Follow
Greeshma Sarath
Greeshma Sarath
Verified email at am.amrita.edu
Title
Cited by
Cited by
Year
Securing land registration using blockchain
S Krishnapriya, G Sarath
Procedia Computer Science 171, 1708-1715, 2020
712020
A survey on elliptic curve digital signature algorithm and its variants
G Sarath, DC Jinwala, S Patel
Computer Science & Information Technology (CS & IT)–CSCP, 121-136, 2014
222014
A Novel Approach for Preserving Numerical Ordering in Encrypted Data
B Venugopal, G Sarath
Information Technology (ICIT), 2016 International Conference on Information …, 2016
92016
Securing database server using homomorphic encryption and re-encryption
S Greeshma, R Jayapriya
Security in Computing and Communications: Third International Symposium …, 2015
92015
Privacy preservation and content protection in location based queries
G Sarath, ML SH
2015 Eighth International Conference on Contemporary Computing (IC3), 325-330, 2015
72015
UltraLightweight MAC protocol for RFID security using Permutation with double rotation
RG Krishna, G Sarath
2017 International Conference on Technological Advancements in Power and …, 2017
52017
A hybrid proof based consensus algorithm for permission less blockchain
A Suresh, AR Nair, A Lal, G Sarath
2020 Second International Conference on Inventive Research in Computing …, 2020
42020
IoT based device for fertility monitoring
R Prasannan, G Sarath
2020 5th International Conference on Communication and Electronics Systems …, 2020
42020
Inference detection in statistical database using frequent pattern
KN Aravind, A Anand, G Sarath
2017 International Conference on Communication and Signal Processing (ICCSP …, 2017
42017
Forensic sketch to real image using dcgan
S Devakumar, G Sarath
Procedia Computer Science 218, 1612-1620, 2023
32023
Wheat Head Detection using YOLO: A Comparative Study
NS Kumar, S Stephi, R Meenakshi, G Sarath
2022 International Conference on Automation, Computing and Renewable Systems …, 2022
32022
A trust network driven user authorization scheme for social cloud
SP Susan, G Sarath
Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th …, 2019
32019
A Skill Based Image Grid Authentication Scheme
D Walte, G Sarath
2018 Fourth International Conference on Computing Communication Control and …, 2018
32018
Finding a Trustworthy Service Provider in Online Service Oriented Trust Network
RR Reghu, G Sarath
2018 International Conference on Data Science and Engineering (ICDSE), 1-5, 2018
32018
ESEC: An Ideal Secret Sharing Scheme
G Sarath, S Deepu, S Sundararajan, K Achuthan
Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014 …, 2015
22015
A Hybrid Trust Model for Cloud Service Provider Selection with NLP Support and Malicious User Feedback Filtering
BP Poluparthi, GM Kishan, VBS Praneeth, A Manikanta, G Sarath
2021 12th International Conference on Computing Communication and Networking …, 2021
12021
Securing remote database server using fully homomorphic encryption and re-encryption
G Sarath, R Jayapriya
Security in Computing and Communications: Third International Symposium. 536 …, 2015
12015
A Twitter-based Software Vulnerability Alert Framework using Natural Language Processing
CK Sneha, AR Thejaswi, SB Kumar, G Sarath
2023 8th International Conference on Communication and Electronics Systems …, 2023
2023
Recommendation System Using Different Approaches
DDVD Bhaskar, M Aditya, N Chaithanya, D Dharani, G Sarath
Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2022, 883-894, 2022
2022
Midhunchakkarvarthy, 666 Divyam, 1 Divyam, 6 Diwakar B, 917 Dushyant Singh Jasrotia, 453
LR Deepthi, D Goyal, M Denesh Kumar, VP Devassia, VG Devi, ...
The system can't perform the operation now. Try again later.
Articles 1–20