BibTeX records: Deepthi P. Pattathil

download as .bib file

@article{DBLP:journals/ett/PKP23,
  author       = {Sreelakshmi P and
                  Donuru Keerthi and
                  Deepthi P. P.},
  title        = {User grouping and resource management in efficient {NOMA-OMA} transmission
                  scheme for infotainment message dissemination in VANETs},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {34},
  number       = {10},
  year         = {2023},
  url          = {https://doi.org/10.1002/ett.4835},
  doi          = {10.1002/ETT.4835},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/PKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/KoyaD23,
  author       = {Aneesh M. Koya and
                  P. P. Deepthi},
  title        = {Efficient on-site confirmatory testing for atrial fibrillation with
                  derived 12-lead {ECG} in a wireless body area network},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {6797--6815},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-021-03543-9},
  doi          = {10.1007/S12652-021-03543-9},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/KoyaD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AlexJP23,
  author       = {Sona Alex and
                  Dhanaraj K. J. and
                  Deepthi P. P.},
  title        = {Energy Efficient and Secure Neural Network-based Disease Detection
                  Framework for Mobile Healthcare Network},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {29:1--29:27},
  year         = {2023},
  url          = {https://doi.org/10.1145/3585536},
  doi          = {10.1145/3585536},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AlexJP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tencon/LikhithaPPK23,
  author       = {Rathlavath Likhitha and
                  Sreelakshmi P and
                  Deepthi P. P. and
                  Nujoom Sageer Karat},
  title        = {User Clustering and Optimum Bandwidth Allocation for Down link Multi-Carrier
                  {NOMA}},
  booktitle    = {{IEEE} Region 10 Conference, {TENCON} 2023, Chiang Mai, Thailand,
                  October 31 - Nov. 3, 2023},
  pages        = {702--707},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/TENCON58879.2023.10322513},
  doi          = {10.1109/TENCON58879.2023.10322513},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tencon/LikhithaPPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlexDD22,
  author       = {Sona Alex and
                  K. J. Dhanaraj and
                  P. P. Deepthi},
  title        = {Private and Energy-Efficient Decision Tree-Based Disease Detection
                  for Resource-Constrained Medical Users in Mobile Healthcare Network},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {17098--17112},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3149771},
  doi          = {10.1109/ACCESS.2022.3149771},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlexDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/PachatMPR22,
  author       = {Jesy Pachat and
                  Anjana Ambika Mahesh and
                  Deepthi P. P. and
                  B. Sundar Rajan},
  title        = {Embedded Index Coding With Consecutive Side Information in Vehicle
                  to Vehicle Communication},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {71},
  number       = {8},
  pages        = {9113--9118},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVT.2022.3175785},
  doi          = {10.1109/TVT.2022.3175785},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/PachatMPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/PazhoorPMPR22,
  author       = {Sreelakshmi Pazhoor and
                  Jesy Pachat and
                  Anjana Ambika Mahesh and
                  Deepthi P. P. and
                  B. Sundar Rajan},
  title        = {Index Coded - {NOMA} in Vehicular Ad Hoc Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {71},
  number       = {9},
  pages        = {10073--10087},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVT.2022.3182891},
  doi          = {10.1109/TVT.2022.3182891},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/PazhoorPMPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/AlexDD22,
  author       = {Sona Alex and
                  K. J. Dhanaraj and
                  P. P. Deepthi},
  title        = {Secure Integer Comparison Protocol For ML-based Disease Diagnosis
                  In {MHN} With Energy Efficient Edge Computing},
  booktitle    = {56th Annual Conference on Information Sciences and Systems, {CISS}
                  2022, Princeton, NJ, USA, March 9-11, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CISS53076.2022.9751179},
  doi          = {10.1109/CISS53076.2022.9751179},
  timestamp    = {Fri, 22 Apr 2022 19:18:39 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/AlexDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvip/RohithD22,
  author       = {N. Sai Mani Rohith and
                  P. P. Deepthi},
  editor       = {Deep Gupta and
                  Kishor M. Bhurchandi and
                  Subrahmanyam Murala and
                  Balasubramanian Raman and
                  Sanjeev Kumar},
  title        = {A Novel Scheme for Adversarial Training to Improve the Robustness
                  of {DNN} Against White Box Attacks},
  booktitle    = {Computer Vision and Image Processing - 7th International Conference,
                  {CVIP} 2022, Nagpur, India, November 4-6, 2022, Revised Selected Papers,
                  Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {1777},
  pages        = {362--376},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-31417-9\_28},
  doi          = {10.1007/978-3-031-31417-9\_28},
  timestamp    = {Tue, 09 May 2023 14:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/cvip/RohithD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/PPMDR22,
  author       = {Sreelakshmi Pazhoor and
