Towards the detection of phishing attacks AA Athulya, K Praveen 2020 4th international conference on trends in electronics and informatics …, 2020 | 39 | 2020 |
Visual cryptographic schemes using combined Boolean operations K Praveen, M Sethumadhavan, R Krishnan Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 413-437, 2017 | 17 | 2017 |
On the Extensions of (k, n)*-Visual Cryptographic Schemes K Praveen, K Rajeev, M Sethumadhavan Recent Trends in Computer Networks and Distributed Systems Security: Second …, 2014 | 14 | 2014 |
On the extension of XOR step construction for optimal contrast grey level visual cryptography K Praveen, M Sethumadhavan 2017 International conference on advances in computing, communications and …, 2017 | 13 | 2017 |
A distortion free relational database watermarking using patch work method R Arun, K Praveen, D Chandra Bose, HV Nath Proceedings of the International Conference on Information Systems Design …, 2012 | 13 | 2012 |
Role-based access control for encrypted data using vector decomposition D Nidhin, I Praveen, K Praveen Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016 | 10 | 2016 |
Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations P Kanakkath, S Madathil, R Krishnan Multimedia Tools and Applications 78, 1315-1344, 2019 | 9 | 2019 |
Prevention of phishing attacks using qr code safe authentication M Taraka Rama Mokshagna Teja, K Praveen Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2022 | 8 | 2022 |
Evaluation of wireless access point security and best practices for mitigation AM Thomas, GA Kumaran, R Ramaguru, R Harish, K Praveen 2021 5th International Conference on Electrical, Electronics, Communication …, 2021 | 8 | 2021 |
Ideal contrast visual cryptography for general access structures with and operation K Praveen, M Sethumadhavan Proceedings of 3rd International Conference on Advanced Computing …, 2016 | 8 | 2016 |
Zero-trust security implementation using SDP over VPN D Abhiram, R Harish, K Praveen Inventive Communication and Computational Technologies: Proceedings of …, 2022 | 7 | 2022 |
Detection and prevention of mirai attack S Das, PP Amritha, K Praveen Soft Computing and Signal Processing: Proceedings of 3rd ICSCSP 2020, Volume …, 2021 | 7 | 2021 |
Puf authentication using visual secret sharing scheme D Naveen, K Praveen 2019 5th International Conference on Advanced Computing & Communication …, 2019 | 7 | 2019 |
Fraud detection in medical insurance claim with privacy preserving data publishing in TLS-N using blockchain T Mohan, K Praveen Advances in Computing and Data Sciences: Third International Conference …, 2019 | 7 | 2019 |
Data hiding in slack space revisited RV Thampy, K Praveen, AK Mohan International Journal of Pure and Applied Mathematics 118 (18), 3017-3025, 2018 | 7 | 2018 |
Android smudge attack prevention techniques MD Amruth, K Praveen Intelligent Systems Technologies and Applications: Volume 2, 23-31, 2016 | 7 | 2016 |
Block dependency feature based classification scheme for uncalibrated image steganalysis DD Shankar, T Gireeshkumar, K Praveen, R Jithin, AS Raj Data Engineering and Management: Second International Conference, ICDEM 2010 …, 2012 | 5 | 2012 |
Application of secret sharing scheme in software watermarking KK Aiswarya, K Praveen, PP Amritha, M Sethumadhavan Information and Communication Technology for Intelligent Systems …, 2021 | 4 | 2021 |
Correlation of alerts using prerequisites and consequences for intrusion detection S Mallissery, K Praveen, S Sathar International Conference on Computational Intelligence and Information …, 2011 | 4 | 2011 |
Identifying key strategies for reconnaissance in cybersecurity V Vishnu, K Praveen Cyber Security in Intelligent Computing and Communications, 35-47, 2022 | 3 | 2022 |