N., Karthikha, A.P., Sherly, Y., Avani

Publisher : Proceedings of the 2010 International Conference on Advances in Computer Engineering

Admissions Apply Now