Year : 2020
Finite-state model extraction and visualization from Java program execution
Cite this Research Publication : K.P. Jevitha, J. Swaminathan, B. Jayaraman, M. Sethumadhavan, “Finite-state model extraction and visualization from Java program execution”, Software: Practice and Experience, vol. 51, pp. 409-437, 2021. DOI: https://doi.org/10.1002/spe.2910
Publisher : Wiley
Year : 2018
A Selective Generation of Hybrid Random Numbers via Android Smart Phones
Cite this Research Publication : Ashok Kumar Mohan, Dr. Nirmala Devi M., Dr. M. Sethumadhavan, and Santhya R, “A Selective Generation of Hybrid Random Numbers via Android Smart Phones”, International Journal of Pure and Applied Mathematics, vol. 118, no. 8, pp. 311-317, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Partial Password Authentication using Vector Decomposition
Cite this Research Publication : I. Praveen and Dr. M. Sethumadhavan, “Partial Password Authentication using Vector Decomposition”, International Journal of Pure and Applied Mathematics, vol. 118, pp. 381-385, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
The Art of Piecewise Hashing: A step toward better evidence provability
Cite this Research Publication : A. Gopalakrishnan, Vineti, E., Ashok Kumar Mohan, and Dr. M. Sethumadhavan, “The Art of Piecewise Hashing: A step toward better evidence provability”, Journal of Cyber Security and Mobility, vol. 7, pp. 109-130, 2018.
Publisher : Journal of Cyber Security and Mobility
Year : 2017
Wireless Security Auditing: Attack Vectors and Mitigation Strategies
Cite this Research Publication : Ashok Kumar Mohan, Dr. M. Sethumadhavan, and A, A. Devi, “Wireless Security Auditing: Attack Vectors and Mitigation Strategies”, Procedia Computer Science, vol. 115, pp. 674–682, 2017.
Publisher : Procedia Computer Science
Year : 2017
Opaque Predicate Detection by Static Analysis of Binary Executables
Cite this Research Publication : R. K. R. Prakash, Amritha, P. P., and Sethumadhavan, M., “Opaque Predicate Detection by Static Analysis of Binary Executables”, Communications in Computer and Information Science, vol. 746, pp. 250-258, 2017.
Publisher : Communications in Computer and Information Science
Year : 2017
An Android Application for Secret Image Sharing with Cloud Storage
Cite this Research Publication : K. Praveen, Indu, G., Santhya, R., and Sethumadhavan, M., “An Android Application for Secret Image Sharing with Cloud Storage”, Communications in Computer and Information Science, vol. 746, pp. 399-410, 2017.
Publisher : Communications in Computer and Information Science
Year : 2017
Active steganalysis on svd-based embedding algorithm
Cite this Research Publication :
P. P. Amritha, Ravi, R. P., and Dr. M. Sethumadhavan, “Active steganalysis on svd-based embedding algorithm”, Advances in Intelligent Systems and Computing, vol. 515, pp. 777-785, 2017.
Publisher : Advances in Intelligent Systems and Computing
Year : 2016
On the removal of steganographic content from images
Cite this Research Publication : P. P. Amritha, Sethumadhavan, M., and Krishnan, R., “On the removal of steganographic content from images”, Defence Science Journal, vol. 66, 6 vol., pp. 574-581, 2016.
Publisher : Defence Science Journal, Defense Scientific Information and Documentation Centre, Volume 66, Number 6, p.574-581.
Year : 2016
Hash-One: a lightweight cryptographic hash function
Cite this Research Publication : Dr. M. Sethumadhavan, ,, Megha, P., Dr. Sindhu M., and Dr. Srinivasan C., “Hash-One: a lightweight cryptographic hash function”, IET Information Security, vol. 10, no. 5, pp. 225-231(6), 2016.
Publisher : IET Information Security, Institution of Engineering and Technology.
Year : 2016
Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation
Cite this Research Publication :
M. James, Srinivasan, C., K.V., L., and Sethumadhavan, M., “Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation”, in Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015, M. Senthilkumar, Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., and Batten, L., Eds. Singapore: Springer Singapore, 2016, pp. 385–392.
Publisher : Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015
Year : 2015
Cube Attack on Stream Ciphers using a Modified Linearity Test
Cite this Research Publication : Dr. Srinivasan C., Pillai, U. U., K.V., L., and Dr. M. Sethumadhavan, “Cube Attack on Stream Ciphers using a Modified Linearity Test”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 18, pp. 301-311, 2015.
