Cryptography with elliptic curves TN Shankar, G Sahoo International Journal of computer science and applications 2 (1), 0974-1003, 2009 | 33 | 2009 |
Fuzzy logic based forwarder selection for efficient data dissemination in VANETs SK Basha, TN Shankar Wireless Networks 27 (3), 2193-2216, 2021 | 17 | 2021 |
Volumetric medical image compression using 3D listless embedded block partitioning RK Senapati, PMK Prasad, G Swain, TN Shankar SpringerPlus 5, 1-16, 2016 | 17 | 2016 |
Using the digital signature of a fingerprint by an elliptic curve cryptosystem for enhanced authentication TN Shankar, G Sahoo, S Niranjan Information Security Journal: A Global Perspective 21 (5), 243-255, 2012 | 17 | 2012 |
Image encryption for mobile devices TN Shankar, G Sahoo, S Niranjan 2010 International Conference On Communication Control And Computing …, 2010 | 12 | 2010 |
An Efficient Cluster-Based Approach to Thwart Wormhole Attack in Adhoc Networks TNS Kollu Spurthi International Journal of Advanced Computer Science and Applications 11 (9 …, 2020 | 11 | 2020 |
Hybrid state analysis with improved firefly optimized linear congestion models of WSNs for DDOS & CRA attacks KA Basith, TN Shankar PeerJ Computer Science 8, e845, 2022 | 10 | 2022 |
Smart fire detection and surveillance system using iot N Komalapati, VC Yarra, LAV Kancharla, TN Shankar 2021 International Conference on Artificial Intelligence and Smart Systems …, 2021 | 10 | 2021 |
Cryptography by karatsuba multiplier with ASCII codes TN Shankar, G Sahoo International journal on computer applications, 53-60, 2010 | 10 | 2010 |
Hybrid Energy Efficient Secured Attribute based ZRP Aiding Authentic Data Transmission TN Shankar Journal of Scientific & Industrial Research 81 (01), 69-75, 2022 | 9 | 2022 |
A durable biometric authentication scheme via blockchain AD Dinesh, CDP Reddy, GV Gopi, R Jain, TN Shankar 2021 International Conference on Advances in Electrical, Computing …, 2021 | 9 | 2021 |
Utilization of blockchain in e-voting system G Pranitha, T Rukmini, TN Shankar, B Sah, N Kumar, S Padhy 2022 2nd International Conference on Intelligent Technologies (CONIT), 1-5, 2022 | 8 | 2022 |
Providing security to land record with the computation of iris, blockchain, and one time password TN Shankar, P Rakesh, TB Rao, LH Bharadwaj, C Rakesh, ML Madhuri 2021 International Conference on Computing, Communication, and Intelligent …, 2021 | 8 | 2021 |
Splicing forgery localisation using colour illumination inconsistencies PC Sekhar, TN Shankar International Journal of Electronic Security and Digital Forensics 13 (3 …, 2021 | 7 | 2021 |
Splicing Localization Based on Noise Level Inconsistencies in Residuals of Color Channel Differences TNSPNRL Chandrashekhar International Journal of Recent Technology and Engineering (IJRTE) 8 (3 …, 2019 | 7* | 2019 |
Induction of secure data repository in blockchain over ipfs TN Shankar, S Padhy, S Dash, MB Teja, S Yashwant 2022 6th International Conference on Trends in Electronics and Informatics …, 2022 | 6 | 2022 |
Steganographic manipulations with elliptic curve cryptography TN Shankar, G Sahoo, S Niranjan International Journal of Electronic Security and Digital Forensics 4 (4 …, 2012 | 6 | 2012 |
Digital signature of an image by elliptic curve cryptosystem TN Shankar, G Sahoo, S Niranjan Advances in Computer Science and Information Technology. Computer Science …, 2012 | 6 | 2012 |
Cryptography with ASCII codes TN Shankar, G Sahoo International Journal of Secure Digital Age Information 1 (2), 141-121, 2009 | 6 | 2009 |
Development of 6G web by Multilayer Perceptron in C-RAN for VANETs TN Shankar, S Padhy, SM Ch, H Ravella, M Varun, N Kumar 2022 IEEE Global Conference on Computing, Power and Communication …, 2022 | 5 | 2022 |