Trust based authentication technique for cluster based vehicular ad hoc networks (VANET) R Sugumar, A Rengarajan, C Jayakumar Wireless Networks 24 (2), 373-382, 2018 | 108 | 2018 |
Data hiding in encrypted images using Arnold transform MR Khanna International Conference on Algorithms, 2017 | 24 | 2017 |
A technique to stock market prediction using fuzzy clustering and artificial neural networks R Sugumar, A Rengarajan, C Jayakumar Computing and Informatics 33 (5), 992-1024, 2014 | 17 | 2014 |
Puzzle based highly secure steganography SS Shankar, A Rengarajan 2017 International Conference on Algorithms, Methodology, Models and …, 2017 | 14 | 2017 |
Video-thoracoscopic management of postpneumonectomy empyema D Galetta, L Spaggiari The Thoracic and Cardiovascular Surgeon 66 (08), 701-706, 2018 | 12 | 2018 |
Unreliable node detection by Elliptical Curve Diffe-Hellman algorithm in MANET SJJ Thangaraj, A Rengarajan Indian Journal of Science and Technology 9 (19), 1-6, 2016 | 11 | 2016 |
Delay reduction by providing location based services using hybrid cache in peer to peer networks CG Krishnan, A Rengarajan, R Manikandan KSII Transactions on Internet and Information Systems (TIIS) 9 (6), 2078-2094, 2015 | 10 | 2015 |
Extending K-anonymity to privacy preserving data mining using association rule hiding algorithm R Sugumar, A Rengarajan, M Vijayanand International Journal of Advanced Research in Computer Science and Software …, 2012 | 7 | 2012 |
The Washington Manual of Medical Therapeutics Paperback Z Crees, C Fritz, A Huedebert, J Noe, A Rengarajan, X Wang Lippincott Williams & Wilkins, 2019 | 6 | 2019 |
Comprehensive Learning on Characteristics, Applications, Issues and Limitations of Manets SJJ Thangaraj, A Rengarajan, S Selvanayaki International Journal of Innovative Technology and Exploring Engineering …, 2019 | 5 | 2019 |
DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM. A Rengarajan ICTACT Journal on Image & Video Processing 7 (1), 2016 | 4 | 2016 |
Secure verification technique for defending IP spoofing attacks. A Rengarajan, R Sugumar, C Jayakumar Int. Arab J. Inf. Technol. 13 (2), 302-309, 2016 | 4 | 2016 |
SPCACF: Secured privacy-conserving authentication scheme using cuckoo filter in VANET A Rengarajan, MM Thaha Scalable Computing: Practice and Experience 21 (1), 101-105, 2020 | 3 | 2020 |
A novel method for energy effectiveness by employing adaptive node coverage region A Rengarajan, S Rajasekaran, H Siramdasu, N Insozhan Indian Journal of Science and Technology 9 (2), 1-6, 2016 | 2 | 2016 |
Reliable Transmission with Flawless Power Proportion in Low defined signal Disseminate Systems A Rengarajan, S Rajasekaran, SJJ Thangaraj Global Journal of Pure and Applied Mathematics 11 (5), 3337-3347, 2015 | 2 | 2015 |
Video assisted thoracoscopic surgery for chronic post-pneumonic empyema: A missed opportunity? RS Jutley, A Conybeare, A Rengarajan, DA Waller Thorax 60, II31-II31, 2005 | 2 | 2005 |
Video assisted pleural decortication for empyema A Rengarajan, I Oey, S Shawkat, DA Waller THORAX-LONDON- 53, P111-P111, 1998 | 2 | 1998 |
Secure and traceable medical image sharing using enigma in cloud? R Manikandan, A Rengarajan, C Devibala, K Gayathri, T Malarvizhi Emerging Trends in Computing and Expert Technology, 816-825, 2020 | 1 | 2020 |
An Efficient Lightweight Proactive Source Routing Protocol for Handling Overhead, Packet Delivery, Throughput in MANETS A Rengarajan, S Rajasekaran, P Kumaran Computation and Communication Technologies, 27, 2016 | 1 | 2016 |
Design a Weight Based Sorting Distortion Algorithm for Privacy Preserving Data Mining R Sugumar, A Rengarajan, C Jayakumar Middle-East Journal of Scientific Research 23 (3), 405-412, 2015 | 1 | 2015 |