An expressive and provably secure ciphertext-policy attribute-based encryption A Balu, K Kuppusamy Information Sciences 276, 354-362, 2014 | 87 | 2014 |
Ciphertext policy Attribute based Encryption with anonymous access policy A Balu, K Kuppusamy arXiv preprint arXiv:1011.0527, 2010 | 30 | 2010 |
IoT sensor-based smart agricultural system J Mahalakshmi, K Kuppusamy, C Kaleeswari, P Maheswari Emerging Technologies for Agriculture and Environment: Select Proceedings of …, 2020 | 24 | 2020 |
Prevention of DDOS attacks using new cracking algorithm V Priyadharshini, K Kuppusamy International Journal of Engineering Research and Applications 2 (3), 2263-2267, 2012 | 24 | 2012 |
Efficient steganography method to implement selected least significant bits in spatial domain SS Priya, K Mahesh, DK Kuppusamy International Journal of Engineering Research and Applications,, Vol2, 2632-2637, 2012 | 24* | 2012 |
Optimized image watermarking scheme based on PSO K Kuppusamy, K Thamodaran Procedia Engineering 38, 493-503, 2012 | 22 | 2012 |
System and methodology for unknown malware attack S Murugan, K Kuppusamy International Conference on Sustainable Energy and Intelligent Systems …, 2011 | 22 | 2011 |
A brief review on cloud security scenarios C Kaleeswari, P Maheswari, K Kuppusamy, M Jeyabalu International Journal of Scientific Research in Science and Technology 4 (5 …, 2018 | 18 | 2018 |
Fault detection and test minimization methods for combinational circuits—A survey SM Thamarai, K Kuppusamy, T Meyyappan International Journal of Computer Trends and Technology 2 (2), 140-146, 2011 | 17 | 2011 |
Privacy preserving ciphertext policy attribute based encryption A Balu, K Kuppusamy Recent Trends in Network Security and Applications: Third International …, 2010 | 17 | 2010 |
Optimized partial image encryption scheme using PSO K Kuppusamy, K Thamodaran International Conference on Pattern Recognition, Informatics and Medical …, 2012 | 15 | 2012 |
Fractal image compression & algorithmic techniques K Kuppusamy, R Ilackiya International Journal of Computer & Organization Trends 3 (4), 2013 | 13 | 2013 |
Ciphertext-policy attribute-based encryption with user revocation support A Balu, K Kuppusamy Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th …, 2013 | 12 | 2013 |
A new image compression algorithm using haar wavelet transformation R Mehala, K Kuppusamy International Journal of Computer Applications 975, 8887, 2013 | 12 | 2013 |
Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function B Rahul, K Kuppusamy, A Senthilrajan Optik 289, 171253, 2023 | 11 | 2023 |
An efficient image encryption method based on improved cipher block chaining in cloud computing as a security service J Mahalakshmi, K Kuppusamy Australian Journal of Basic and Applied Sciences 10 (2), 297-306, 2016 | 11 | 2016 |
Analyzing Image Quality via Color Spaces K Shankar, K Mahesh, K Kuppusamy image. In 1 (1), 2014 | 11 | 2014 |
A study of audio captcha and their limitations K Aiswarya, KS Kuppusamy International Journal of Science and Research 4 (5895), 918-923, 2015 | 10 | 2015 |
A new hybrid video segmentation algorithm using fuzzy c means clustering K Mahesh, K Kuppusamy International Journal of Computer Science Issues (IJCSI) 9 (2), 229, 2012 | 9 | 2012 |
Video segmentation using hybrid segmentation method K Mahesh, K Kuppusamy European Journal of Scientific Research 71 (3), 312-326, 2012 | 9 | 2012 |