Color image steganography based on pixel value modification method using modulus function V Nagaraj, V Vijayalakshmi, G Zayaraz IERI Procedia 4, 17-24, 2013 | 52 | 2013 |
A modulo based LSB steganography method V Vijayalakshmi, G Zayaraz, V Nagaraj 2009 International Conference on Control, Automation, Communication and …, 2009 | 29 | 2009 |
An improved level of security for dna steganography using hyperelliptic curve cryptography P Vijayakumar, V Vijayalakshmi, G Zayaraz Wireless Personal Communications 89, 1221-1242, 2016 | 26 | 2016 |
Secure localization using elliptic curve cryptography in wireless sensor networks V Vijayalakshmi, TG Palanivelu Int’l Journal of Comp. Sciences and Netw. Security 8 (6), 255-261, 2008 | 24 | 2008 |
Lightweight cryptography algorithms for internet of things enabled networks: An overview LM Shamala, G Zayaraz, K Vivekanandan, V Vijayalakshmi Journal of Physics: Conference Series 1717 (1), 012072, 2021 | 23 | 2021 |
An effective approach for sub-acute Ischemic stroke lesion segmentation by adopting meta-heuristics feature selection technique along with hybrid Naive Bayes and sample … M Sunil Babu, V Vijayalakshmi Sensing and Imaging 20, 1-24, 2019 | 23 | 2019 |
An energy efficient secure distributed naming service for IoT C Tamizhselvan, V Vijayalakshmi International Journal of Advanced Studies of Scientific Research 3 (8), 2018 | 23 | 2018 |
Modulo Based Image Steganography Technique against Statistical and Histogram Analysis MSVN V. Vijayalakshmi, G. Zayaraz Special Issue on Network Security and Cryptography, International Journal of …, 2011 | 23* | 2011 |
Multicriteria decision analysis method for evaluation of software architectures S Vijayalakshmi, G Zayaraz, V Vijayalakshmi International Journal of Computer Applications 1 (25), 22-27, 2010 | 22 | 2010 |
DNA computing based elliptic curve cryptography P Vijayakumar, V Vijayalakshmi, G Zayaraz International Journal of Computer Applications 36 (4), 18-21, 2011 | 19 | 2011 |
Comparative study of hyperelliptic curve cryptosystem over prime field and its survey P Vijayakumar, V Vijayalakshmi, G Zayaraz International Journal of Hybrid Information Technology 7 (1), 137-146, 2014 | 18 | 2014 |
Finger and palm print based multibiometric authentication system with GUI interface V Vijayalakshmi, R Divya, K Jaganath 2013 International Conference on Communication and Signal Processing, 738-742, 2013 | 17 | 2013 |
Optimal selection of security countermeasures for effective information security R Sarala, G Zayaraz, V Vijayalakshmi Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016 | 16 | 2016 |
Increased level of security using DNA steganography P Vijayakumar, V Vijayalakshmi, R Rajashree International Journal of Advanced Intelligence Paradigms 10 (1-2), 74-82, 2018 | 13 | 2018 |
Fuzzy cognitive map-based reasoning for prediction of multi-stage attacks in risk assessment R Sarala, G Zayaraz, V Vijayalakshmi International Journal of Intelligent Engineering Informatics 4 (2), 151-167, 2016 | 13 | 2016 |
Secure antnet routing algorithm for scalable adhoc networks using elliptic curve cryptography V Vijayalakshmi, TG Palanivelu Journal of Computer Science 3 (12), 939-943, 2007 | 13 | 2007 |
SDN-MCHO: Software Define network based Multi-criterion Hysteresis Optimization based for reliable device routing in Internet of Things for the smart surveillance application C Tamizhselvan, V Vijayalakshmi Computer Communications 153, 632-640, 2020 | 11 | 2020 |
Analysis of multimodal biometric fusion based authentication techniques for network security R Divya, V Vijayalakshmi International Journal of Security and Its Applications 9 (4), 239-246, 2015 | 11 | 2015 |
Securing biometric authentication using DNA sequence and Naccache Stern Knapsack cryptosystem G Zayaraz, V Vijayalakshmi, D Jagadiswary 2009 International Conference on Control, Automation, Communication and …, 2009 | 10 | 2009 |
Effective key establishment and authentication protocol for wireless sensor networks using elliptic curve cryptography P Vijayakumar, V Vijayalakshmi Proceedings of the Conference on Mobile and Pervasive Computing (CoMPC’08 …, 2008 | 10 | 2008 |