Chandra Sekhar Akkapeddi
Chandra Sekhar Akkapeddi
Professor of mathematics, Gitam University.
Verified email at gitam.edu
Title
Cited by
Cited by
Year
Fuzzy C-Means clustering for robust decentralized load frequency control of interconnected power system with Generation Rate Constraint
KR Sudha, YB Raju, AC Sekhar
International Journal of Electrical Power & Energy Systems 37 (1), 58-66, 2012
802012
Encryption of data using elliptic curve over finite fields
DS Kumar, CH Suneetha, A Chandrasekhar
arXiv preprint arXiv:1202.1895, 2012
392012
Cryptography protection of digital signals using some recurrence relations
KR Sudha, AC Sekhar, P Prasad Reddy
International Journal of Computer Science and Network security 7 (5), 203-207, 2007
332007
• A CRYPTOGRAPHIC SCHEME OF LAPLACE TRANSFORMS
GN Lakshmi, BR Kumar
International Journal of Mathematical Archive (IJMA) 2 (12), 2012
252012
Secure key transport in symmetric cryptographic protocols using some elliptic curves over finite fields
C Suneetha, DS Kumar, A Chandrasekhar
International Journal of Computer Applications 36 (1), 2011
152011
Data Encryption technique using Random number generator
AC Sekhar, KR Sudha, PR PVGD
2007 IEEE International Conference on Granular Computing (GRC 2007), 576-576, 2007
142007
A block cipher using rotation and logical XOR operations
DS Kumar, CH Suneetha, A Chandrasekhar
arXiv preprint arXiv:1202.1898, 2012
132012
A One to one Correspondence in elliptic Curve Cryptography
PA Jyotirmie, BR Kumar, AC Sekhar, SU Devi
International Journal of Mathematical Archive-4 (3), 300-304, 2013
92013
Cryptographic Scheme for Digital Signals using Finite State Machines
BK Gandhi, AC Sekhar, S Srilakshmi
International journal of computer applications 6 (29), 61-63, 2011
82011
Encryption of Data Streams using Pauli spins ½ matrices
DS Kurmar, CH Suneetha, AC Sekhar
identity 10, 01, 2010
82010
Fast Fourier transforms and quadratic forms for digital audio watermarking
AC Sekhar, C Suneetha, G NagaLakshmi, BV RaviKumar
2009 International Conference on Advances in Recent Technologies in …, 2009
62009
On non metrizability of cone metric spaces
KPR Sastry, CS Rao, AC Sekhar, M Balaiah, A Cheyyeru
Int. J. of Mathematical Sciences and Applications 1 (3), 2011
42011
Application of mealy machine and recurrence matrices in cryptography
PA Jyotirmie, AC Sekhar, SU Devi
International Journal of Computer Science and Management Research 2 (6), 2013
22013
A Cryptographic Scheme of Finite Fields using Logical Operators
GN Lakshmi, BR Kumar, C Suneetha, A Chandra
International Journal of Computer Applications 31 (4), 1-4, 2011
22011
Encryptions of Data Streams using Pauli Spin ½ Matrices and Finite State Machine
BK Gandhi, AC Sekhar, SS Lakshmi
International Journal of Computer Applications 975, 8887, 2012
12012
A Fixed Point Theorem in Cone Metric Spaces Under Weak Contractions
KPR Sastry, CS Rao, AC Sekhar, M Balaiah
Gen 7 (2), 38-44, 2011
12011
• CRYPTOGRAPHIC SECRET SHARING SCHEME OF FINITE STATE MACHINES USING LU DECOMPOSITION
PA Jyotirmie, S Srilakshmi, AC Sekhar, SU Devi
International Journal of Mathematical Archive EISSN 2229-5046 4 (3), 2013
2013
International Journal of Mathematical Archive-4 (1), 2013, 204-211 Available online through www. ijma. info ISSN 2229–5046
SKPR SASTRY, CHS RAO, AC SEKHAR, M BALAIAH, N APPARAO
2013
A Common fixed point theorem for two self maps on a cone metric space with w-distance
KPR Sastry, CS Rao, AC Sekhar, M Balaiah
A Novel Encryption scheme based on Double Based Canonical Number System
AC Sekhar, CST Surendra, SU Devi
The system can't perform the operation now. Try again later.
Articles 1–20