default search action
M. Sethumadhavan 0001
Person information
- affiliation: Amrita School of Engineering, Coimbatore, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Indrakanti Aishwarya
, Lakshmy Koduvayur Viswanathan, Chungath Srinivasan, Girish Mishra
, Saibal K. Pal, M. Sethumadhavan:
Improving the Security of the LCB Block Cipher Against Deep Learning-Based Attacks. Cryptogr. 8(4): 55 (2024) - [j15]Zeenath A. U., K. V. Lakshmy
, Thomas W. Cusick, M. Sethumadhavan:
Construction and enumeration of balanced rotation symmetric Boolean functions. Discret. Appl. Math. 357: 197-208 (2024) - [j14]I. Praveen, S. S. Aravind Vishnu
, M. Sethumadhavan:
An efficient composable 1-out-of-2 oblivious transfer scheme using vector decomposition. Int. J. Adv. Intell. Paradigms 27(2): 178-194 (2024) - [j13]K. P. Jevitha
, Bharat Jayaraman
, M. Sethumadhavan
:
Runtime verification on abstract finite state models. J. Syst. Softw. 216: 112138 (2024) - [i2]KP Jevitha, Bharat Jayaraman, M. Sethumadhavan:
Runtime Verification on Abstract Finite State Models. CoRR abs/2406.12715 (2024) - [i1]S. S. Aravind Vishnu, M. Sethumadhavan, K. V. Lakshmy:
ALGAES: An Authenticated Lattice-based Generic Asymmetric Encryption Scheme. IACR Cryptol. ePrint Arch. 2024: 1375 (2024) - 2023
- [j12]Kandasamy Muniasamy
, Rohit Chadha
, Prasad Calyam
, M. Sethumadhavan
:
Analyzing Component Composability of Cloud Security Configurations. IEEE Access 11: 139935-139951 (2023) - [j11]Praveen K, Sabyasachi Dutta
, Avishek Adhikari, M. Sethumadhavan:
Proactive visual cryptographic schemes for general access structures. Multim. Tools Appl. 82(27): 41987-42019 (2023) - 2022
- [c17]Rahul Singh, P. P. Amritha, M. Sethumadhavan:
Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web. ICACDS (1) 2022: 157-167 - 2021
- [j10]Ashok Kumar Mohan
, Sethumadhavan Madathil, K. V. Lakshmy:
Holistic Analytics of Digital Artifacts: Unique Metadata Association Model. Int. J. Digit. Crime Forensics 13(5): 78-100 (2021) - [j9]Jevitha K. P.
, Swaminathan Jayaraman
, Bharat Jayaraman, M. Sethumadhavan:
Finite-state model extraction and visualization from Java program execution. Softw. Pract. Exp. 51(2): 409-437 (2021) - [j8]S. S. Aravind Vishnu
, I. Praveen, M. Sethumadhavan:
An IND-CCA2 Secure Certificateless Hybrid Signcryption. Wirel. Pers. Commun. 119(4): 3589-3608 (2021) - [c16]Samia Anjum
, R. Ramaguru
, M. Sethumadhavan
:
Medical Records Management Using Distributed Ledger and Storage. ICACDS (2) 2021: 52-62 - 2020
- [c15]J. Karthik, P. P. Amritha, M. Sethumadhavan:
Video Game DRM: Analysis and Paradigm Solution. ICCCNT 2020: 1-4
2010 – 2019
- 2019
- [j7]P. P. Amritha, M. Sethumadhavan, Ramakrishnan Krishnan, Saibal Kumar Pal:
Anti-forensic Approach to Remove StegoContent from Images and Videos. J. Cyber Secur. Mobil. 8(3): 295-320 (2019) - [j6]D. Indhumathi Devi, S. Chithra, M. Sethumadhavan:
Hardware Random Number GeneratorUsing FPGA. J. Cyber Secur. Mobil. 8(4): 409-418 (2019) - [j5]Kanakkath Praveen, Sethumadhavan Madathil, Ramakrishnan Krishnan:
Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations. Multim. Tools Appl. 78(2): 1315-1344 (2019) - [c14]R. Ramaguru
, M. Sindhu, M. Sethumadhavan:
