Loading...
The system can't perform the operation now. Try again later.
Citations per year
Duplicate citations
The following articles are merged in Scholar. Their
combined citations
are counted only for the first article.
Merged citations
This "Cited by" count includes citations to the following articles in Scholar. The ones marked
*
may be different from the article in the profile.
Add co-authors
Co-authors
Follow
New articles by this author
New citations to this author
New articles related to this author's research
Email address for updates
Done
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Get my own profile
Cited by
All
Since 2019
Citations
3
3
h-index
1
1
i10-index
0
0
0
2
1
2021
2022
2023
2024
1
1
1
Co-authors
Dr.Reddi Kiran Kumar
Associate Professor, Krishna University, Machilipatnam
Verified email at kru.ac.in
Bharathi Devi P
SKBR Government Degree College, Macherla
Verified email at kbncollege.ac.in
Follow
RAVINDRA PONUGUMATI
Mr P Ravindra, HoD Computer Science, KBN College(Autonomous)
Verified email at kbncollege.ac.in
Cyber Security
Articles
Cited by
Co-authors
Title
Sort
Sort by citations
Sort by year
Sort by title
Cited by
Cited by
Year
DNA Playfair Cryptosystem Based on 16× 16 Key Matrix Using DNA ASCII Table
P Bharathi Devi, R Kiran Kumar, P Ravindra
Communication Software and Networks: Proceedings of INDIA 2019, 529-538
, 2021
2
2021
Hiding information in an image using DNA cryptography
PB Devi, P Ravindra, RK Kumar
Advances in Computers 129, 173-210
, 2023
1
2023
A novel method to secure cloud data using DNA cryptography
PB Devi, P Ravindra
AIP Conference Proceedings 2796 (1)
, 2023
2023
DNA Based Security System based on DNA ASCII Table using 16x16 keymatrix
RPDP BHARATHI DEVI
Test Engineering & Management 83, 5742-5747
, 2020
2020
Operating Systems and Security
P Ravindra
International Journal of Emerging Technology in Computer Science …
, 2014
2014
LEAF OR SEED CLASSIFICATION OF A PLANT FOR IDENFICATION OF PEST USING DEEP LEARNING
P Ravindra, PB Devi
The system can't perform the operation now. Try again later.
Articles 1–6
Show more
Privacy
Terms
Help
About Scholar
Search help