Back close
Publications
Secure two-party computation with AES-128: Generic approach and exploiting specific properties of functions approach

Publisher :The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)

Publications
Secure Key Stream Generation using Computational Intelligence Techniques

Citation : Dr. S. Santhanalakshmi, Dr. K. Sangeeta Iyer, and Patra, G. K., “Secure Key Stream Generation usin ...

Publisher :Int. Journal Computer Technology Applications, Month and Year of Publication, ,

Publications
A Script Recognizer Independent Bi-lingual Character Recognition System for Printed English and Kannada Documents

Publisher :International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Publications
Schur convexity and concavity of Gnan mean

Citation : K. M. Nagaraja, Dr. K. Murali, and Lokrsha, V., “Schur convexity and concavity of Gnan mean”, Pr ...

Publisher :Proceedings of the Jangjeon Mathematical Society

Publications
Schemes for Providing Routing Security in MANET – A Survey

Citation : A. S. and Dr. Supriya M., “Schemes for Providing Routing Security in MANET - A Survey”, in Inter ...

Publisher :International Conference on Recent Innovations in Electrical, Electronics, Computer and Mechanical Engineering (ICRIEECME 2014)

Publications
Schemes for Providing Routing Security in Manet – A Survey

Citation :
A. C.S. and Dr. Supriya M., “Schemes for Providing Routing Security in Manet – A Survey ...

Publisher :International Journal of Advanced Computational Engineering and Networking.

Publications
A scheme for improving the effectiveness of Auscultation

Citation : K. M, K.V, P., and R.S. Geethu, “A scheme for improving the effectiveness of Auscultation”, Jour ...

Publisher :Journal of Science, Technology and management

Admissions Apply Now