Year : 2020
Design of group key agreement protocol using neural key synchronization
Cite this Research Publication :
Dr. S. Santhanalakshmi, Sangeeta, K., and Patra, G. K., “Design of group key agreement protocol using neural key synchronization”, Journal of Interdisciplinary Mathematics, vol. 23, pp. 435-451, 2020.
Publisher : Journal of Interdisciplinary Mathematics, Taylor & Francis,
Year : 2017
Design of secure Cryptographic hash function using soft computing techniques
Cite this Research Publication :
Dr. S. Santhanalakshmi, Sangeeta, K., and Patra, G. K., “Design of secure Cryptographic hash function using soft computing techniques”, International Journal of Advances in Soft Computing and its Applications, vol. 9, pp. 188-203, 2017.
Publisher : International Journal of Advances in Soft Computing and its Applications, International Center for Scientific Research and Studies
Year : 2014
Secure Key Stream Generation using Computational Intelligence Techniques
Cite this Research Publication :
Dr. S. Santhanalakshmi, Dr. K. Sangeeta Iyer, and Patra, G. K., “Secure Key Stream Generation using Computational Intelligence Techniques”, Int. Journal Computer Technology & Applications, Month and Year of Publication, , vol. 5, pp. 967-972, 2014.
Publisher : Int. Journal Computer Technology Applications, Month and Year of Publication, ,
Year : 2014
Comparison of Naïve Bayes Using Different Feature Selection Techniques in Twitter Sentiment Analysis
Cite this Research Publication :
P. M.V.C, Yuganeshan, A. J., Deepthi, Y. V. S. S. N., and Dr. S. Santhanalakshmi, “Comparison of Naïve Bayes Using Different Feature Selection Techniques in Twitter Sentiment Analysis”, International Journal of Applied Engineering Research, vol. 9, 2014.
Publisher : International Journal of Applied Engineering Research
Year : 2014
Automation of Timetable Generation using Genetic Algorithm
Cite this Research Publication :
S. D. Shenoy, Sharma, V., and S .Santhanalakshmi, “Automation of Timetable Generation using Genetic Algorithm”, Int.J.Computer Technology & Applications, vol. 5, pp. 1491-1494, 2014.
Publisher : Int.J.Computer Technology Applications
Year : 2012
Design of Stream cipher for text encryption using soft computing based techniques
Cite this Research Publication :
S. Santhanalakshmi, Sangeeta, K., and Patra, G. K., “Design of Stream cipher for text encryption using soft computing based techniques”, IJCSNS International Journal of Computer Science and Network Security, vol. 12, pp. 149–152, 2012.
Publisher : IJCSNS International Journal of Computer Science and Network Security