Follow
Dr. Praveen K
Dr. Praveen K
Verified email at cb.amrita.edu
Title
Cited by
Cited by
Year
Towards the detection of phishing attacks
AA Athulya, K Praveen
2020 4th international conference on trends in electronics and informatics …, 2020
372020
Visual cryptographic schemes using combined Boolean operations
K Praveen, M Sethumadhavan, R Krishnan
Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 413-437, 2017
172017
A distortion free relational database watermarking using patch work method
R Arun, K Praveen, D Chandra Bose, HV Nath
Proceedings of the International Conference on Information Systems Design …, 2012
132012
On the extension of XOR step construction for optimal contrast grey level visual cryptography
K Praveen, M Sethumadhavan
2017 International Conference on Advances in Computing, Communications and …, 2017
122017
On the Extensions of (k, n)*-Visual Cryptographic Schemes
K Praveen, K Rajeev, M Sethumadhavan
Recent Trends in Computer Networks and Distributed Systems Security: Second …, 2014
122014
Role-based access control for encrypted data using vector decomposition
D Nidhin, I Praveen, K Praveen
Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016
102016
Evaluation of wireless access point security and best practices for mitigation
AM Thomas, GA Kumaran, R Ramaguru, R Harish, K Praveen
2021 5th International Conference on Electrical, Electronics, Communication …, 2021
72021
Detection and prevention of mirai attack
S Das, PP Amritha, K Praveen
Soft Computing and Signal Processing: Proceedings of 3rd ICSCSP 2020, Volume …, 2021
72021
Ideal contrast visual cryptography for general access structures with and operation
K Praveen, M Sethumadhavan
Proceedings of 3rd International Conference on Advanced Computing …, 2016
72016
Prevention of Phishing Attacks Using QR Code Safe Authentication
M Taraka Rama Mokshagna Teja, K Praveen
Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2022
62022
Puf authentication using visual secret sharing scheme
D Naveen, K Praveen
2019 5th International Conference on Advanced Computing & Communication …, 2019
62019
Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations
P Kanakkath, S Madathil, R Krishnan
Multimedia Tools and Applications 78, 1315-1344, 2019
62019
Fraud detection in medical insurance claim with privacy preserving data publishing in TLS-N using blockchain
T Mohan, K Praveen
Advances in Computing and Data Sciences: Third International Conference …, 2019
62019
Data hiding in slack space revisited
RV Thampy, K Praveen, AK Mohan
International Journal of Pure and Applied Mathematics 118 (18), 3017-3025, 2018
62018
Android smudge attack prevention techniques
MD Amruth, K Praveen
Intelligent Systems Technologies and Applications: Volume 2, 23-31, 2016
62016
Zero-trust security implementation using sdp over vpn
D Abhiram, R Harish, K Praveen
Inventive Communication and Computational Technologies: Proceedings of …, 2022
52022
Block dependency feature based classification scheme for uncalibrated image steganalysis
DD Shankar, T Gireeshkumar, K Praveen, R Jithin, AS Raj
Data Engineering and Management: Second International Conference, ICDEM 2010 …, 2012
52012
Application of secret sharing scheme in software watermarking
KK Aiswarya, K Praveen, PP Amritha, M Sethumadhavan
Information and Communication Technology for Intelligent Systems …, 2021
42021
Correlation of alerts using prerequisites and consequences for intrusion detection
S Mallissery, K Praveen, S Sathar
International Conference on Computational Intelligence and Information …, 2011
42011
Role mining in distributed firewall using matrix factorization methods
A Dath, K Praveen
2020 4th International Conference on Trends in Electronics and Informatics …, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20