Back close
Optimally Locating for Hiding Information in Audio Signal

Authors : Premalatha, P, Premalatha, P, Amritha, P. P, Amritha, P. P

Publisher : International Journal of Computer Applications (0975- 8887), Vol. 65, No.14,(pp. 37-42).

Counting rotation symmetric functions using Polyas theorem

Authors : Lakshmy, K. V., , Sethumadhavan, M., , Cusick, T. W

Publisher : Discrete Applied Mathematics,

On the k-error Joint Linear Complex- ity and Error Multisequence over Fq (charFq = p; prime)

Authors : Sindhu, M., & , Sethumadhavan M

Publisher : Recent Trends in Computer Networks and Distributed Systems Security (pp. 512-519). Springer Berlin Heidelberg.

On the Extensions of (k; n)-Visual Cryptographic Schemes

Authors : Praveen, K., , Rajeev, K., , Sethumadhavan, M

A Framework for Analyzing the Security of Chrome Extensions

Authors : Aravind, V., Sethumadhavan, M.

Publisher : Advanced Computing, Networking and Informatics- Volume 2 (pp. 267-272). Springer International Publishing.

Use of Machine Learning Algorithms with SIEM for Attack Prediction

Authors : Anumol, E. T

Publisher : Intelligent Computing, Communication and Devices (pp. 231-235). Springer India.

Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform

Authors : Rajeev, Chandini, , Girish, K. P

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 667-672). Springer India.

Log Analysis Based Intrusion Prediction System

Authors : Menon, R. P

Publisher : Emerging ICT for Bridging the Future Proceedings of the 49th Annual Convention of the Computer Society of India (CSI)

A Filtering Based Android Malware Detection System for Google Play Store

Authors : Andoor, J. T

Publisher : Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 559-566). Springer International Publishing.

Phish Indicator: An Indication for Phishing Sites

Authors : Aparna, S,, Muniasamy, K

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 481-487). Springer India.

A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP

Authors : Kumar, A. S, Girish, K. P

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 673-679). Springer India.

A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition

Authors : Kumar M, Praveen

Publisher : In Intelligent Computing, Communication and Devices (pp. 131-137). Springer India.

Admissions Apply Now