Survey of consensus protocols on blockchain applications LS Sankar, M Sindhu, M Sethumadhavan 2017 4th international conference on advanced computing and communication …, 2017 | 425 | 2017 |
On blockchain applications: hyperledger fabric and ethereum P Sajana, M Sindhu, M Sethumadhavan International Journal of Pure and Applied Mathematics 118 (18), 2965-2970, 2018 | 75 | 2018 |
Hash-One: a lightweight cryptographic hash function PM Mukundan, S Manayankath, C Srinivasan, M Sethumadhavan IET Information Security 10 (5), 225 – 231, 2016 | 45 | 2016 |
Novel mutual authentication protocol for cloud computing using secret sharing and steganography K Nimmy, M Sethumadhavan The Fifth International Conference on the Applications of Digital …, 2014 | 31 | 2014 |
Blockchain for the internet of vehicles R Ramaguru, M Sindhu, M Sethumadhavan International Conference on Advances in Computing and Data Sciences, 412-423, 2019 | 23 | 2019 |
Wireless security auditing: attack vectors and mitigation strategies AK Mohan, M Sethumadhavan Procedia computer science 115, 674-682, 2017 | 20 | 2017 |
On federated and proof of validation based consensus algorithms in blockchain KN Ambili, M Sindhu, M Sethumadhavan IOP Conference Series: Materials Science and Engineering 225 (1), 012198, 2017 | 18 | 2017 |
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives: Applications and Perspectives R Santanam, M Sethumadhavan, M Virendra IGI Global, 2010 | 15 | 2010 |
Visual cryptographic schemes using combined Boolean operations K Praveen, M Sethumadhavan, R Krishnan Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 413-437, 2017 | 14 | 2017 |
On the Removal of Steganographic Content from Images. PP Amritha, M Sethumadhavan, R Krishnan Defence Science Journal 66 (6), 2016 | 13 | 2016 |
Confuzz—a concurrency fuzzer N Vinesh, M Sethumadhavan First International Conference on Sustainable Technologies for Computational …, 2020 | 12 | 2020 |
Isolating rumors using sentiment analysis V Sivasangari, AK Mohan, K Suthendran, M Sethumadhavan Journal of Cyber Security and Mobility, 181–200-181–200, 2018 | 12 | 2018 |
The art of piecewise hashing: a step toward better evidence provability A Gopalakrishnan, E Vineti, AK Mohan, M Sethumadhavan Journal of Cyber Security and Mobility 7 (1), 109-130, 2018 | 10 | 2018 |
Cube attack on stream ciphers using a modified linearity test C Srinivasan, UU Pillai, KV Lakshmy, M Sethumadhavan Journal of Discrete Mathematical Sciences and Cryptography 18 (3), 301-311, 2015 | 10 | 2015 |
Steganalysis of LSB Using Energy Function PP Amritha, M Sreedivya Muraleedharan, K Rajeev, M Sethumadhavan Intelligent Systems Technologies and Applications, 549-558, 2016 | 9 | 2016 |
Anti-forensic approach to remove stego content from images and videos PP Amritha, M Sethumadhavan, R Krishnan, SK Pal Journal of Cyber Security and Mobility, 295–320-295–320, 2019 | 8 | 2019 |
Affine equivalence of monomial rotation symmetric Boolean functions: A pólya’s theorem approach TW Cusick, KV Lakshmy, M Sethumadhavan Journal of Mathematical Cryptology 10 (3-4), 145-156, 2016 | 8 | 2016 |
On the extensions of (k, n)*-visual cryptographic schemes K Praveen, K Rajeev, M Sethumadhavan International Conference on Security in Computer Networks and Distributed …, 2014 | 8 | 2014 |
A selective generation of hybrid random numbers via android smart phones AK Mohan, N Devi, M Sethumadhavan, R Santhya Int. J. Pure Appl. Math 118 (8), 311-317, 2018 | 7 | 2018 |
Counting rotation symmetric functions using Polya’s theorem KV Lakshmy, M Sethumadhavan, TW Cusick Discrete Applied Mathematics 169, 162-167, 2014 | 7 | 2014 |