Encoding and decoding of a message in the implementation of Elliptic Curve cryptography using Koblitz’s method BH Padma International Journal on Computer Science and Engineering 2 (5), 1904-1907, 2010 | 122 | 2010 |
Smart Grid communication and information technologies for cyber security, data privacy, and policy issues GVSR Kumar, AVHS Prasad, B Padma, BR Koti Elsevier, 2022 | 9 | 2022 |
A Review on Android Authentication system vulnerabilities BH Padma International Journal of Modern Trends in Engineering and Research (IJMTER …, 2016 | 8 | 2016 |
Cyber-physical, IoT, and Autonomous Systems in Industry 4.0 V Bali, V Bhatnagar, D Aggarwal, S Bali, MJ Diván CRC Press, 2021 | 5 | 2021 |
Design and analysis of an enhanced sha-1 hash generation scheme for android mobile computers B Padma, GVSR Kumar International Journal of Applied Engineering Research (IJAER) 11 (4), 2359-2363, 2016 | 3 | 2016 |
Efficient Computation of Point Multiplication in the Implementation of Elliptic Curve Cryptograph BH PADMA E-Commerce for Future &Trends, STM Journals 1 (1), 1-5, 2014 | 3 | 2014 |
A Novel Approach to Thwart Security Attacks on Mobile Pattern Authentication Systems Padma, Bh International Journal of Computer Network and Information Security 10 (5), 18, 2018 | 2 | 2018 |
PREVENTING SECURITY ATTACKS ON MOBILE PATTERN PASSWORDS. B Padma, GVS RAJKUMAR Journal of Theoretical & Applied Information Technology 96 (4), 2018 | 2 | 2018 |
Dynamic salt generation for mobile data security using elliptic curves against precomputation attacks B Padma, GVSR Kumar International Journal of Image Mining 2 (3-4), 179-194, 2017 | 2 | 2017 |
“Implementation of Optimizing point Multiplication in Elliptic Curve Cryptography using Binary Method BH Padma Journal Of Computer Science (JCS), Sep-Oct2010 4 (6), 2010 | 2 | 2010 |
Defense against frequency analysis in elliptic curve cryptography using k-means clustering B Padma, D Chandravathi, L Pratibha 2021 International Conference on Computing, Communication, and Intelligent …, 2021 | 1 | 2021 |
Selecting Plaintext in Rabin Cryptosystems Using Padding Generated by Pseudo-Random Bit Generators. BH Padma IUP Journal of Computer Sciences 6 (1), 2012 | 1 | 2012 |
A new authentication RSA homomorphic encryption technique for prime factorization-based attacks scheme using Brahmagupta Fibonacci identity for cloud data security D Chandravathi, B Padma, IS Pallavi AIP Conference Proceedings 2917 (1), 2023 | | 2023 |
DNA based pattern representation for mobile security B Padma ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES 20 (12), 3157-3167, 2021 | | 2021 |
Insurance Approval Analysis using Machine Learning Algorithms B Padma International Journal of Computer Sciences and Engineering(IJCSE) 8 (12), pp …, 2020 | | 2020 |
An Identity based Secure Pattern Authentication System Padma Bh International Journal of Recent Technology and Engineering (IJRTE) 8 (1 …, 2019 | | 2019 |
Design And Analysis of An Elliptic Curve Based Pattern Authentication System Resistant to Pre Computation Attacks B Padma GITAM University, 2019 | | 2019 |
Blum Blum Shub Pseudo-Random Number Generator for Selecting a Paintext in Rabin Cryptosystems P Bh, D Chandravathi | | |