关注
Dr. Praveen K
Dr. Praveen K
在 cb.amrita.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Towards the detection of phishing attacks
AA Athulya, K Praveen
2020 4th international conference on trends in electronics and informatics …, 2020
392020
Visual cryptographic schemes using combined Boolean operations
K Praveen, M Sethumadhavan, R Krishnan
Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 413-437, 2017
172017
On the Extensions of (k, n)*-Visual Cryptographic Schemes
K Praveen, K Rajeev, M Sethumadhavan
Recent Trends in Computer Networks and Distributed Systems Security: Second …, 2014
142014
On the extension of XOR step construction for optimal contrast grey level visual cryptography
K Praveen, M Sethumadhavan
2017 International conference on advances in computing, communications and …, 2017
132017
A distortion free relational database watermarking using patch work method
R Arun, K Praveen, D Chandra Bose, HV Nath
Proceedings of the International Conference on Information Systems Design …, 2012
132012
Role-based access control for encrypted data using vector decomposition
D Nidhin, I Praveen, K Praveen
Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016
102016
Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations
P Kanakkath, S Madathil, R Krishnan
Multimedia Tools and Applications 78, 1315-1344, 2019
92019
Prevention of phishing attacks using qr code safe authentication
M Taraka Rama Mokshagna Teja, K Praveen
Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2022
82022
Evaluation of wireless access point security and best practices for mitigation
AM Thomas, GA Kumaran, R Ramaguru, R Harish, K Praveen
2021 5th International Conference on Electrical, Electronics, Communication …, 2021
82021
Ideal contrast visual cryptography for general access structures with and operation
K Praveen, M Sethumadhavan
Proceedings of 3rd International Conference on Advanced Computing …, 2016
82016
Zero-trust security implementation using SDP over VPN
D Abhiram, R Harish, K Praveen
Inventive Communication and Computational Technologies: Proceedings of …, 2022
72022
Detection and prevention of mirai attack
S Das, PP Amritha, K Praveen
Soft Computing and Signal Processing: Proceedings of 3rd ICSCSP 2020, Volume …, 2021
72021
Puf authentication using visual secret sharing scheme
D Naveen, K Praveen
2019 5th International Conference on Advanced Computing & Communication …, 2019
72019
Fraud detection in medical insurance claim with privacy preserving data publishing in TLS-N using blockchain
T Mohan, K Praveen
Advances in Computing and Data Sciences: Third International Conference …, 2019
72019
Data hiding in slack space revisited
RV Thampy, K Praveen, AK Mohan
International Journal of Pure and Applied Mathematics 118 (18), 3017-3025, 2018
72018
Android smudge attack prevention techniques
MD Amruth, K Praveen
Intelligent Systems Technologies and Applications: Volume 2, 23-31, 2016
72016
Block dependency feature based classification scheme for uncalibrated image steganalysis
DD Shankar, T Gireeshkumar, K Praveen, R Jithin, AS Raj
Data Engineering and Management: Second International Conference, ICDEM 2010 …, 2012
52012
Application of secret sharing scheme in software watermarking
KK Aiswarya, K Praveen, PP Amritha, M Sethumadhavan
Information and Communication Technology for Intelligent Systems …, 2021
42021
Correlation of alerts using prerequisites and consequences for intrusion detection
S Mallissery, K Praveen, S Sathar
International Conference on Computational Intelligence and Information …, 2011
42011
Identifying key strategies for reconnaissance in cybersecurity
V Vishnu, K Praveen
Cyber Security in Intelligent Computing and Communications, 35-47, 2022
32022
系统目前无法执行此操作,请稍后再试。
文章 1–20