Follow
Amutha Prabakar
Amutha Prabakar
Associate Professor, Vellore Institute Technology, Vellore
Verified email at vit.ac.in
Title
Cited by
Cited by
Year
Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithm
AP Muniyandi, R Rajeswari, R Rajaram
Procedia Engineering 30, 174-182, 2012
3332012
An Efficient Password Authentication Scheme for Smart Card.
R Ramasamy, AP Muniyandi
Int. J. Netw. Secur. 14 (3), 180-186, 2012
672012
An efficient technique for preventing SQL injection attack using pattern matching algorithm
MA Prabakar, M KarthiKeyan, K Marimuthu
2013 IEEE international conference on emerging trends in computing …, 2013
632013
New Remote Mutual Authentication Scheme using Smart Cards.
R Ramasamy, AP Muniyandi
Trans. Data Priv. 2 (2), 141-152, 2009
432009
Knapsack based ECC encryption and decryption.
RR Ramasamy, MA Prabakar, MI Devi, M Suguna
Int. J. Netw. Secur. 9 (3), 218-226, 2009
352009
Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review
SA Sheik, AP Muniyandi
Cyber Security and Applications 1, 100002, 2023
262023
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC.
RR Ramasamy, MA Prabakar
Int. J. Netw. Secur. 12 (1), 7-12, 2011
202011
Dependable and provable secure two-factor mutual authentication scheme using ECC for IoT-based telecare medical information system
N Radhakrishnan, AP Muniyandi
Journal of Healthcare Engineering 2022, 2022
192022
Password based remote authentication scheme using ECC for smart card
AP Muniyandi, R Ramasamy, Indrani
Proceedings of the 2011 International Conference on Communication, Computing …, 2011
122011
A supervised learning approach for criminal identification using similarity measures and K-Medoids clustering
ST Bharathi, B Indrani, MA Prabakar
2017 International Conference on Intelligent Computing, Instrumentation and …, 2017
82017
Knapsack based ECC encryption and decryption
R Rajaram Ramasamy, M Amutha Prabakar, M Indra Devi, M Suguna
International Journal of Network Security 9 (3), 218-226, 2009
72009
A new algorithm for encryption/decryption for field applications
R Ramasamy, AP Muniyandi, I Devi
Computer Standards & Interfaces 31 (6), 1069-1072, 2009
52009
WITHDRAWN: Sports activity recognition using classification techniques
R Balamurugan, NN Prasanth, MA Prabakar, KV Devi
Materials Today: Proceedings, 2021
42021
Computing the Modular Inverse of a Polynomial Function over GF (2P) Using Bit Wise Operation.
R Ramasamy, AP Muniyandi
Int. J. Netw. Secur. 10 (2), 107-113, 2010
42010
An efficient technique for preventing SQL Injection attack using pattern matching algorithm
M Amutha Prabakar, M KarthiKeyan, K Marimuthu
IEEE, 2013
32013
Knapsack based ECC for digital signature authentication
R Rajaram, M Amutha Prabakar, M Indra Devi
International Journal of Communication Networks and Distributed Systems 3 (4 …, 2009
22009
Renewable Energy Sources for Modern Agricultural Trends
S Arulvel, TJ Devadas, DDW Rufuss, MA Prabakar
Cloud IoT Systems for Smart Agricultural Engineering, 223-242, 2022
12022
A Detailed Analysis of Intruders’ Activities in the Network Through the Real-Time Virtual Honeynet Experimentation
R Ganesarathinam, MA Prabakar, M Singaravelu, AL Fernandez
Artificial Intelligence and Evolutionary Computations in Engineering Systems …, 2020
12020
An efficient and provably secure authentication scheme based on elliptic curve signature using a smart card
SA Sheik, MA Prabakar
International Journal of Information and Computer Security 16 (3-4), 207-225, 2021
2021
Robust and provable secure three-factor mutual authentication scheme using a smart card
R Niranchana, MA Prabakar
International Journal of Internet Technology and Secured Transactions 11 (5 …, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20