Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm MI REDDY procedia computer science 85, 62-69, 2016 | 50 | 2016 |
Image compression techniques by using wavelet transform VVS Kumar, MIS Reddy Journal of information engineering and applications 2 (5), 35-39, 2012 | 44 | 2012 |
A secured cryptographic system based on DNA and a hybrid key generation approach MI Reddy, APS Kumar, KS Reddy Biosystems 197, 104207, 2020 | 29 | 2020 |
A practical approach for secured data transmission using wavelet based steganography and cryptography MIS Reddy, VU Kumar, KS Reddy International Journal of Computer Applications 67 (10), 2013 | 5 | 2013 |
Key Distillation Process on Quantum Cryptography Protocols in Network Security MIS Reddy International Journal of Advanced Research in Computer Science and Software …, 2012 | 5 | 2012 |
Secured Data Transmission using Wavelet based Steganography and Cryptography MIS Reddy, KS Reddy, VU Kumar International Journal of Computers and Technology 6 (2), 311-316, 2013 | 3 | 2013 |
A practical approach for implementation of public key infrastructure for digital signatures MIS Reddy, PBR Chetwavani, KS Reddy J Inf Eng Appl 1 (2), 29-38, 2011 | 3 | 2011 |
An efficient data transmission approach using IAES-BE APSK M. Indrasena Reddy Cluster Computing 23 (3), 1633-1645, 2020 | 2 | 2020 |
A MODIFIED ADVANCED ENCRYPTION STANDARD ALGORITHM APSKR M. Indrasena Reddy1 JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES 5, 333-341, 2020 | 2* | 2020 |
A SECURE APPROACH FOR DATA TRANSMISSION IN COMPUTER NETWORKS USING MODIFIED ADVANCED ENCRYPTION STANDARD ALGORITHM APSK M. Indrasena Reddy Journal of mechanics of continua and mathematical sciences 3 (3), 14-28, 2019 | 2* | 2019 |
Different Medias of Steganography-An Emerging Field of Network Security MIS Reddy, MP Reddy, KS Reddy International Journal of Computer Science and Information Technologies …, 2012 | 2 | 2012 |
Host based information gathering honeypots for network security MP Reddy, KS Reddy, MIS Reddy, G Sreenivasulu Board, 369, 0 | 2 | |
Encryption with access policy and cloud data selection for secure and energy-efficient cloud computing MI Reddy, PV Rao, TS Kumar, SR K Multimedia Tools and Applications 83 (6), 15649-15675, 2024 | 1 | 2024 |
Wireless Application Protocol for Potential Threats to Mobile Agent Network Security MIS Reddy, KS Reddy, PJ Bhatt, R Chetwani Journal of Electronic science and Technology 10 (3), 215-219, 2012 | 1 | 2012 |
Improved elliptical curve cryptography and chaotic mapping with fruitfly optimization algorithm for secure data transmission MI Reddy, MP Reddy, RO Reddy, A Praveen Wireless Networks, 1-14, 2023 | | 2023 |
An efficient SMS classification system for disaster response KS Reddy, MI Reddy, B Rakesh, KB Ram AIP Conference Proceedings 2754 (1), 2023 | | 2023 |
OCR-LSTM: An Efficient Number Plate Detection System MI Reddy LNNS 494, 2022 | | 2022 |
Data Structures Lab Manual USING C MI REDDY LAMBERT ACADEMIC PUBLISHERS, 2020 | | 2020 |
Design and Implementation of High Security Cryptography for Network Applications by Using Bit Transition Encoder and Decoder APSK M. Indrasena Reddy IJEAT 8 (6), 4476-4483, 2019 | | 2019 |
A Practical Approach for Emails Multiclass Classification according to Senders using Naïve Bayers Technique MISR G. Girija Rani IJCA 144 (6), 34-38, 2016 | | 2016 |