Skip to content

Latest commit

 

History

History
41 lines (31 loc) · 6.5 KB

File metadata and controls

41 lines (31 loc) · 6.5 KB

Amrita TIFAC-CYBER

Year 2014

Patents

ID Details
2014P1 Mukil Rajeev, & Jevitha K. P. (2014). HTTP Proxy Based Solution for Mitigating Cross-Site Scripting and SQL Injection Vulnerabilities.
2014P2 Ashok Kumar Mohan, & Gireesh Kumar, T. (2014). Secured Communication for Sturdy-OTP.

Scopus-Indexed Conference Proceedings

ID Publication Details
2014C1
Praveen K., Sethumadhavan M. (2014) A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images. In: Kumar Kundu M., Mohapatra D., Konar A., Chakraborty A. (eds) Advanced Computing, Networking and Informatics Volume 2. Smart Innovation, Systems and Technologies, Vol. 28, pp. 225-231. Springer, Cham.
2014C2
Aravind V., Sethumadhavan M. (2014) A Framework for Analysing the Security of Chrome Extensions. In: Kumar Kundu M., Mohapatra D., Konar A., Chakraborty A. (eds) Advanced Computing, Networking and Informatics - Volume 2. Smart Innovation, Systems and Technologies, Vol. 28, pp. 267-272. Springer, Cham.
2014C3
Praveen K., Sethumadhavan M. (2014) Results on (2, n) Visual Cryptographic Scheme. In: Mauri J.L., Thampi S.M., Rawat D.B., Jin D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, Vol. 467, pp. 335-340. Springer, Berlin, Heidelberg.
2014C4
Praveen K., Rajeev K., Sethumadhavan M. (2014) On the Extensions of (k, n)*-Visual Cryptographic Schemes. In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, Vol. 420, pp. 231-238. Springer, Berlin, Heidelberg.
2014C5
Reno Robert R. (2014) Differential Execution Analysis for Obfuscation Reduction. In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, Vol. 420, pp. 358-369. Springer, Berlin, Heidelberg.
2014C6

Pandian V.A., Kumar T.G. (2014) A Novel Cloud Based NIDPS for Smartphones. In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, Vol. 420, pp. 473-484. Springer, Berlin, Heidelberg.
2014C7
Sindhu M., Sethumadhavan M. (2014) On the k-error Joint Linear Complexity and Error Multisequence over Fq(charFq = p, prime). In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, Vol. 420, pp. 512-519. Springer, Berlin, Heidelberg.
2014C8

Nimmy, K., & Sethumadhavan, M. (2014). Novel mutual authentication protocol for cloud computing using secret sharing and steganography. In The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014). pp. 101-106. IEEE.
2014C9
C. V. Amruth and P. P. Amritha. (2014). Multi-Level Steganography for Smart phones. 2014 First International Conference on Networks & Soft Computing (ICNSC2014), pp. 81-84.

Scopus-Indexed Journal Publications

ID Publication Details
2014J1
Lakshmy, K. V., Sethumadhavan, M., & Cusick, T. W. (2014). Counting rotation symmetric functions using Polya’s theorem. Discrete Applied Mathematics, Vol. 169, pp.162-167.