Efficient method of audio steganography by modified lsb algorithm and strong encryption key with enhanced security. R Sridevi, A Damodaram, SVL Narasimham Journal of Theoretical & Applied Information Technology 5 (6), 2009 | 131 | 2009 |
A survey on different feature extraction and classification techniques used in image steganalysis J Babu, S Rangu, P Manogna Journal of Information security 8 (03), 186, 2017 | 24 | 2017 |
IP traceback through modified probabilistic packet marking algorithm using Chinese remainder theorem Y Bhavani, V Janaki, R Sridevi Ain Shams Engineering Journal 6 (2), 715-722, 2015 | 24 | 2015 |
Image steganography combined with cryptography DR Sridevi, P Vijaya, KS Rao Council for Innovative Research Peer Review Research Publishing System …, 2013 | 21 | 2013 |
Survey on identity based and hierarchical identity based encryption schemes D Kalyani, R Sridevi International Journal of Computer Applications 134 (14), 0975-8887, 2016 | 17 | 2016 |
Mobility and security aware real-time task scheduling in fog-cloud computing for IoT devices: a fuzzy-logic approach HS Ali, R Sridevi The Computer Journal 67 (2), 782-805, 2024 | 15 | 2024 |
Mind game for cover steganography: A refuge R Amirtharajan, SD Roy, N Nesakumar, M Chandrasekar, R Sridevi, ... Res. J. Inform. Technol 5, 137-148, 2013 | 13 | 2013 |
A survey on digital forensics phases, tools and challenges S Mohammmed, R Sridevi Proceedings of the Third International Conference on Computational …, 2020 | 12 | 2020 |
A new steganalysis approach with an efficient feature selection and classification algorithms for identifying the stego images JB Guttikonda Multimedia Tools and Applications 78 (15), 21113-21131, 2019 | 12 | 2019 |
To secure the cloud application using a novel efficient deep learning-based forensic framework S Mohammed, S Rangu Journal of Interconnection Networks 24 (01), 2350008, 2024 | 11 | 2024 |
IP traceback through modified probabilistic packet marking algorithm Y Bhavani, V Janaki, R Sridevi 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), 1-5, 2013 | 10 | 2013 |
Robust distributed key issuing protocol for identity based cryptography D Kalyani, R Sridevi 2016 International Conference on Advances in Computing, Communications and …, 2016 | 9 | 2016 |
ECC algorithm & security in cloud C Nithiya, R Sridevi International Journal of Advanced Research in Computer Science & Technology …, 2016 | 8 | 2016 |
Survey on packet marking algorithms for IP traceback Y Bhavani, V Janaki, R Sridevi Oriental Journal of Computer Science and Technology 10 (2), 507-512, 2017 | 7 | 2017 |
A novel framework for secure blockchain transactions SK Shareef, R Sridevi, VR Raju, KSS Rao 2022 International Conference on Applied Artificial Intelligence and …, 2022 | 6 | 2022 |
Advanced Access Control Mechanism For Cloud Based E-Wallet NC Ravi, NB Muppalaneni, R Sridevi, V Kamakshi Prasad, A Govardhan, ... Proceeding of the International Conference on Computer Networks, Big Data …, 2020 | 6 | 2020 |
New Hierarchical Identity Based Encryption with maximum hierarchy. D Kalyani, R Sridevi Int. J. Netw. Secur. 21 (1), 40-46, 2019 | 6 | 2019 |
A survey on client side and server side approaches to secure web applications P Srivani, S Ramachandram, R Sridevi 2017 International conference of Electronics, Communication and Aerospace …, 2017 | 6 | 2017 |
Credential-based authentication mechanism for IoT devices in fog-cloud computing HS Ali, R Sridevi ICT Analysis and Applications, 307-318, 2022 | 5 | 2022 |
Private Communication Based on Hierarchical Identity-Based Cryptography D Kalyani, R Sridevi Emerging Technologies in Data Mining and Information Security: Proceedings …, 2019 | 5 | 2019 |