M Sethumadhavan
Cited by
Cited by
Survey of consensus protocols on blockchain applications
LS Sankar, M Sindhu, M Sethumadhavan
2017 4th International Conference on Advanced Computing and Communication …, 2017
Hash-One: a lightweight cryptographic hash function
PM Mukundan, S Manayankath, C Srinivasan, M Sethumadhavan
IET Information Security 10 (5), 225 – 231, 2016
On blockchain applications: Hyperledger fabric and ethereum
P Sajana, M Sindhu, M Sethumadhavan
International Journal of Pure and Applied Mathematics 118 (18), 2965-2970, 2018
Novel mutual authentication protocol for cloud computing using secret sharing and steganography
K Nimmy, M Sethumadhavan
The Fifth International Conference on the Applications of Digital …, 2014
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives: Applications and Perspectives
R Santanam, M Sethumadhavan, M Virendra
IGI Global, 2010
On federated and proof of validation based consensus algorithms in blockchain
KN Ambili, M Sindhu, M Sethumadhavan
IOP Conference Series: Materials Science and Engineering 225 (1), 012198, 2017
Visual cryptographic schemes using combined Boolean operations
K Praveen, M Sethumadhavan, R Krishnan
Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 413-437, 2017
Wireless security auditing: attack vectors and mitigation strategies
AK Mohan, M Sethumadhavan
Procedia computer science 115, 674-682, 2017
On the Removal of Steganographic Content from Images.
PP Amritha, M Sethumadhavan, R Krishnan
Defence Science Journal 66 (6), 2016
Cube attack on stream ciphers using a modified linearity test
C Srinivasan, UU Pillai, KV Lakshmy, M Sethumadhavan
Journal of Discrete Mathematical Sciences and Cryptography 18 (3), 301-311, 2015
On the extensions of (k, n)*-visual cryptographic schemes
K Praveen, K Rajeev, M Sethumadhavan
International Conference on Security in Computer Networks and Distributed …, 2014
A framework for analysing the security of chrome extensions
V Aravind, M Sethumadhavan
Advanced Computing, Networking and Informatics-Volume 2, 267-272, 2014
Measuring diffusion in stream ciphers using statistical testing methods
C Srinivasan, KV Lakshmy, M Sethumadhavan
Defence Science Journal 62 (1), 6, 2012
The Art of Piecewise Hashing: A Step Toward Better Evidence Provability
A Gopalakrishnan, E Vineti, AK Mohan, M Sethumadhavan
Journal of Cyber Security and Mobility 7 (1), 109-130, 2018
Isolating rumors using sentiment analysis
V Sivasangari, AK Mohan, K Suthendran, M Sethumadhavan
Journal of Cyber Security and Mobility 7 (1), 181-200, 2018
Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya’s theorem approach
TW Cusick, KV Lakshmy, M Sethumadhavan
Journal of Mathematical Cryptology 10 (3-4), 145-156, 2016
Counting rotation symmetric functions using Polya’s theorem
KV Lakshmy, M Sethumadhavan, TW Cusick
Discrete Applied Mathematics 169, 162-167, 2014
Analysis of algebraic attack on Trivium and minute modification to Trivium
AS Raj, C Srinivasan
International Conference on Network Security and Applications, 35-42, 2011
Opaque predicate detection by static analysis of binary executables
RKR Prakash, PP Amritha, M Sethumadhavan
International Symposium on Security in Computing and Communication, 250-258, 2017
Ideal contrast visual cryptography for general access structures with and operation
K Praveen, M Sethumadhavan
Proceedings of 3rd International Conference on Advanced Computing …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20