                  Jesy Pachat and
                  Anjana Ambika Mahesh and
                  P. P. Deepthi and
                  B. Sundar Rajan},
  title        = {Index Coded-NOMA in Vehicular Ad Hoc Networks},
  booktitle    = {95th {IEEE} Vehicular Technology Conference, {VTC} Spring 2022, Helsinki,
                  Finland, June 19-22, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VTC2022-Spring54318.2022.9860694},
  doi          = {10.1109/VTC2022-SPRING54318.2022.9860694},
  timestamp    = {Wed, 25 Jan 2023 10:28:23 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/PPMDR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/PachatDR22,
  author       = {Jesy Pachat and
                  P. P. Deepthi and
                  B. Sundar Rajan},
  title        = {Index Coded Modulation in Network to Vehicle {(N2V)} Communication},
  booktitle    = {95th {IEEE} Vehicular Technology Conference, {VTC} Spring 2022, Helsinki,
                  Finland, June 19-22, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VTC2022-Spring54318.2022.9860637},
  doi          = {10.1109/VTC2022-SPRING54318.2022.9860637},
  timestamp    = {Thu, 01 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/PachatDR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/PazhoorPKJDR22,
  author       = {Sreelakshmi Pazhoor and
                  Jesy Pachat and
                  Nujoom Sageer Karat and
                  Vinay Joseph and
                  P. P. Deepthi and
                  B. Sundar Rajan},
  title        = {Optimal Index Code Design for {IC-NOMA} Transmission in VANETs},
  booktitle    = {96th Vehicular Technology Conference, {VTC} Fall 2022, London, United
                  Kingdom, September 26-29, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VTC2022-Fall57202.2022.10012949},
  doi          = {10.1109/VTC2022-FALL57202.2022.10012949},
  timestamp    = {Tue, 24 Jan 2023 16:39:10 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/PazhoorPKJDR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LakshmiSP21,
  author       = {V. S. Lakshmi and
                  Deepthi Sundaran and
                  Deepthi P. P.},
  title        = {Collusion resistant secret sharing scheme for secure data storage
                  and processing over cloud},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102869},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102869},
  doi          = {10.1016/J.JISA.2021.102869},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LakshmiSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/PachatKMPR21,
  author       = {Jesy Pachat and
                  Nujoom Sageer Karat and
                  Anjana Ambika Mahesh and
                  Deepthi P. P. and
                  B. Sundar Rajan},
  title        = {Index Coded {PSK} Modulation in Vehicle to Vehicle Communication},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {5},
  pages        = {4753--4766},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3073788},
  doi          = {10.1109/TVT.2021.3073788},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/PachatKMPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/JacobPD21,
  author       = {Liya Mary Jacob and
                  Sreelakshmi Pazhoor and
                  P. P. Deepthi},
  title        = {Physical Layer Security in Power Domain {NOMA} through Key Extraction},
  booktitle    = {12th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCNT51525.2021.9580039},
  doi          = {10.1109/ICCCNT51525.2021.9580039},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/JacobPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/PachatKMPR21,
  author       = {Jesy Pachat and
                  Nujoom Sageer Karat and
                  Anjana Ambika Mahesh and
                  Deepthi P. Pattathil and
                  B. Sundar Rajan},
  title        = {Index Coded {PSK} Modulation in Vehicle to Vehicle Communication},
  booktitle    = {93rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2021, Helsinki,
                  Finland, April 25-28, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VTC2021-Spring51267.2021.9448906},
  doi          = {10.1109/VTC2021-SPRING51267.2021.9448906},
  timestamp    = {Fri, 18 Jun 2021 10:49:22 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/PachatKMPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-11098,
  author       = {Sreelakshmi Pazhoor and
                  Jesy Pachat and
                  Anjana Ambika Mahesh and
                  Deepthi P. P. and
                  B. Sundar Rajan},
  title        = {Index Coded - {NOMA} in Vehicular Ad Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/2110.11098},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.11098},
  eprinttype    = {arXiv},
  eprint       = {2110.11098},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-11098.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AlexPJ20,
  author       = {Sona Alex and
                  Deepthi P. Pattathil and
                  Dhanaraj Kakkanattu Jagalchandran},
  title        = {{SPCOR:} a secure and privacy-preserving protocol for mobile-healthcare
                  emergency to reap computing opportunities at remote and nearby},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {670--682},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2020.0086},
  doi          = {10.1049/IET-IFS.2020.0086},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AlexPJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/UndeD20,
  author       = {Amit Satish Unde and
                  P. P. Deepthi},
  title        = {Design and Analysis of Compressive Sensing-Based Lightweight Encryption
                  Scheme for Multimedia IoT},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {67-II},
  number       = {1},
  pages        = {167--171},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSII.2019.2897839},
  doi          = {10.1109/TCSII.2019.2897839},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcas/UndeD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/UndeP20,
  author       = {Amit Satish Unde and
                  Deepthi P. Pattathil},
  title        = {Adaptive Compressive Video Coding for Embedded Camera Sensors: Compressed
                  Domain Motion and Measurements Estimation},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {19},
  number       = {10},
  pages        = {2250--2263},
  year         = {2020},
  url          = {https://doi.org/10.1109/TMC.2019.2926271},
  doi          = {10.1109/TMC.2019.2926271},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/UndeP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/PachatKPR20,
  author       = {Jesy Pachat and
                  Nujoom Sageer Karat and
                  Deepthi P. P. and
                  B. Sundar Rajan},
  title        = {Index Coding in Vehicle to Vehicle Communication},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {10},
  pages        = {11926--11936},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.3006441},
  doi          = {10.1109/TVT.2020.3006441},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/PachatKPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-00559,
  author       = {Jesy Pachat and
                  Nujoom Sageer Karat and
                  Deepthi P. P. and
                  B. Sundar Rajan},
  title        = {Index Coding in Vehicle to Vehicle Communication},
  journal      = {CoRR},
  volume       = {abs/2007.00559},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.00559},
  eprinttype    = {arXiv},
  eprint       = {2007.00559},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-00559.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/KoyaP19,
  author       = {Aneesh M. Koya and
                  Deepthi P. P.},
  title        = {Plug and play self-configurable IoT gateway node for telemonitoring
                  of {ECG}},
  journal      = {Comput. Biol. Medicine},
  volume       = {112},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compbiomed.2019.103359},
  doi          = {10.1016/J.COMPBIOMED.2019.103359},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cbm/KoyaP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/LakshmiD19,
  author       = {V. S. Lakshmi and
                  P. P. Deepthi},
  title        = {A secure channel code-based scheme for privacy preserving data aggregation
                  in wireless sensor networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {32},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/dac.3832},
  doi          = {10.1002/DAC.3832},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/LakshmiD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/LakshmiD19a,
  author       = {V. S. Lakshmi and
                  P. P. Deepthi},
  title        = {A secure regenerating code-based cloud storage with efficient integrity
                  verification},
  journal      = {Int. J. Commun. Syst.},
  volume       = {32},
  number       = {9},
  year         = {2019},
  url          = {https://doi.org/10.1002/dac.3948},
  doi          = {10.1002/DAC.3948},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/LakshmiD19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LakshmiD19,
  author       = {V. S. Lakshmi and
                  P. P. Deepthi},
  title        = {An efficient scheme for secure domain medical image fusion over cloud},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {15},
  pages        = {20609--20636},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-019-7378-x},
  doi          = {10.1007/S11042-019-7378-X},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LakshmiD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KoyaP18,
  author       = {Aneesh M. Koya and
                  Deepthi P. P.},
  title        = {Anonymous hybrid mutual authentication and key agreement scheme for
                  wireless body area network},
  journal      = {Comput. Networks},
  volume       = {140},
  pages        = {138--151},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.05.006},
  doi          = {10.1016/J.COMNET.2018.05.006},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KoyaP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/UndeD18,
  author       = {Amit Satish Unde and
                  P. P. Deepthi},
  title        = {Fast {BCS-FOCUSS} and {DBCS-FOCUSS} with augmented Lagrangian and
                  minimum residual methods},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {52},
  pages        = {92--100},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jvcir.2018.02.009},
  doi          = {10.1016/J.JVCIR.2018.02.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/UndeD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/UndeD18,
  author       = {Amit Satish Unde and
                  P. P. Deepthi},
  title        = {Rate-distortion analysis of structured sensing matrices for block
                  compressive sensing of images},
  journal      = {Signal Process. Image Commun.},
  volume       = {65},
  pages        = {115--127},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.image.2018.03.019},
  doi          = {10.1016/J.IMAGE.2018.03.019},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spic/UndeD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/StuartP17,
  author       = {Celine Mary Stuart and
                  Deepthi P. Pattathil},
  title        = {{FPGA} implementation of highly secure, hardware-efficient {QC-LDPC}
                  code-based nonlinear cryptosystem for wireless sensor networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {30},
  number       = {10},
  year         = {2017},
  url          = {https://doi.org/10.1002/dac.3233},
  doi          = {10.1002/DAC.3233},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/StuartP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/UndeD17,
  author       = {Amit Satish Unde and
                  P. P. Deepthi},
