Back close
Publications
A more ecient and faster pairing computation with cryptographic security

Authors : Praveen, I, Sethumadhavan, M

Publisher :Proceedings of the first international conference on security of internet of things

Publications
Rough multisets and information multi-systems

Authors : Girish, K. P., , Jacob John, S

Publisher :Advances in Decision Sciences

Publications
Linear Complexity Measures of Binary Multi-sequences

Authors : Sindhu, M, Sindhu, M, Sethumadhavan, M, Sethumadhavan, M

Publisher :International Journal of Computer Applications, 62(16), (pp. 6-10).

Publications
An Application of Vector Decom- position Problem in Public Key Cryptography Using Homomorphic Encryption

Authors : Praveen, I., Sethumadhavan, M

Publisher :proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications - ERICA 2013 (pp. 328-331).

Publications
Optimally Locating for Hiding Information in Audio Signal

Authors : Premalatha, P, Premalatha, P, Amritha, P. P, Amritha, P. P

Publisher :International Journal of Computer Applications (0975- 8887), Vol. 65, No.14,(pp. 37-42).

Publications
Counting rotation symmetric functions using Polyas theorem

Authors : Lakshmy, K. V., , Sethumadhavan, M., , Cusick, T. W

Publisher :Discrete Applied Mathematics,

Publications
On the k-error Joint Linear Complex- ity and Error Multisequence over Fq (charFq = p; prime)

Authors : Sindhu, M., & , Sethumadhavan M

Publisher :Recent Trends in Computer Networks and Distributed Systems Security (pp. 512-519). Springer Berlin Heidelberg.

Publications
On the Extensions of (k; n)-Visual Cryptographic Schemes

Authors : Praveen, K., , Rajeev, K., , Sethumadhavan, M

Publications
A Framework for Analyzing the Security of Chrome Extensions

Authors : Aravind, V., Sethumadhavan, M.

Publisher :Advanced Computing, Networking and Informatics- Volume 2 (pp. 267-272). Springer International Publishing.

Publications
Use of Machine Learning Algorithms with SIEM for Attack Prediction

Authors : Anumol, E. T

Publisher :Intelligent Computing, Communication and Devices (pp. 231-235). Springer India.

Publications
Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform

Authors : Rajeev, Chandini, , Girish, K. P

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 667-672). Springer India.

Publications
Log Analysis Based Intrusion Prediction System

Authors : Menon, R. P

Publisher :Emerging ICT for Bridging the Future Proceedings of the 49th Annual Convention of the Computer Society of India (CSI)

Admissions Apply Now