Scope and limitations of ethical hacking and information security CM Rakshitha 2020 International Conference on Electronics and Sustainable Communication …, 2020 | 8 | 2020 |
A review on layered architecture and application domains of blockchain technology MN Birje, RH Goudar, CM Rakshitha, MT Tapale 2022 International Conference on Electrical, Computer and Energy …, 2022 | 6 | 2022 |
A novel smart contract based blockchain with sidechain for electronic voting RC Mullegowda, N Hiremani, M Birje, NK Ramaswamy International Journal of Electrical and Computer Engineering (IJECE) 14 (1 …, 2024 | 3 | 2024 |
A survey on detection and mitigation of zombie attacks in cloud environment CM Rakshitha, BP Ashwini 2016 2nd International conference on Applied and Theoretical Computing and …, 2016 | 3 | 2016 |
Blockchain Technology Review: Consensus Mechanisms and Applications MTT Mahantesh N. Birje, R. H. Goudar, Rakshitha C. M. International Journal of Engineering Trends and Technology 71 (5), 27-39, 2023 | 2 | 2023 |
A Review on Fundamental Principles of Quantum Cryptography RKR Rakshitha C M, Nataraj K R, Nirmala Hiremani 3rd International Conference on Innovative Research and Development (ICIRD-2024), 2025 | | 2025 |
Hybrid Secure Algorithms and Optimal Blockchain to Ensure E-Voting Data Immutability at Cloud NKR Rakshitha C M, Nirmala Hiremani International Journal of Intelligent Systems and Applications in Engineering …, 2023 | | 2023 |
ZOMBIE ATTACK DETECTION AND COUNTERMEASURE SELECTION IN CLOUD ENVIRONMENT R C M TROI 2 (4), 6-10, 2016 | | 2016 |
Detection and Mitigation of Zombie Attacks in Cloud Environment R C M IJMRC 2 (3), 24-29, 2016 | | 2016 |