Power draining prevention in Ad-Hoc Sensor networks using sensor network encryption protocol E Mariyappan, C Balakrishnan International Conference on Information Communication and Embedded Systems …, 2014 | 7 | 2014 |
RSSI estimation using Bluetooth in smart phones S Rajkiran, C Balakrishnan 2015 2nd International Conference on Electronics and Communication Systems …, 2015 | 6 | 2015 |
RESISTING PASSWORD BASED SYSTEMS FROM ONLINE GUESSING ATTACKS JJ Mabel, MC Balakrishnan International Conference on Information Systems and Computing (ICISC-2013 …, 0 | 4 | |
An analysis on cloud data storage M Sudha, C Balakrishnan International Journal of Computer Science Engineering & Technology 2 (4), 2012 | 3 | 2012 |
Cluster Based Certificate Revocation of Attackers Nodes in MANET EK Neena, C Balakrishnan International Journal of Computer Science and Engineering 2, 2014 | 2 | 2014 |
Captcha: a defensive mechanism against attacks JJ Mabel, MC Balakrishnan IJEA 1 (4), 143-147, 2013 | 2 | 2013 |
Detecting selfish routing and misbehaviour of malicious node in Disruption Tolerant Networks K Aarthy, C Balakrishnan International Journal of Emerging Technology and Advanced Engineering 3 (1), 2013 | 2 | 2013 |
Embedding of executable file in encrypted image using LSB mechanism PS Kumar, MC BalaKrishnan International Journal of Emerging Technology and Advanced Engineering 3, 432-438, 0 | 1 | |
EFFICIENT IN REVOKING CERTIFICATES OF MALICIOUS NODES IN MANET EK NEENA, C BALAKRISHNAN | | |
DETECTING SELFISH ROUTING AND MISBEHAVIOR OF MALICIOUS NODE IN DISRUPTION TOLERANT NETWORKS MA DK, MC Balakrishnan | | |
Peer to Peer Data Dissemination over Disconnected MANET based on Gossip T Sennila, C Balakrishnan | | |
Fake Data Termination in Wireless Sensor Networks MS Pavithraa, C Balakrishnan | | |
ADAPTIVE DEFENSE STRATEGY: IMMUNIZING SHARED CHANNEL NETWORK FROM DOS ATTACKS SCNF DOS ATTACKS | | |