  title        = {Block compressive sensing: Individual and joint reconstruction of
                  correlated images},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {44},
  pages        = {187--197},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jvcir.2017.01.028},
  doi          = {10.1016/J.JVCIR.2017.01.028},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/UndeD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/StuartP17,
  author       = {Celine Mary Stuart and
                  Deepthi P. Pattathil},
  title        = {Nonlinear Cryptosystem Based on {QC-LDPC} Codes for Enhanced Security
                  and Reliability with Low Hardware Complexity and Reduced Key Size},
  journal      = {Wirel. Pers. Commun.},
  volume       = {96},
  number       = {3},
  pages        = {4177--4197},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4376-z},
  doi          = {10.1007/S11277-017-4376-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/StuartP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/StuartKJP16,
  author       = {Celine Mary Stuart and
                  Spandana K. and
                  Dhanaraj K. J. and
                  Deepthi P. Pattathil},
  title        = {Design and implementation of hardware-efficient modified Rao-Nam scheme
                  with high security for wireless sensor networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {29},
  pages        = {65--79},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.03.004},
  doi          = {10.1016/J.JISA.2016.03.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/StuartKJP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/UndeMD16,
  author       = {Amit Satish Unde and
                  Ravikumar Malla and
                  P. P. Deepthi},
  title        = {Low complexity secure encoding and joint decoding for distributed
                  compressive sensing WSNs},
  booktitle    = {2016 3rd International Conference on Recent Advances in Information
                  Technology (RAIT), Dhanbad, India, March 3-5, 2016},
  pages        = {89--94},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/RAIT.2016.7507881},
  doi          = {10.1109/RAIT.2016.7507881},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/UndeMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/JilnaD16,
  author       = {Payingat Jilna and
                  P. P. Deepthi},
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {Light Weight Key Establishment Scheme for Wireless Sensor Networks},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  pages        = {124--137},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6\_7},
  doi          = {10.1007/978-3-319-49445-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/JilnaD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/AugustineGP15,
  author       = {Nishanth Augustine and
                  Sudhish N. George and
                  Deepthi P. Pattathil},
  title        = {An audio encryption technique through compressive sensing and Arnold
                  transform},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {3},
  number       = {1},
  pages        = {74--92},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJTMCC.2015.072467},
  doi          = {10.1504/IJTMCC.2015.072467},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/AugustineGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/GeorgeAP15,
  author       = {Sudhish N. George and
                  Nishanth Augustine and
                  Deepthi P. Pattathil},
  title        = {Audio security through compressive sampling and cellular automata},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {23},
  pages        = {10393--10417},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-014-2172-2},
  doi          = {10.1007/S11042-014-2172-2},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/GeorgeAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/StuartP15,
  author       = {Celine Mary Stuart and
                  Deepthi P. Pattathil},
  title        = {A novel low-complexity scheme for improving security of NLFG-based
                  symmetric key cryptosystem using secure concatenated {RS-QCLDPC} code},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2888--2900},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1215},
  doi          = {10.1002/SEC.1215},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/StuartP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JilnaP15,
  author       = {Payingat Jilna and
                  Deepthi P. Pattathil},
  title        = {A key management technique based on elliptic curves for static wireless
                  sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3726--3738},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1295},
  doi          = {10.1002/SEC.1295},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JilnaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JilnaDJ15,
  author       = {Payingat Jilna and
                  P. P. Deepthi and
                  U. K. Jayaraj},
  title        = {Optimized hardware design and implementation of {EC} based key management
                  scheme for {WSN}},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {164--169},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412079},
  doi          = {10.1109/ICITST.2015.7412079},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JilnaDJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snds/AugustineGD14,
  author       = {Nishanth Augustine and
                  Sudhish N. George and
                  P. P. Deepthi},
  editor       = {Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Sabu M. Thampi and
                  Ryan K. L. Ko and
                  Lei Shu},
  title        = {Compressive Sensing Based Audio Scrambling Using Arnold Transform},
  booktitle    = {Recent Trends in Computer Networks and Distributed Systems Security
