Back close

Dr. S. Santhanalakshmi

Asst. Professor, School of Computing, Bengaluru

Qualification: BE, Ph.D
s_lakshmi@blr.amrita.edu
Google Scholar Profile
Research Interest: Cryptography, Network Security & Soft Computing

Bio

Dr. S. Santhanalakshmi. currently serves as Assistant Professor at the School of Computing, Amrita Vishwa Vidyapeetham, Bengaluru. She successfully defended her Ph. D. in “Design and Analysis of Cryptographic Primitives Based on Computational Intelligence Techniques” under the guidance of Dr. K. Sangeeta. She has work experiences at Sri Krishna College of Engineering and Technology, Kuniamuthur, Coimbatore and Maharaja Engineering College Avinashi. Her research interests include Light weight crypto algorithms, Computational Intelligence Techniques.

Publications

Journal Article

Year : 2020

Design of group key agreement protocol using neural key synchronization

Cite this Research Publication : Dr. S. Santhanalakshmi, Sangeeta, K., and Patra, G. K., “Design of group key agreement protocol using neural key synchronization”, Journal of Interdisciplinary Mathematics, vol. 23, pp. 435-451, 2020.

Publisher : Journal of Interdisciplinary Mathematics, Taylor & Francis,

Year : 2017

Design of secure Cryptographic hash function using soft computing techniques

Cite this Research Publication : Dr. S. Santhanalakshmi, Sangeeta, K., and Patra, G. K., “Design of secure Cryptographic hash function using soft computing techniques”, International Journal of Advances in Soft Computing and its Applications, vol. 9, pp. 188-203, 2017.

Publisher : International Journal of Advances in Soft Computing and its Applications, International Center for Scientific Research and Studies

Year : 2014

Secure Key Stream Generation using Computational Intelligence Techniques

Cite this Research Publication : Dr. S. Santhanalakshmi, Dr. K. Sangeeta Iyer, and Patra, G. K., “Secure Key Stream Generation using Computational Intelligence Techniques”, Int. Journal Computer Technology & Applications, Month and Year of Publication, , vol. 5, pp. 967-972, 2014.

Publisher : Int. Journal Computer Technology Applications, Month and Year of Publication, ,

Year : 2014

Comparison of Naïve Bayes Using Different Feature Selection Techniques in Twitter Sentiment Analysis

Cite this Research Publication : P. M.V.C, Yuganeshan, A. J., Deepthi, Y. V. S. S. N., and Dr. S. Santhanalakshmi, “Comparison of Naïve Bayes Using Different Feature Selection Techniques in Twitter Sentiment Analysis”, International Journal of Applied Engineering Research, vol. 9, 2014.

Publisher : International Journal of Applied Engineering Research

Year : 2014

Automation of Timetable Generation using Genetic Algorithm

Cite this Research Publication : S. D. Shenoy, Sharma, V., and S .Santhanalakshmi, “Automation of Timetable Generation using Genetic Algorithm”, Int.J.Computer Technology & Applications, vol. 5, pp. 1491-1494, 2014.

Publisher : Int.J.Computer Technology Applications

Year : 2012

Design of Stream cipher for text encryption using soft computing based techniques

Cite this Research Publication : S. Santhanalakshmi, Sangeeta, K., and Patra, G. K., “Design of Stream cipher for text encryption using soft computing based techniques”, IJCSNS International Journal of Computer Science and Network Security, vol. 12, pp. 149–152, 2012.

Publisher : IJCSNS International Journal of Computer Science and Network Security

Conference Paper

Year : 2020

Implementing Vehicle Black Box System by IoT based approach

Cite this Research Publication : S. Sethuraman and Dr. S. Santhanalakshmi, “Implementing Vehicle Black Box System by IoT based approach”, in 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 2020.

Publisher : 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)

Year : 2018

Assured Privacy and Authentication of Health Data in Cloud Using Cryptographic Algorithm

Cite this Research Publication : T. R. Poojitha and Dr. S. Santhanalakshmi, “Assured Privacy and Authentication of Health Data in Cloud Using Cryptographic Algorithm”, in 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), Bangalore, India, 2018.