Blockchain for the Internet of Vehicles. ICACDS (1) 2019: 412-423 - [c13]Meenakshi Suresh, V. Anil Kumar, M. Sethumadhavan, P. P. Amritha:
Exploitation of HTTP/2 Proxies for Cryptojacking. SSCC 2019: 298-308 - 2018
- [j4]Aswin Gopalakrishnan, Emanuele Vineti, Ashok Kumar Mohan
, M. Sethumadhavan:
The Art of Piecewise Hashing: A StepToward Better Evidence Provability. J. Cyber Secur. Mobil. 7(1-2): 109-130 (2018) - [c12]V. Srinidhi, K. V. Lakshmy, Madathil Sethumadhavan:
HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks. SSCC 2018: 231-241 - 2017
- [c11]Kanakkath Praveen, M. Sethumadhavan:
On the extension of XOR step construction for optimal contrast grey level visual cryptography. ICACCI 2017: 219-222 - [c10]R. Krithika, Ashok Kumar Mohan
, M. Sethumadhavan
:
Jordan Center Segregation: Rumors in Social Media Networks. SSCC 2017: 146-158 - [c9]R. Krishna Ram Prakash, P. P. Amritha, M. Sethumadhavan
:
Opaque Predicate Detection by Static Analysis of Binary Executables. SSCC 2017: 250-258 - [c8]Kanakkath Praveen, G. Indu, R. Santhya, M. Sethumadhavan
:
An Android Application for Secret Image Sharing with Cloud Storage. SSCC 2017: 399-410 - 2016
- [j3]Puliparambil Megha Mukundan, Sindhu Manayankath
, Chungath Srinivasan, Madathil Sethumadhavan
:
Hash-One: a lightweight cryptographic hash function. IET Inf. Secur. 10(5): 225-231 (2016) - [j2]Thomas W. Cusick, K. V. Lakshmy
, Madathil Sethumadhavan
:
Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya's theorem approach. J. Math. Cryptol. 10(3-4): 145-156 (2016) - [c7]P. P. Amritha, Rithu P. Ravi, M. Sethumadhavan
:
Active Steganalysis on SVD-Based Embedding Algorithm. FICTA (1) 2016: 777-785 - 2014
- [j1]K. V. Lakshmy
, Madathil Sethumadhavan
, Thomas W. Cusick:
Counting rotation symmetric functions using Polya's theorem. Discret. Appl. Math. 169: 162-167 (2014) - [c6]K. Nimmy
, M. Sethumadhavan
:
Novel mutual authentication protocol for cloud computing using secret sharing and steganography. ICADIWT 2014: 101-106 - [c5]Kanakkath Praveen, K. Rajeev, M. Sethumadhavan
:
On the Extensions of (k, n)*-Visual Cryptographic Schemes. SNDS 2014: 231-238 - [c4]M. Sindhu, M. Sethumadhavan
:
On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q = p, prime). SNDS 2014: 512-519 - [c3]Kanakkath Praveen, M. Sethumadhavan:
Results on (2, n) Visual Cryptographic Scheme. SSCC 2014: 335-340 - 2012
- [c2]Hiran V. Nath, K. Gangadharan, M. Sethumadhavan:
Reconciliation engine and metric for network vulnerability assessment. SECURIT 2012: 9-21 - [c1]I. Praveen
, M. Sethumadhavan
:
A more efficient and faster pairing computation with cryptographic security. SECURIT 2012: 145-149 - 2011
- [p2]Chungath Srinivasan, K. V. Lakshmy, Madathil Sethumadhavan:
Complexity Measures of Cryptographically Secure Boolean Functions. Cyber Security, Cyber Crime and Cyber Forensics 2011: 220-230 - [p1]M. Sindhu, S. Kumar Sajan, M. Sethumadhavan:
Error Linear Complexity Measures of Binary Multisequences. Cyber Security, Cyber Crime and Cyber Forensics 2011: 240-249 - [e1]Raghu Santanam, M. Sethumadhavan, Mohit Virendra:
Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives. IGI Global 2011, ISBN 978-1-60960-123-2 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-12 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint