Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Deepthi P. Pattathil
@article{DBLP:journals/ett/PKP23, author = {Sreelakshmi P and Donuru Keerthi and Deepthi P. P.}, title = {User grouping and resource management in efficient {NOMA-OMA} transmission scheme for infotainment message dissemination in VANETs}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {34}, number = {10}, year = {2023}, url = {https://doi.org/10.1002/ett.4835}, doi = {10.1002/ETT.4835}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/PKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/KoyaD23, author = {Aneesh M. Koya and P. P. Deepthi}, title = {Efficient on-site confirmatory testing for atrial fibrillation with derived 12-lead {ECG} in a wireless body area network}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {6}, pages = {6797--6815}, year = {2023}, url = {https://doi.org/10.1007/s12652-021-03543-9}, doi = {10.1007/S12652-021-03543-9}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/KoyaD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AlexJP23, author = {Sona Alex and Dhanaraj K. J. and Deepthi P. P.}, title = {Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {29:1--29:27}, year = {2023}, url = {https://doi.org/10.1145/3585536}, doi = {10.1145/3585536}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AlexJP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tencon/LikhithaPPK23, author = {Rathlavath Likhitha and Sreelakshmi P and Deepthi P. P. and Nujoom Sageer Karat}, title = {User Clustering and Optimum Bandwidth Allocation for Down link Multi-Carrier {NOMA}}, booktitle = {{IEEE} Region 10 Conference, {TENCON} 2023, Chiang Mai, Thailand, October 31 - Nov. 3, 2023}, pages = {702--707}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TENCON58879.2023.10322513}, doi = {10.1109/TENCON58879.2023.10322513}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tencon/LikhithaPPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlexDD22, author = {Sona Alex and K. J. Dhanaraj and P. P. Deepthi}, title = {Private and Energy-Efficient Decision Tree-Based Disease Detection for Resource-Constrained Medical Users in Mobile Healthcare Network}, journal = {{IEEE} Access}, volume = {10}, pages = {17098--17112}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3149771}, doi = {10.1109/ACCESS.2022.3149771}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlexDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/PachatMPR22, author = {Jesy Pachat and Anjana Ambika Mahesh and Deepthi P. P. and B. Sundar Rajan}, title = {Embedded Index Coding With Consecutive Side Information in Vehicle to Vehicle Communication}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {71}, number = {8}, pages = {9113--9118}, year = {2022}, url = {https://doi.org/10.1109/TVT.2022.3175785}, doi = {10.1109/TVT.2022.3175785}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/PachatMPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/PazhoorPMPR22, author = {Sreelakshmi Pazhoor and Jesy Pachat and Anjana Ambika Mahesh and Deepthi P. P. and B. Sundar Rajan}, title = {Index Coded - {NOMA} in Vehicular Ad Hoc Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {71}, number = {9}, pages = {10073--10087}, year = {2022}, url = {https://doi.org/10.1109/TVT.2022.3182891}, doi = {10.1109/TVT.2022.3182891}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/PazhoorPMPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/AlexDD22, author = {Sona Alex and K. J. Dhanaraj and P. P. Deepthi}, title = {Secure Integer Comparison Protocol For ML-based Disease Diagnosis In {MHN} With Energy Efficient Edge Computing}, booktitle = {56th Annual Conference on Information Sciences and Systems, {CISS} 2022, Princeton, NJ, USA, March 9-11, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CISS53076.2022.9751179}, doi = {10.1109/CISS53076.2022.9751179}, timestamp = {Fri, 22 Apr 2022 19:18:39 +0200}, biburl = {https://dblp.org/rec/conf/ciss/AlexDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvip/RohithD22, author = {N. Sai Mani Rohith and P. P. Deepthi}, editor = {Deep Gupta and Kishor M. Bhurchandi and Subrahmanyam Murala and Balasubramanian Raman and Sanjeev Kumar}, title = {A Novel Scheme for Adversarial Training to Improve the Robustness of {DNN} Against White Box Attacks}, booktitle = {Computer Vision and Image Processing - 7th International Conference, {CVIP} 2022, Nagpur, India, November 4-6, 2022, Revised Selected Papers, Part {II}}, series = {Communications in Computer and Information Science}, volume = {1777}, pages = {362--376}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-31417-9\_28}, doi = {10.1007/978-3-031-31417-9\_28}, timestamp = {Tue, 09 May 2023 14:57:36 +0200}, biburl = {https://dblp.org/rec/conf/cvip/RohithD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/PPMDR22, author = {Sreelakshmi Pazhoor and Jesy Pachat and Anjana Ambika Mahesh and P. P. Deepthi and B. Sundar Rajan}, title = {Index Coded-NOMA in Vehicular Ad Hoc Networks}, booktitle = {95th {IEEE} Vehicular Technology Conference, {VTC} Spring 2022, Helsinki, Finland, June 19-22, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VTC2022-Spring54318.2022.9860694}, doi = {10.1109/VTC2022-SPRING54318.2022.9860694}, timestamp = {Wed, 25 Jan 2023 10:28:23 +0100}, biburl = {https://dblp.org/rec/conf/vtc/PPMDR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/PachatDR22, author = {Jesy Pachat and P. P. Deepthi and B. Sundar Rajan}, title = {Index Coded Modulation in Network to Vehicle {(N2V)} Communication}, booktitle = {95th {IEEE} Vehicular Technology Conference, {VTC} Spring 2022, Helsinki, Finland, June 19-22, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VTC2022-Spring54318.2022.9860637}, doi = {10.1109/VTC2022-SPRING54318.2022.9860637}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/PachatDR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/PazhoorPKJDR22, author = {Sreelakshmi Pazhoor and Jesy Pachat and Nujoom Sageer Karat and Vinay Joseph and P. P. Deepthi and B. Sundar Rajan}, title = {Optimal Index Code Design for {IC-NOMA} Transmission in VANETs}, booktitle = {96th Vehicular Technology Conference, {VTC} Fall 2022, London, United Kingdom, September 26-29, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VTC2022-Fall57202.2022.10012949}, doi = {10.1109/VTC2022-FALL57202.2022.10012949}, timestamp = {Tue, 24 Jan 2023 16:39:10 +0100}, biburl = {https://dblp.org/rec/conf/vtc/PazhoorPKJDR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LakshmiSP21, author = {V. S. Lakshmi and Deepthi Sundaran and Deepthi P. P.}, title = {Collusion resistant secret sharing scheme for secure data storage and processing over cloud}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102869}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102869}, doi = {10.1016/J.JISA.2021.102869}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LakshmiSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/PachatKMPR21, author = {Jesy Pachat and Nujoom Sageer Karat and Anjana Ambika Mahesh and Deepthi P. P. and B. Sundar Rajan}, title = {Index Coded {PSK} Modulation in Vehicle to Vehicle Communication}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {5}, pages = {4753--4766}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3073788}, doi = {10.1109/TVT.2021.3073788}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/PachatKMPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/JacobPD21, author = {Liya Mary Jacob and Sreelakshmi Pazhoor and P. P. Deepthi}, title = {Physical Layer Security in Power Domain {NOMA} through Key Extraction}, booktitle = {12th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCNT51525.2021.9580039}, doi = {10.1109/ICCCNT51525.2021.9580039}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/JacobPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/PachatKMPR21, author = {Jesy Pachat and Nujoom Sageer Karat and Anjana Ambika Mahesh and Deepthi P. Pattathil and B. Sundar Rajan}, title = {Index Coded {PSK} Modulation in Vehicle to Vehicle Communication}, booktitle = {93rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2021, Helsinki, Finland, April 25-28, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VTC2021-Spring51267.2021.9448906}, doi = {10.1109/VTC2021-SPRING51267.2021.9448906}, timestamp = {Fri, 18 Jun 2021 10:49:22 +0200}, biburl = {https://dblp.org/rec/conf/vtc/PachatKMPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-11098, author = {Sreelakshmi Pazhoor and Jesy Pachat and Anjana Ambika Mahesh and Deepthi P. P. and B. Sundar Rajan}, title = {Index Coded - {NOMA} in Vehicular Ad Hoc Networks}, journal = {CoRR}, volume = {abs/2110.11098}, year = {2021}, url = {https://arxiv.org/abs/2110.11098}, eprinttype = {arXiv}, eprint = {2110.11098}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-11098.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AlexPJ20, author = {Sona Alex and Deepthi P. Pattathil and Dhanaraj Kakkanattu Jagalchandran}, title = {{SPCOR:} a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {6}, pages = {670--682}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2020.0086}, doi = {10.1049/IET-IFS.2020.0086}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/AlexPJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/UndeD20, author = {Amit Satish Unde and P. P. Deepthi}, title = {Design and Analysis of Compressive Sensing-Based Lightweight Encryption Scheme for Multimedia IoT}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {67-II}, number = {1}, pages = {167--171}, year = {2020}, url = {https://doi.org/10.1109/TCSII.2019.2897839}, doi = {10.1109/TCSII.2019.2897839}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/UndeD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/UndeP20, author = {Amit Satish Unde and Deepthi P. Pattathil}, title = {Adaptive Compressive Video Coding for Embedded Camera Sensors: Compressed Domain Motion and Measurements Estimation}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {19}, number = {10}, pages = {2250--2263}, year = {2020}, url = {https://doi.org/10.1109/TMC.2019.2926271}, doi = {10.1109/TMC.2019.2926271}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/UndeP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/PachatKPR20, author = {Jesy Pachat and Nujoom Sageer Karat and Deepthi P. P. and B. Sundar Rajan}, title = {Index Coding in Vehicle to Vehicle Communication}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {10}, pages = {11926--11936}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.3006441}, doi = {10.1109/TVT.2020.3006441}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/PachatKPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-00559, author = {Jesy Pachat and Nujoom Sageer Karat and Deepthi P. P. and B. Sundar Rajan}, title = {Index Coding in Vehicle to Vehicle Communication}, journal = {CoRR}, volume = {abs/2007.00559}, year = {2020}, url = {https://arxiv.org/abs/2007.00559}, eprinttype = {arXiv}, eprint = {2007.00559}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-00559.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbm/KoyaP19, author = {Aneesh M. Koya and Deepthi P. P.}, title = {Plug and play self-configurable IoT gateway node for telemonitoring of {ECG}}, journal = {Comput. Biol. Medicine}, volume = {112}, year = {2019}, url = {https://doi.org/10.1016/j.compbiomed.2019.103359}, doi = {10.1016/J.COMPBIOMED.2019.103359}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cbm/KoyaP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/LakshmiD19, author = {V. S. Lakshmi and P. P. Deepthi}, title = {A secure channel code-based scheme for privacy preserving data aggregation in wireless sensor networks}, journal = {Int. J. Commun. Syst.}, volume = {32}, number = {1}, year = {2019}, url = {https://doi.org/10.1002/dac.3832}, doi = {10.1002/DAC.3832}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/LakshmiD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/LakshmiD19a, author = {V. S. Lakshmi and P. P. Deepthi}, title = {A secure regenerating code-based cloud storage with efficient integrity verification}, journal = {Int. J. Commun. Syst.}, volume = {32}, number = {9}, year = {2019}, url = {https://doi.org/10.1002/dac.3948}, doi = {10.1002/DAC.3948}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/LakshmiD19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LakshmiD19, author = {V. S. Lakshmi and P. P. Deepthi}, title = {An efficient scheme for secure domain medical image fusion over cloud}, journal = {Multim. Tools Appl.}, volume = {78}, number = {15}, pages = {20609--20636}, year = {2019}, url = {https://doi.org/10.1007/s11042-019-7378-x}, doi = {10.1007/S11042-019-7378-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LakshmiD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KoyaP18, author = {Aneesh M. Koya and Deepthi P. P.}, title = {Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network}, journal = {Comput. Networks}, volume = {140}, pages = {138--151}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.05.006}, doi = {10.1016/J.COMNET.2018.05.006}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KoyaP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/UndeD18, author = {Amit Satish Unde and P. P. Deepthi}, title = {Fast {BCS-FOCUSS} and {DBCS-FOCUSS} with augmented Lagrangian and minimum residual methods}, journal = {J. Vis. Commun. Image Represent.}, volume = {52}, pages = {92--100}, year = {2018}, url = {https://doi.org/10.1016/j.jvcir.2018.02.009}, doi = {10.1016/J.JVCIR.2018.02.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/UndeD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/UndeD18, author = {Amit Satish Unde and P. P. Deepthi}, title = {Rate-distortion analysis of structured sensing matrices for block compressive sensing of images}, journal = {Signal Process. Image Commun.}, volume = {65}, pages = {115--127}, year = {2018}, url = {https://doi.org/10.1016/j.image.2018.03.019}, doi = {10.1016/J.IMAGE.2018.03.019}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/UndeD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/StuartP17, author = {Celine Mary Stuart and Deepthi P. Pattathil}, title = {{FPGA} implementation of highly secure, hardware-efficient {QC-LDPC} code-based nonlinear cryptosystem for wireless sensor networks}, journal = {Int. J. Commun. Syst.}, volume = {30}, number = {10}, year = {2017}, url = {https://doi.org/10.1002/dac.3233}, doi = {10.1002/DAC.3233}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/StuartP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/UndeD17, author = {Amit Satish Unde and P. P. Deepthi}, title = {Block compressive sensing: Individual and joint reconstruction of correlated images}, journal = {J. Vis. Commun. Image Represent.}, volume = {44}, pages = {187--197}, year = {2017}, url = {https://doi.org/10.1016/j.jvcir.2017.01.028}, doi = {10.1016/J.JVCIR.2017.01.028}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/UndeD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/StuartP17, author = {Celine Mary Stuart and Deepthi P. Pattathil}, title = {Nonlinear Cryptosystem Based on {QC-LDPC} Codes for Enhanced Security and Reliability with Low Hardware Complexity and Reduced Key Size}, journal = {Wirel. Pers. Commun.}, volume = {96}, number = {3}, pages = {4177--4197}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4376-z}, doi = {10.1007/S11277-017-4376-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/StuartP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/StuartKJP16, author = {Celine Mary Stuart and Spandana K. and Dhanaraj K. J. and Deepthi P. Pattathil}, title = {Design and implementation of hardware-efficient modified Rao-Nam scheme with high security for wireless sensor networks}, journal = {J. Inf. Secur. Appl.}, volume = {29}, pages = {65--79}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.03.004}, doi = {10.1016/J.JISA.2016.03.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/StuartKJP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/UndeMD16, author = {Amit Satish Unde and Ravikumar Malla and P. P. Deepthi}, title = {Low complexity secure encoding and joint decoding for distributed compressive sensing WSNs}, booktitle = {2016 3rd International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, March 3-5, 2016}, pages = {89--94}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/RAIT.2016.7507881}, doi = {10.1109/RAIT.2016.7507881}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/rait/UndeMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/JilnaD16, author = {Payingat Jilna and P. P. Deepthi}, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {Light Weight Key Establishment Scheme for Wireless Sensor Networks}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {124--137}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_7}, doi = {10.1007/978-3-319-49445-6\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/JilnaD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/AugustineGP15, author = {Nishanth Augustine and Sudhish N. George and Deepthi P. Pattathil}, title = {An audio encryption technique through compressive sensing and Arnold transform}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {3}, number = {1}, pages = {74--92}, year = {2015}, url = {https://doi.org/10.1504/IJTMCC.2015.072467}, doi = {10.1504/IJTMCC.2015.072467}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/AugustineGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/GeorgeAP15, author = {Sudhish N. George and Nishanth Augustine and Deepthi P. Pattathil}, title = {Audio security through compressive sampling and cellular automata}, journal = {Multim. Tools Appl.}, volume = {74}, number = {23}, pages = {10393--10417}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-2172-2}, doi = {10.1007/S11042-014-2172-2}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/GeorgeAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/StuartP15, author = {Celine Mary Stuart and Deepthi P. Pattathil}, title = {A novel low-complexity scheme for improving security of NLFG-based symmetric key cryptosystem using secure concatenated {RS-QCLDPC} code}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2888--2900}, year = {2015}, url = {https://doi.org/10.1002/sec.1215}, doi = {10.1002/SEC.1215}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/StuartP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JilnaP15, author = {Payingat Jilna and Deepthi P. Pattathil}, title = {A key management technique based on elliptic curves for static wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3726--3738}, year = {2015}, url = {https://doi.org/10.1002/sec.1295}, doi = {10.1002/SEC.1295}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JilnaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JilnaDJ15, author = {Payingat Jilna and P. P. Deepthi and U. K. Jayaraj}, title = {Optimized hardware design and implementation of {EC} based key management scheme for {WSN}}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {164--169}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412079}, doi = {10.1109/ICITST.2015.7412079}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JilnaDJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snds/AugustineGD14, author = {Nishanth Augustine and Sudhish N. George and P. P. Deepthi}, editor = {Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Sabu M. Thampi and Ryan K. L. Ko and Lei Shu}, title = {Compressive Sensing Based Audio Scrambling Using Arnold Transform}, booktitle = {Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, {SNDS} 2014, Trivandrum, India, March 13-14, 2014, Proceedings}, series = {Communications in Computer and Information Science}, volume = {420}, pages = {172--183}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54525-2\_15}, doi = {10.1007/978-3-642-54525-2\_15}, timestamp = {Sat, 19 Oct 2019 19:58:53 +0200}, biburl = {https://dblp.org/rec/conf/snds/AugustineGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snds/JilnaD14, author = {Payingat Jilna and P. P. Deepthi}, editor = {Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Sabu M. Thampi and Ryan K. L. Ko and Lei Shu}, title = {Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments}, booktitle = {Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, {SNDS} 2014, Trivandrum, India, March 13-14, 2014, Proceedings}, series = {Communications in Computer and Information Science}, volume = {420}, pages = {520--529}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54525-2\_46}, doi = {10.1007/978-3-642-54525-2\_46}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/snds/JilnaD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sscc/KolaziGD14, author = {Abhishek Kolazi and Sudhish N. George and P. P. Deepthi}, editor = {Jaime Lloret Mauri and Sabu M. Thampi and Danda B. Rawat and Di Jin}, title = {{PWLCM} Based Secure Measurement Matrix Generation for Secure Video Compressive Sensing}, booktitle = {Security in Computing and Communications - Second International Symposium, {SSCC} 2014, Delhi, India, September 24-27, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {467}, pages = {182--191}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44966-0\_17}, doi = {10.1007/978-3-662-44966-0\_17}, timestamp = {Mon, 05 Jun 2017 12:42:13 +0200}, biburl = {https://dblp.org/rec/conf/sscc/KolaziGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sscc/StuartD14, author = {Celine Mary Stuart and Deepthi P. Pattathil}, editor = {Jaime Lloret Mauri and Sabu M. Thampi and Danda B. Rawat and Di Jin}, title = {Low Complex System for Physical Layer Security Using {NLFG} and {QCLDPC} Code}, booktitle = {Security in Computing and Communications - Second International Symposium, {SSCC} 2014, Delhi, India, September 24-27, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {467}, pages = {313--324}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44966-0\_30}, doi = {10.1007/978-3-662-44966-0\_30}, timestamp = {Wed, 27 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sscc/StuartD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/RajGD12, author = {R. Arun Raj and Sudhish N. George and P. P. Deepthi}, title = {An expeditious chaos based digital image encryption algorithm}, booktitle = {1st International Conference on Recent Advances in Information Technology, {RAIT} 2012, Dhanbad, India, March 15-17, 2012}, pages = {14--18}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/RAIT.2012.6194471}, doi = {10.1109/RAIT.2012.6194471}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/rait/RajGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/DeepthiJS09, author = {P. P. Deepthi and Deepa Sara John and P. S. Sathidevi}, title = {Design and analysis of a highly secure stream cipher based on linear feedback shift register}, journal = {Comput. Electr. Eng.}, volume = {35}, number = {2}, pages = {235--243}, year = {2009}, url = {https://doi.org/10.1016/j.compeleceng.2008.06.005}, doi = {10.1016/J.COMPELECENG.2008.06.005}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/DeepthiJS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/DeepthiNS09, author = {P. P. Deepthi and V. S. Nithin and P. S. Sathidevi}, title = {Implementation and analysis of stream ciphers based on the elliptic curves}, journal = {Comput. Electr. Eng.}, volume = {35}, number = {2}, pages = {300--314}, year = {2009}, url = {https://doi.org/10.1016/j.compeleceng.2008.06.006}, doi = {10.1016/J.COMPELECENG.2008.06.006}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/DeepthiNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/DeepthiS09, author = {P. P. Deepthi and P. S. Sathidevi}, title = {New stream ciphers based on elliptic curve point multiplication}, journal = {Comput. Commun.}, volume = {32}, number = {1}, pages = {25--33}, year = {2009}, url = {https://doi.org/10.1016/j.comcom.2008.09.002}, doi = {10.1016/J.COMCOM.2008.09.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/DeepthiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DeepthiS09, author = {P. P. Deepthi and P. S. Sathidevi}, title = {Design, implementation and analysis of hardware efficient stream ciphers using {LFSR} based hash functions}, journal = {Comput. Secur.}, volume = {28}, number = {3-4}, pages = {229--241}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2008.11.006}, doi = {10.1016/J.COSE.2008.11.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DeepthiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.