                  - Second International Conference, {SNDS} 2014, Trivandrum, India,
                  March 13-14, 2014, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {420},
  pages        = {172--183},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54525-2\_15},
  doi          = {10.1007/978-3-642-54525-2\_15},
  timestamp    = {Sat, 19 Oct 2019 19:58:53 +0200},
  biburl       = {https://dblp.org/rec/conf/snds/AugustineGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snds/JilnaD14,
  author       = {Payingat Jilna and
                  P. P. Deepthi},
  editor       = {Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Sabu M. Thampi and
                  Ryan K. L. Ko and
                  Lei Shu},
  title        = {Implementation of an Elliptic Curve Based Message Authentication Code
                  for Constrained Environments},
  booktitle    = {Recent Trends in Computer Networks and Distributed Systems Security
                  - Second International Conference, {SNDS} 2014, Trivandrum, India,
                  March 13-14, 2014, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {420},
  pages        = {520--529},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54525-2\_46},
  doi          = {10.1007/978-3-642-54525-2\_46},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/snds/JilnaD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sscc/KolaziGD14,
  author       = {Abhishek Kolazi and
                  Sudhish N. George and
                  P. P. Deepthi},
  editor       = {Jaime Lloret Mauri and
                  Sabu M. Thampi and
                  Danda B. Rawat and
                  Di Jin},
  title        = {{PWLCM} Based Secure Measurement Matrix Generation for Secure Video
                  Compressive Sensing},
  booktitle    = {Security in Computing and Communications - Second International Symposium,
                  {SSCC} 2014, Delhi, India, September 24-27, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {467},
  pages        = {182--191},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44966-0\_17},
  doi          = {10.1007/978-3-662-44966-0\_17},
  timestamp    = {Mon, 05 Jun 2017 12:42:13 +0200},
  biburl       = {https://dblp.org/rec/conf/sscc/KolaziGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sscc/StuartD14,
  author       = {Celine Mary Stuart and
                  Deepthi P. Pattathil},
  editor       = {Jaime Lloret Mauri and
                  Sabu M. Thampi and
                  Danda B. Rawat and
                  Di Jin},
  title        = {Low Complex System for Physical Layer Security Using {NLFG} and {QCLDPC}
                  Code},
  booktitle    = {Security in Computing and Communications - Second International Symposium,
                  {SSCC} 2014, Delhi, India, September 24-27, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {467},
  pages        = {313--324},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44966-0\_30},
  doi          = {10.1007/978-3-662-44966-0\_30},
  timestamp    = {Wed, 27 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sscc/StuartD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/RajGD12,
  author       = {R. Arun Raj and
                  Sudhish N. George and
                  P. P. Deepthi},
  title        = {An expeditious chaos based digital image encryption algorithm},
  booktitle    = {1st International Conference on Recent Advances in Information Technology,
                  {RAIT} 2012, Dhanbad, India, March 15-17, 2012},
  pages        = {14--18},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/RAIT.2012.6194471},
  doi          = {10.1109/RAIT.2012.6194471},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/RajGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/DeepthiJS09,
  author       = {P. P. Deepthi and
                  Deepa Sara John and
                  P. S. Sathidevi},
  title        = {Design and analysis of a highly secure stream cipher based on linear
                  feedback shift register},
  journal      = {Comput. Electr. Eng.},
  volume       = {35},
  number       = {2},
  pages        = {235--243},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.compeleceng.2008.06.005},
  doi          = {10.1016/J.COMPELECENG.2008.06.005},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/DeepthiJS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/DeepthiNS09,
  author       = {P. P. Deepthi and
                  V. S. Nithin and
                  P. S. Sathidevi},
  title        = {Implementation and analysis of stream ciphers based on the elliptic
                  curves},
  journal      = {Comput. Electr. Eng.},
  volume       = {35},
  number       = {2},
  pages        = {300--314},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.compeleceng.2008.06.006},
  doi          = {10.1016/J.COMPELECENG.2008.06.006},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/DeepthiNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/DeepthiS09,
  author       = {P. P. Deepthi and
                  P. S. Sathidevi},
  title        = {New stream ciphers based on elliptic curve point multiplication},
  journal      = {Comput. Commun.},
  volume       = {32},
  number       = {1},
  pages        = {25--33},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comcom.2008.09.002},
  doi          = {10.1016/J.COMCOM.2008.09.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/DeepthiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DeepthiS09,
  author       = {P. P. Deepthi and
                  P. S. Sathidevi},
  title        = {Design, implementation and analysis of hardware efficient stream ciphers
                  using {LFSR} based hash functions},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {3-4},
  pages        = {229--241},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2008.11.006},
  doi          = {10.1016/J.COSE.2008.11.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DeepthiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics