2014C1  |
Praveen K., Sethumadhavan M. (2014) A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images. In: Kumar Kundu M., Mohapatra D., Konar A., Chakraborty A. (eds) Advanced Computing, Networking and Informatics Volume 2. Smart Innovation, Systems and Technologies, Vol. 28, pp. 225-231. Springer, Cham. |
2014C2  |
Aravind V., Sethumadhavan M. (2014) A Framework for Analysing the Security of Chrome Extensions. In: Kumar Kundu M., Mohapatra D., Konar A., Chakraborty A. (eds) Advanced Computing, Networking and Informatics - Volume 2. Smart Innovation, Systems and Technologies, Vol. 28, pp. 267-272. Springer, Cham. |
2014C3  |
Praveen K., Sethumadhavan M. (2014) Results on (2, n) Visual Cryptographic Scheme. In: Mauri J.L., Thampi S.M., Rawat D.B., Jin D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, Vol. 467, pp. 335-340. Springer, Berlin, Heidelberg. |
2014C4  |
Praveen K., Rajeev K., Sethumadhavan M. (2014) On the Extensions of (k, n)*-Visual Cryptographic Schemes. In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, Vol. 420, pp. 231-238. Springer, Berlin, Heidelberg. |
2014C5  |
Reno Robert R. (2014) Differential Execution Analysis for Obfuscation Reduction. In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, Vol. 420, pp. 358-369. Springer, Berlin, Heidelberg. |
2014C6  |
Pandian V.A., Kumar T.G. (2014) A Novel Cloud Based NIDPS for Smartphones. In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, Vol. 420, pp. 473-484. Springer, Berlin, Heidelberg. |
2014C7  |
Sindhu M., Sethumadhavan M. (2014) On the k-error Joint Linear Complexity and Error Multisequence over Fq(charFq = p, prime). In: Martínez Pérez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, Vol. 420, pp. 512-519. Springer, Berlin, Heidelberg. |
2014C8  |
Nimmy, K., & Sethumadhavan, M. (2014). Novel mutual authentication protocol for cloud computing using secret sharing and steganography. In The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014). pp. 101-106. IEEE. |
2014C9  |
C. V. Amruth and P. P. Amritha. (2014). Multi-Level Steganography for Smart phones. 2014 First International Conference on Networks & Soft Computing (ICNSC2014), pp. 81-84. |