Publisher : Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications
Year : 2014
A Framework for Analyzing the Security of Chrome Extensions
Publisher : Advanced Computing, Networking and Informatics- Volume 2 (pp. 267-272). Springer International Publishing.
Year : 2014
Counting rotation symmetric functions using Polyas theorem
Publisher : Discrete Applied Mathematics,
Year : 2014
On the k-error Joint Linear Complex- ity and Error Multisequence over Fq (charFq = p; prime)
Publisher : Recent Trends in Computer Networks and Distributed Systems Security (pp. 512-519). Springer Berlin Heidelberg.
Year : 2014
On the k-error Joint Linear Complexity and Error Multisequence over F
Cite this Research Publication : M. Sindhu and Dr. M. Sethumadhavan, “On the k-error Joint Linear Complexity and Error Multisequence over F”, Communications in Computer and Information Science, vol. 420 CCIS, pp. 512-519, 2014.
Publisher : Communications in Computer and Information Science
Year : 2014
Counting rotation symmetric functions using Polya’s theorem
Cite this Research Publication : L. K.V., Dr. M. Sethumadhavan, and Cusick, T. W., “Counting rotation symmetric functions using Polya’s theorem”, Discrete Applied Mathematics, vol. 169, pp. 162 - 167, 2014.
Publisher : Discrete Applied Mathematics
Year : 2014
Biometric Authentication via Facial Recognition
Cite this Research Publication : K. Nimmy and Dr. M. Sethumadhavan, “Biometric Authentication via Facial Recognition”, 2014.
Publisher : (2014)
Year : 2013
Linear Complexity Measures of Binary Multi-sequences
Publisher : International Journal of Computer Applications, 62(16), (pp. 6-10).
Year : 2013
An Application of Vector Decom- position Problem in Public Key Cryptography Using Homomorphic Encryption
Publisher : proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications - ERICA 2013 (pp. 328-331).
Year : 2013
Linear Complexity Measures of Binary Multisequences
Cite this Research Publication : Dr. Sindhu M. and Dr. M. Sethumadhavan, “Linear Complexity Measures of Binary Multisequences”, International Journal of Computer Applications, vol. 62, 2013.
Publisher : International Journal of Computer Applications
Year : 2012
A more ecient and faster pairing computation with cryptographic security
Publisher : Proceedings of the first international conference on security of internet of things
Year : 2012
Measuring diffusion in stream ciphers using statistical testing methods
Cite this Research Publication : Dr. Srinivasan C., K.V., L., and Dr. M. Sethumadhavan, “Measuring diffusion in stream ciphers using statistical testing methods”, Defence Science Journal, vol. 62, pp. 6-10, 2012.
Publisher : Defence Science Journal
Year : 2011
Error Linear Complexity Measures of Binary Multisequences
Cite this Research Publication : Dr. Sindhu M. and Dr. M. Sethumadhavan, “Error Linear Complexity Measures of Binary Multisequences”, 2011.
Year : 2010
Fuzzy Support Vector Machine-based Multi-agent Optimal Path Planning Approach to Robotics Environment.
Cite this Research Publication : Dr. Gireesh K. T., Poornaselvan, K. J., and Dr. M. Sethumadhavan, “Fuzzy Support Vector Machine-based Multi-agent Optimal Path Planning Approach to Robotics Environment.”, Defence Science Journal, vol. 60, no. 4, pp. 387-391, 2010.
Publisher : Defence Science Journal
Year : 2008
An algorithm for k-error joint linear complexity of binary multisequences
Cite this Research Publication : Dr. M. Sethumadhavan, Dr. Sindhu M., Dr. Srinivasan C., and Kavitha, C., “An algorithm for k-error joint linear complexity of binary multisequences”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 11, pp. 297-304, 2008.
Publisher : Journal of Discrete Mathematical Sciences and Cryptography
Year : 2006
Sequences; Predictability and Linear Complexity Measures
Cite this Research Publication : Dr. M. Sethumadhavan, “Sequences; Predictability and Linear Complexity Measures”, Discrete Mathematics and Its Applications, p. 104, 2006.
Publisher : Discrete Mathematics and Its Applications