Publisher : 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology

Year : 2018

Raspberry Pi based Remote Controlled Car using Smartphone Accelerometer

Cite this Research Publication : V. Vishwa Kiran and Dr. S. Santhanalakshmi, “Raspberry Pi based Remote Controlled Car using Smartphone Accelerometer”, in 2019 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 2019.

Publisher : 2019 International Conference on Communication and Electronics Systems (ICCES), IEEE

Year : 2018

Home automation in client-server approach with user notification along with efficient security alerting system

Cite this Research Publication : S. M. Brundha, Lakshmi, P., Dr. S. Santhanalakshmi, S.S., M., V.R., H., and S.K., N., “Home automation in client-server approach with user notification along with efficient security alerting system”, in Proceedings of the 2017 International Conference On Smart Technology for Smart Nation, SmartTechCon 2017, 2018, pp. 596-601.

Publisher : Proceedings of the 2017 International Conference On Smart Technology for Smart Nation, SmartTechCon 2017

Year : 2018

Experimental study of Diffie-Hellman key exchange algorithm on embedded devices

Cite this Research Publication : P. Deshpande, Dr. S. Santhanalakshmi, Lakshmi, P., and Vishwa, A., “Experimental study of Diffie-Hellman key exchange algorithm on embedded devices”, in 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing, ICECDS 2017, 2018, pp. 2042-2047.

Publisher : 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing, ICECDS 2017

Year : 2017

Home Automation in Client-Server approach with user notification along with efficient security Alert System

Cite this Research Publication : B. Sholaganga, Lakshmi P., and Dr. S. Santhanalakshmi, “Home Automation in Client-Server approach with user notification along with efficient security Alert System”, in International Conference On Smart Technologies For Smart Nation (SmartTechCon2017), Reva University, Bengaluru, 2017.

Publisher : International Conference On Smart Technologies For Smart Nation .

Year : 2017

Experimental study of DiffieHellmam Key Exchange Algorithm on Embedded Devices

Cite this Research Publication : P. Deshpande, Dr. S. Santhanalakshmi, and Lakshmi P., “Experimental study of DiffieHellmam Key Exchange Algorithm on Embedded Devices”, in International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS 2017) , Chennai, 2017.

Publisher : International Conference on Energy, Communication, Data Analytics and Soft Computing.

Year : 2015

Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation

Cite this Research Publication : Dr. S. Santhanalakshmi, K., S., and Patra, G. K., “Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation”, in Security in Computing and Communications, Cham, 2015.

Publisher : Security in Computing and Communications, Springer International Publishin

Year : 2015

Design and Analysis of Cryptographic Protocols using Computational Intelligence Techniques

Cite this Research Publication : Dr. S. Santhanalakshmi, Dr. K. Sangeeta Iyer, and Patra, G. K., “Design and Analysis of Cryptographic Protocols using Computational Intelligence Techniques”, in International Conference on Inter-Research-Institute Student Seminar (IRISS 2015) , ACM India Annual Event at BITS, Goa, 2015.

Publisher : International Conference on Inter-Research-Institute Student Seminar (IRISS 2015)

Year : 2012

Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation

Cite this Research Publication : S .Santhanalakshmi, Sudarshan, T. S. B., and Patra, G. K., “Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation”, in International Conference on Security in Computer Networks Distributed Systems (SNDS-2012), IITM-K Techno park at Trivandrum, 2012, vol. 335, pp. 422-431.

Publisher : CCIS-Springer link

Achievements
  • Serving as TPC for 13th ICCCNT 2021 IEEE Conference 2022: 13th International Conference on Computing Communication and Networking Technologies 2022 at IIT Kharagpur
Student Guidance

Name and Area of PhD Scholars Being Guided (Undergoing)

  • Ms. Maria John-Ai in Agriculture
  • Ms. Shyamashree Ghosh-Block chain Technology
  • Ms. E. Soumya, Ms. Ayian John-AI in Health Care
Admissions Apply Now