Back close
Publications
Results on (2, n) Visual Cryptographic Scheme

Authors : K. Praveen, Dr. M. Sethumadhavan

Publisher : Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

Publications
VirtualLabs: Pervasive Education & Scenes from an ICT Perspective

Authors : Dr. Shyam Diwakar,, Dr. Krishnashree Achuthan, Prof. Prema Nedungadi,, Dr. Bipin Nair

Publisher : Proceedings of the 5TH GUIDE INTERNATIONAL CONFERENCE 2011, Rome

Publications
A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images

Authors : K. Praveen, K. Praveen, Dr. M. Sethumadhavan, Dr. M. Sethumadhavan

Publisher : Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014)

Publications
Differential Execution Analysis for Obfuscation Reduction

Authors : Robert, R. Reno

Publisher : Springer Berlin Heidelberg.

Publications
AMA: Static Code Analysis of Web Page for the Detection of Malicious Scripts

Authors : Seshagiri, P.a, Vazhayil, A.b, Padmamala Sriram

Publisher : Proceedings of the 6th International Conference on Advances in Computing & Communications 2016, Procedia Computer Science, Elsevier,

Publications
Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network

Authors : Ashok, A., Poornachandran, P., Pal, S., Sankar, P., Surendran, K.

Publisher : Journal of Intelligent and Fuzzy Systems, IOS Press,

Publications
Virtual lab: An adequate multi-modality learning channel for enhancing students’ perception in chemistry

Authors : Dr. Krishnashree Achuthan, Murali, S.S.

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag,

Publications
Comparative Study of Algorithms for Frontier based Area Exploration and Slam for Mobile Robots

Authors : Dayanand, V., Dr. Gireesh K. T., Rahul Sharma

Publisher : International Journal of Computer Applications

Publications
DoS Attacks on Real-Time Media through Indirect Contention-in-Hosts

Authors : Jayaraj Poroor, B. Jayaraman

Publisher : IEEE

Publications
Semiconductor wafer polishing apparatus

Authors : Dr. Krishnashree Achuthan, Woo, Christy Mei-Chu

Publications
Foreground Estimation in a Degraded Text document

Authors : Bhuvana I Chandra, Dr. Gireesh K. T., Nagarjunavarma, K.

Publisher : International Journal of Computer Applications

Admissions Apply Now