Back close
Publications
Security, Trust and Implementation Limitations of Prominent IoT Platforms

Citation : Shiju Sathyadevan, Kalarickal, B. S., and M. K. Jinesh, “Security, Trust and Implementation Limita ...

Publisher :Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2, Advances in Intelligent Systems and Computing

Publications
Security maturity in NoSQL databases – Are they secure enough to haul the modern IT applications?

Publisher :2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015

Publications
Security incident management in ground transportation system using UAVs

Citation : Ra Reshma, Ramesh, T. Ka, and P. Sathish Kumar, “Security incident management in ground transporta ...

Publisher :2015 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2015

Publications
Security Enhancement of Handover Key Management Based on Media Access Control Address in 4G LTE Networks

Citation : Dr. Senthil Kumar M. and Krishnamoorthy, V., “Security Enhancement of Handover Key Management Base ...

Publisher :IEEE

Publications
Security Considerations in a Marine Communication Network for Fishermen

Citation : D. B. Nair, Raj Dhanesh, and Sethuraman Rao, “Security Considerations in a Marine Communication Ne ...

Publisher :AIRCC International Journal on Cybernetics Informatics(IJCI) – CNC 2015

Publications
Securing Database Server Using Homomorphic Encryption and Re-encryption

Citation : Greeshma Sarath and Jayapriya, R., “Securing Database Server Using Homomorphic Encryption and Re-e ...

Publisher :3rd International Symposium on Security in Computing and Communications, SSCC 2015, Springer International Publishing

Publications
Secured data aggregation in wireless sensor network

Publisher :International Journal of Applied Engineering Research

Publications
Secure Seed-Based Sturdy OTP via Convenient Carry-on Device

Citation : Ashok Kumar Mohan and Dr. Gireesh K. T., “Secure Seed-Based Sturdy OTP via Convenient Carry-on Dev ...

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Publications
Secure E-ticketing System Based on Mutual Authentication Using RFID

Citation : Lekshmi S. Nair, Arun, V. S., and Joseph, S., “Secure E-ticketing System Based on Mutual Authentic ...

Publisher :Proceedings of the Third International Symposium on Women in Computing and Informatics

Publications
A Secure and Efficient Location Update Scheme for Next Generation Proxy Mobile IP in Distributed Environment

Citation : Dr. Senthil Kumar M. and Anbarasi, P. N., “A Secure and Efficient Location Update Scheme for Next ...

Publisher :Elsevier

Publications
A Secure and Efficient Binding Update Scheme with Decentralized Design for Next Generation IP Mobility

Citation : Dr. Senthil Kumar M., Valarmathi, M. L., and , “A Secure and Efficient Binding Update Scheme with ...

Publisher :Springer India

Publications
Scientific Paper on Psychosocial Level of Patients Undergoing Solid Organ Transplantation at AIMS, Kochi .

Citation : Kanmani J, “Scientific Paper on Psychosocial Level of Patients Undergoing Solid Organ Transplantat ...

Publisher :National Conference on Organ Transplant - “ Together, Towards Tomorrow, AIMS, Kochi.

Admissions Apply Now