Quantum cryptography and quantum key distribution protocols: A survey V Padamvathi, BV Vardhan, AVN Krishna 2016 IEEE 6th international conference on advanced computing (IACC), 556-562, 2016 | 78 | 2016 |
New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks KA Kumar, AVN Krishna, KS Chatrapati Journal of Information and Optimization Sciences 38 (2), 341-365, 2017 | 52 | 2017 |
A modified hill cipher based on circulant matrices KA Reddy, B Vishnuvardhan, AVN Krishna Procedia Technology 4, 114-118, 2012 | 49 | 2012 |
A generalized scheme for data encryption technique using a randomized matrix key AVN Krishna, SNN Pandit, AV Babu Journal of Discrete Mathematical Sciences and Cryptography 10 (1), 73-81, 2007 | 35 | 2007 |
A new Algorithm in Network Security for data transmission AVN Krishna, SNN Pandit Acharya Nagarjuna International Journal of Mathematics and Information …, 2004 | 18 | 2004 |
A study on the effect of Canny edge detection on downscaled images YW Kim, AVN Krishna Pattern Recognition and Image Analysis 30, 372-381, 2020 | 17 | 2020 |
Portrait segmentation using ensemble of heterogeneous deep-learning models YW Kim, YC Byun, AVN Krishna Entropy 23 (2), 197, 2021 | 16 | 2021 |
Window method based cubic spline curve public key cryptography AVN Krishna, AH Narayana, KM Vani International Journal of Electronics and Information Engineering 4 (2), 94-102, 2016 | 15 | 2016 |
Web and network communication security algorithms AVN Krishna, BV Vardhan, MP Roy, AV Babu i-Manager's Journal on Software Engineering 1 (1), 12, 2006 | 15 | 2006 |
A new algorithm in network security AVN Krishna International Conference Proc. Of CISTM-05, 24-26, 2005 | 14 | 2005 |
A novel approach with matrix based public key crypto systems AVN Krishna, AH Narayana, K Madhura Vani Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 407-412, 2017 | 13 | 2017 |
A modified Hill cipher using randomized approach AVN Krishna, K Madhuravani International Journal of Computer Network and Information Security 4 (5), 56-62, 2012 | 13 | 2012 |
Pipeline Data Compression and Encryption Techniques in E-Learning environment. AVN Krishna, AV Babu Journal of Theoretical & Applied Information Technology 3 (1), 2007 | 13 | 2007 |
Crime analysis and forecasting on spatio temporal news feed data—an indian context BR Prathap, AVN Krishna, K Balachandran Artificial intelligence and blockchain for future cybersecurity applications …, 2021 | 12 | 2021 |
Employing deep learning in intraday stock trading G Taroon, A Tomar, C Manjunath, M Balamurugan, B Ghosh, ... 2020 Fifth International Conference on Research in Computational …, 2020 | 12 | 2020 |
Congestion control in heterogeneous wireless sensor networks for high-quality data transmission K Anil Kumar, AVN Krishna, K Shahu Chatrapati Proceedings of the International Congress on Information and Communication …, 2016 | 12 | 2016 |
Probabilistic encryption based ECC mechanism AVN Krishna International Journal of Advancements in Technology, http://ijict. org, ISSN …, 2011 | 12 | 2011 |
A big–data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography AVN Krishna Journal of information and optimization sciences 39 (6), 1387-1399, 2018 | 10 | 2018 |
Fully homomorphic encryption with matrix based digital signature standard AVN Krishna, AH Narayana, K Madhura Vani Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 439-444, 2017 | 10 | 2017 |
A modified hill cipher algorithm for encryption of data in data transmission AVN Krishna, BA Vinaya Computer Sciences and Telecommunications, 78-83, 2007 | 10 | 2007 |