Survey of consensus protocols on blockchain applications LS Sankar, M Sindhu, M Sethumadhavan 2017 4th international conference on advanced computing and communication …, 2017 | 701 | 2017 |
On blockchain applications: hyperledger fabric and ethereum P Sajana, M Sindhu, M Sethumadhavan International Journal of Pure and Applied Mathematics 118 (18), 2965-2970, 2018 | 123 | 2018 |
Hash-One: a lightweight cryptographic hash function PM Mukundan, S Manayankath, C Srinivasan, M Sethumadhavan IET Information Security 10 (5), 225 – 231, 2016 | 62 | 2016 |
Novel mutual authentication protocol for cloud computing using secret sharing and steganography K Nimmy, M Sethumadhavan The Fifth International Conference on the Applications of Digital …, 2014 | 38 | 2014 |
Blockchain for the internet of vehicles R Ramaguru, M Sindhu, M Sethumadhavan Advances in Computing and Data Sciences: Third International Conference …, 2019 | 35 | 2019 |
Isolating rumors using sentiment analysis V Sivasangari, AK Mohan, K Suthendran, M Sethumadhavan Journal of Cyber Security and Mobility, 181-200, 2018 | 30 | 2018 |
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives: Applications and Perspectives R Santanam, M Sethumadhavan, M Virendra IGI Global, 2010 | 29 | 2010 |
Confuzz—a concurrency fuzzer N Vinesh, M Sethumadhavan First International Conference on Sustainable Technologies for Computational …, 2020 | 28 | 2020 |
On federated and proof of validation based consensus algorithms in blockchain KN Ambili, M Sindhu, M Sethumadhavan IOP conference series: materials science and engineering 225 (1), 012198, 2017 | 26 | 2017 |
Wireless security auditing: attack vectors and mitigation strategies AK Mohan, M Sethumadhavan Procedia computer science 115, 674-682, 2017 | 25 | 2017 |
Anti-forensic approach to remove stego content from images and videos PP Amritha, M Sethumadhavan, R Krishnan, SK Pal Journal of Cyber Security and Mobility, 295-320, 2019 | 20 | 2019 |
On the Removal of Steganographic Content from Images. PP Amritha, M Sethumadhavan, R Krishnan Defence Science Journal 66 (6), 2016 | 20 | 2016 |
Medical records management using distributed ledger and storage S Anjum, R Ramaguru, M Sethumadhavan International conference on advances in computing and data sciences, 52-62, 2021 | 17 | 2021 |
Visual cryptographic schemes using combined Boolean operations K Praveen, M Sethumadhavan, R Krishnan Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 413-437, 2017 | 17 | 2017 |
Distributed identity and verifiable claims using Ethereum standards AM Thomas, R Ramaguru, M Sethumadhavan Inventive Communication and Computational Technologies: Proceedings of …, 2022 | 15 | 2022 |
A framework for analysing the security of chrome extensions V Aravind, M Sethumadhavan Advanced Computing, Networking and Informatics-Volume 2: Wireless Networks …, 2014 | 15 | 2014 |
On the extension of XOR step construction for optimal contrast grey level visual cryptography K Praveen, M Sethumadhavan 2017 International conference on advances in computing, communications and …, 2017 | 14 | 2017 |
On the Extensions of (k, n)*-Visual Cryptographic Schemes K Praveen, K Rajeev, M Sethumadhavan Recent Trends in Computer Networks and Distributed Systems Security: Second …, 2014 | 14 | 2014 |
Cube attack on stream ciphers using a modified linearity test C Srinivasan, UU Pillai, KV Lakshmy, M Sethumadhavan Journal of Discrete Mathematical Sciences and Cryptography 18 (3), 301-311, 2015 | 13 | 2015 |
Steganalysis of LSB using energy function PP Amritha, M Sreedivya Muraleedharan, K Rajeev, M Sethumadhavan Intelligent Systems Technologies and Applications: Volume 1, 549-558, 2016 | 12 | 2016 |