M Sethumadhavan
Cited by
Cited by
Survey of consensus protocols on blockchain applications
LS Sankar, M Sindhu, M Sethumadhavan
2017 4th international conference on advanced computing and communication …, 2017
On blockchain applications: hyperledger fabric and ethereum
P Sajana, M Sindhu, M Sethumadhavan
International Journal of Pure and Applied Mathematics 118 (18), 2965-2970, 2018
Hash-One: a lightweight cryptographic hash function
PM Mukundan, S Manayankath, C Srinivasan, M Sethumadhavan
IET Information Security 10 (5), 225 – 231, 2016
Novel mutual authentication protocol for cloud computing using secret sharing and steganography
K Nimmy, M Sethumadhavan
The Fifth International Conference on the Applications of Digital …, 2014
Blockchain for the internet of vehicles
R Ramaguru, M Sindhu, M Sethumadhavan
International Conference on Advances in Computing and Data Sciences, 412-423, 2019
Wireless security auditing: attack vectors and mitigation strategies
AK Mohan, M Sethumadhavan
Procedia computer science 115, 674-682, 2017
On federated and proof of validation based consensus algorithms in blockchain
KN Ambili, M Sindhu, M Sethumadhavan
IOP Conference Series: Materials Science and Engineering 225 (1), 012198, 2017
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives: Applications and Perspectives
R Santanam, M Sethumadhavan, M Virendra
IGI Global, 2010
Visual cryptographic schemes using combined Boolean operations
K Praveen, M Sethumadhavan, R Krishnan
Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 413-437, 2017
On the Removal of Steganographic Content from Images.
PP Amritha, M Sethumadhavan, R Krishnan
Defence Science Journal 66 (6), 2016
Confuzz—a concurrency fuzzer
N Vinesh, M Sethumadhavan
First International Conference on Sustainable Technologies for Computational …, 2020
Isolating rumors using sentiment analysis
V Sivasangari, AK Mohan, K Suthendran, M Sethumadhavan
Journal of Cyber Security and Mobility, 181–200-181–200, 2018
The art of piecewise hashing: a step toward better evidence provability
A Gopalakrishnan, E Vineti, AK Mohan, M Sethumadhavan
Journal of Cyber Security and Mobility 7 (1), 109-130, 2018
Cube attack on stream ciphers using a modified linearity test
C Srinivasan, UU Pillai, KV Lakshmy, M Sethumadhavan
Journal of Discrete Mathematical Sciences and Cryptography 18 (3), 301-311, 2015
Steganalysis of LSB Using Energy Function
PP Amritha, M Sreedivya Muraleedharan, K Rajeev, M Sethumadhavan
Intelligent Systems Technologies and Applications, 549-558, 2016
Anti-forensic approach to remove stego content from images and videos
PP Amritha, M Sethumadhavan, R Krishnan, SK Pal
Journal of Cyber Security and Mobility, 295–320-295–320, 2019
Affine equivalence of monomial rotation symmetric Boolean functions: A pólya’s theorem approach
TW Cusick, KV Lakshmy, M Sethumadhavan
Journal of Mathematical Cryptology 10 (3-4), 145-156, 2016
On the extensions of (k, n)*-visual cryptographic schemes
K Praveen, K Rajeev, M Sethumadhavan
International Conference on Security in Computer Networks and Distributed …, 2014
A selective generation of hybrid random numbers via android smart phones
AK Mohan, N Devi, M Sethumadhavan, R Santhya
Int. J. Pure Appl. Math 118 (8), 311-317, 2018
Counting rotation symmetric functions using Polya’s theorem
KV Lakshmy, M Sethumadhavan, TW Cusick
Discrete Applied Mathematics 169, 162-167, 2014
The system can't perform the operation now. Try again later.
Articles 1–20