A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining V Radhakrishna, SA Aljawarneh, PV Kumar, V Janaki Future generation computer systems 83, 582-595, 2018 | 93 | 2018 |
5G enabled industrial internet of things (IIoT) architecture for smart manufacturing V Chandra Shekhar Rao, P Kumarswamy, MSB Phridviraj, ... Data Engineering and Communication Technology: Proceedings of ICDECT 2020 …, 2021 | 22 | 2021 |
An enhanced traffic control system for vehicles on roads using Raspberry Pi B Vijay Kumar, A Harshavardhan, K Mannan, P Kumaraswamy, ... AIP Conference Proceedings 2418 (1), 2022 | 10 | 2022 |
A New Key Authentication Scheme for Cryptosystems Based on Discrete Logarithms P.Kumaraswamy, Dr.CV Guru Rao, Dr. V. Janaki, KVTKN Prashanth Journal of Innovation in Computer Science and Engineering 5 (1), 2015 | 6 | 2015 |
Chatbot for college website GS Ramesh, G Nagaraju, V Harish, P Kumaraswamy Proceedings of International Conference on Advances in Computer Engineering …, 2021 | 5 | 2021 |
Adapting Best Path for Mobile Robot By Predicting Obstacle Size PK Ramesh Dadi, Sallauddin MD, S.N. Pasha, A. Harshavardan International Journal of Innovative Technology and Exploring Engineering 8 (9s2), 2019 | 2 | 2019 |
Key authentication scheme-based on discrete logarithms and Chinese remainder theorem P Kumaraswamy, CVG Rao, V Janaki, K Prashanth Defence Science Journal 66 (6), 590, 2016 | 2 | 2016 |
Cryptanalysis of Zuhua Shao key authentication scheme P Kumaraswamy, CVG Rao, V Janaki, K Prashanth Procedia Computer Science 78, 95-99, 2016 | 2 | 2016 |
Secure Message Authentication in Pervasive Computing PK Rajesh Mothe International Journal For Technological Research In Engineering 3 (4), 2015 | 2 | 2015 |
Hybrid Approach: Combining Classical Cryptography and QKD for Password Authentication T Tasleem, P Kumaraswamy, CVG Rao International Journal of Computer Science & Communication Networks 2 (4), 2012 | 2 | 2012 |
Smart Parking System Using Raspberry Pi BV Kumar, K Mannan, M Rajesh, D Kothandaraman, A Harshavardhan, ... International Conference on Information and Management Engineering, 243-250, 2022 | 1 | 2022 |
Demonstrate the performance of social bots in identifying the malicious bots based during communication in social media M Sruthi, S Thota, P Kumaraswamy, G Mahesh AIP Conference Proceedings 2418 (1), 2022 | 1 | 2022 |
WITHDRAWN: Public key authentication schemes in asymmetric cryptography P Kumaraswamy, V Janaki, K Srinivas Materials Today: Proceedings, 2021 | 1 | 2021 |
Crypto key protection generated from images and chaotic logistic maps K Srinivas, V Janaki, V Shankar, P KumarSwamy Advanced Informatics for Computing Research: 4th International Conference …, 2021 | 1 | 2021 |
Innovative teaching practice on “software engineering laboratory course” A Harshavardhan, D Ramesh, P Kumaraswamy, M Akarapu, B Jamalpur IOP Conference Series: Materials Science and Engineering 981 (2), 022076, 2020 | 1 | 2020 |
Caching Strategies Based on Data Density Estimation in Mobile Ad-hoc Networks B Bhaskar, D Mahesh, P Kumaraswamy, Y Nagender International Journal of Engineering & Technology 7 (1.8), 240-243, 2018 | 1 | 2018 |
A Study on an Enhanced Traffic Control System for Road Vehicles Using Raspberry Pi BV Kumar, A Harshavardhan, P Kumaraswamy, K Sangameshwar, ... BP International, 2023 | | 2023 |
Security architecture models used in online banking P Kumaraswamy, M Shashikala, M Sruthi, BV Kumar, G Nagaraju AIP Conference Proceedings 2418 (1), 2022 | | 2022 |
Applications of Public Key Cryptography and Functioning Process BB P.Kumaraswamy, Dr.C.V.Guru Rao, Dr.V.Janaki International Journal of Innovative Technology and Exploring Engineering 8 …, 2019 | | 2019 |
Dynamic key acknowledgement quick recoverable auditing in cloud resourceful system PK D. Preethi International Journal of Pure and Applied Mathematics 120 (6), 115-124, 2018 | | 2018 |