Year : 2020
Implementing Vehicle Black Box System by IoT based approach
Cite this Research Publication : S. Sethuraman and Dr. S. Santhanalakshmi, “Implementing Vehicle Black Box System by IoT based approach”, in 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 2020.
Publisher : 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)
Year : 2018
Assured Privacy and Authentication of Health Data in Cloud Using Cryptographic Algorithm
Cite this Research Publication : T. R. Poojitha and Dr. S. Santhanalakshmi, “Assured Privacy and Authentication of Health Data in Cloud Using Cryptographic Algorithm”, in 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), Bangalore, India, 2018.
Publisher : 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology
Year : 2018
Raspberry Pi based Remote Controlled Car using Smartphone Accelerometer
Cite this Research Publication : V. Vishwa Kiran and Dr. S. Santhanalakshmi, “Raspberry Pi based Remote Controlled Car using Smartphone Accelerometer”, in 2019 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 2019.
Publisher : 2019 International Conference on Communication and Electronics Systems (ICCES), IEEE
Year : 2018
Home automation in client-server approach with user notification along with efficient security alerting system
Cite this Research Publication : S. M. Brundha, Lakshmi, P., Dr. S. Santhanalakshmi, S.S., M., V.R., H., and S.K., N., “Home automation in client-server approach with user notification along with efficient security alerting system”, in Proceedings of the 2017 International Conference On Smart Technology for Smart Nation, SmartTechCon 2017, 2018, pp. 596-601.
Publisher : Proceedings of the 2017 International Conference On Smart Technology for Smart Nation, SmartTechCon 2017
Year : 2018
Experimental study of Diffie-Hellman key exchange algorithm on embedded devices
Cite this Research Publication : P. Deshpande, Dr. S. Santhanalakshmi, Lakshmi, P., and Vishwa, A., “Experimental study of Diffie-Hellman key exchange algorithm on embedded devices”, in 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing, ICECDS 2017, 2018, pp. 2042-2047.
Publisher : 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing, ICECDS 2017
Year : 2017
Home Automation in Client-Server approach with user notification along with efficient security Alert System
Cite this Research Publication : B. Sholaganga, Lakshmi P., and Dr. S. Santhanalakshmi, “Home Automation in Client-Server approach with user notification along with efficient security Alert System”, in International Conference On Smart Technologies For Smart Nation (SmartTechCon2017), Reva University, Bengaluru, 2017.
Publisher : International Conference On Smart Technologies For Smart Nation .
Year : 2017
Experimental study of DiffieHellmam Key Exchange Algorithm on Embedded Devices
Cite this Research Publication : P. Deshpande, Dr. S. Santhanalakshmi, and Lakshmi P., “Experimental study of DiffieHellmam Key Exchange Algorithm on Embedded Devices”, in International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS 2017) , Chennai, 2017.
Publisher : International Conference on Energy, Communication, Data Analytics and Soft Computing.
Year : 2015
Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation
Cite this Research Publication : Dr. S. Santhanalakshmi, K., S., and Patra, G. K., “Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation”, in Security in Computing and Communications, Cham, 2015.
Publisher : Security in Computing and Communications, Springer International Publishin
Year : 2015
Design and Analysis of Cryptographic Protocols using Computational Intelligence Techniques
Cite this Research Publication : Dr. S. Santhanalakshmi, Dr. K. Sangeeta Iyer, and Patra, G. K., “Design and Analysis of Cryptographic Protocols using Computational Intelligence Techniques”, in International Conference on Inter-Research-Institute Student Seminar (IRISS 2015) , ACM India Annual Event at BITS, Goa, 2015.
Publisher : International Conference on Inter-Research-Institute Student Seminar (IRISS 2015)
Year : 2012
Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation
Cite this Research Publication : S .Santhanalakshmi, Sudarshan, T. S. B., and Patra, G. K., “Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation”, in International Conference on Security in Computer Networks Distributed Systems (SNDS-2012), IITM-K Techno park at Trivandrum, 2012, vol. 335, pp. 422-431.
Publisher : CCIS-Springer link