Follow
Amutha Prabakar
Amutha Prabakar
Associate Professor, Vellore Institute Technology, Vellore
Verified email at vit.ac.in
Title
Cited by
Cited by
Year
Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithm
AP Muniyandi, R Rajeswari, R Rajaram
Procedia Engineering 30, 174-182, 2012
2712012
An Efficient Password Authentication Scheme for Smart Card.
R Ramasamy, AP Muniyandi
Int. J. Netw. Secur. 14 (3), 180-186, 2012
632012
An efficient technique for preventing SQL injection attack using pattern matching algorithm
MA Prabakar, M KarthiKeyan, K Marimuthu
2013 IEEE international conference on emerging trends in computing …, 2013
552013
New Remote Mutual Authentication Scheme using Smart Cards.
R Ramasamy, AP Muniyandi
Trans. Data Priv. 2 (2), 141-152, 2009
412009
Knapsack based ECC encryption and decryption.
RR Ramasamy, MA Prabakar, MI Devi, M Suguna
Int. J. Netw. Secur. 9 (3), 218-226, 2009
332009
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC.
RR Ramasamy, MA Prabakar
Int. J. Netw. Secur. 12 (1), 7-12, 2011
192011
Password based remote authentication scheme using ECC for smart card
AP Muniyandi, R Ramasamy
Proceedings of the 2011 International Conference on Communication, Computing …, 2011
122011
Knapsack based ECC encryption and decryption
R Rajaram Ramasamy, M Amutha Prabakar, M Indra Devi, M Suguna
International Journal of Network Security 9 (3), 218-226, 2009
72009
A supervised learning approach for criminal identification using similarity measures and K-Medoids clustering
ST Bharathi, B Indrani, MA Prabakar
2017 International Conference on Intelligent Computing, Instrumentation and …, 2017
52017
A new algorithm for encryption/decryption for field applications
R Ramasamy, AP Muniyandi, I Devi
Computer Standards & Interfaces 31 (6), 1069-1072, 2009
52009
Computing the Modular Inverse of a Polynomial Function over GF (2P) Using Bit Wise Operation.
R Ramasamy, AP Muniyandi
Int. J. Netw. Secur. 10 (2), 107-113, 2010
42010
An efficient technique for preventing SQL Injection attack using pattern matching algorithm
M Amutha Prabakar, M KarthiKeyan, K Marimuthu
IEEE, 2013
32013
Knapsack based ECC for digital signature authentication
R Rajaram, M Amutha Prabakar, M Indra Devi
International Journal of Communication Networks and Distributed Systems 3 (4 …, 2009
22009
Dependable and Provable Secure Two-Factor Mutual Authentication Scheme Using ECC for IoT-Based Telecare Medical Information System
N Radhakrishnan, AP Muniyandi
Journal of Healthcare Engineering 2022, 2022
12022
Sports activity recognition using classification techniques
R Balamurugan, NN Prasanth, MA Prabakar, KV Devi
Materials Today: Proceedings, 2021
12021
Renewable Energy Sources for Modern Agricultural Trends
S Arulvel, TJ Devadas, DDW Rufuss, MA Prabakar
Cloud IoT Systems for Smart Agricultural Engineering, 223-242, 2022
2022
An efficient and provably secure authentication scheme based on elliptic curve signature using a smart card
SA Sheik, MA Prabakar
International Journal of Information and Computer Security 16 (3-4), 207-225, 2021
2021
Robust and provable secure three-factor mutual authentication scheme using a smart card
R Niranchana, MA Prabakar
International Journal of Internet Technology and Secured Transactions 11 (5 …, 2021
2021
A Detailed Analysis of Intruders’ Activities in the Network Through the Real-Time Virtual Honeynet Experimentation
R Ganesarathinam, MA Prabakar, M Singaravelu, AL Fernandez
Artificial Intelligence and Evolutionary Computations in Engineering Systems …, 2020
2020
PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
MA PRABAKAR, B INDRANI, MK VENI
Cryptology ePrint Archive, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20