default search action
Deepthi P. Pattathil
Person information
- affiliation: National Institute of Technology Calicut, Kerala, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Sona Alex
, Dhanaraj Kakkanattu Jagalchandran
, Deepthi P. Pattathil
:
Privacy-Preserving and Energy-Saving Random Forest-Based Disease Detection Framework for Green Internet of Things in Mobile Healthcare Networks. IEEE Trans. Dependable Secur. Comput. 21(4): 4180-4192 (2024) - 2023
- [j31]Sreelakshmi P, Donuru Keerthi, Deepthi P. P.:
User grouping and resource management in efficient NOMA-OMA transmission scheme for infotainment message dissemination in VANETs. Trans. Emerg. Telecommun. Technol. 34(10) (2023) - [j30]Aneesh M. Koya
, P. P. Deepthi:
Efficient on-site confirmatory testing for atrial fibrillation with derived 12-lead ECG in a wireless body area network. J. Ambient Intell. Humaniz. Comput. 14(6): 6797-6815 (2023) - [j29]Sona Alex
, Dhanaraj K. J.
, Deepthi P. P.
:
Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network. ACM Trans. Priv. Secur. 26(3): 29:1-29:27 (2023) - [c16]Rathlavath Likhitha, Sreelakshmi P, Deepthi P. P., Nujoom Sageer Karat:
User Clustering and Optimum Bandwidth Allocation for Down link Multi-Carrier NOMA. TENCON 2023: 702-707 - 2022
- [j28]Sona Alex
, K. J. Dhanaraj
, P. P. Deepthi
:
Private and Energy-Efficient Decision Tree-Based Disease Detection for Resource-Constrained Medical Users in Mobile Healthcare Network. IEEE Access 10: 17098-17112 (2022) - [j27]Jesy Pachat
, Anjana Ambika Mahesh
, Deepthi P. P.
, B. Sundar Rajan
:
Embedded Index Coding With Consecutive Side Information in Vehicle to Vehicle Communication. IEEE Trans. Veh. Technol. 71(8): 9113-9118 (2022) - [j26]Sreelakshmi Pazhoor, Jesy Pachat
, Anjana Ambika Mahesh
, Deepthi P. P.
, B. Sundar Rajan
:
Index Coded - NOMA in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 71(9): 10073-10087 (2022) - [c15]Sona Alex, K. J. Dhanaraj, P. P. Deepthi:
Secure Integer Comparison Protocol For ML-based Disease Diagnosis In MHN With Energy Efficient Edge Computing. CISS 2022: 1-6 - [c14]N. Sai Mani Rohith, P. P. Deepthi:
A Novel Scheme for Adversarial Training to Improve the Robustness of DNN Against White Box Attacks. CVIP (2) 2022: 362-376 - [c13]Sreelakshmi Pazhoor, Jesy Pachat, Anjana Ambika Mahesh, P. P. Deepthi, B. Sundar Rajan:
Index Coded-NOMA in Vehicular Ad Hoc Networks. VTC Spring 2022: 1-7 - [c12]Jesy Pachat, P. P. Deepthi, B. Sundar Rajan:
Index Coded Modulation in Network to Vehicle (N2V) Communication. VTC Spring 2022: 1-7 - [c11]Sreelakshmi Pazhoor, Jesy Pachat, Nujoom Sageer Karat, Vinay Joseph, P. P. Deepthi, B. Sundar Rajan:
Optimal Index Code Design for IC-NOMA Transmission in VANETs. VTC Fall 2022: 1-7 - 2021
- [j25]V. S. Lakshmi, Deepthi Sundaran, Deepthi P. P.:
Collusion resistant secret sharing scheme for secure data storage and processing over cloud. J. Inf. Secur. Appl. 60: 102869 (2021) - [j24]Jesy Pachat
, Nujoom Sageer Karat
, Anjana Ambika Mahesh
, Deepthi P. P.
, B. Sundar Rajan
:
Index Coded PSK Modulation in Vehicle to Vehicle Communication. IEEE Trans. Veh. Technol. 70(5): 4753-4766 (2021) - [c10]Liya Mary Jacob, Sreelakshmi Pazhoor, P. P. Deepthi:
Physical Layer Security in Power Domain NOMA through Key Extraction. ICCCNT 2021: 1-7 - [c9]Jesy Pachat, Nujoom Sageer Karat, Anjana Ambika Mahesh, Deepthi P. Pattathil, B. Sundar Rajan:
Index Coded PSK Modulation in Vehicle to Vehicle Communication. VTC Spring 2021: 1-6 - [i2]Sreelakshmi Pazhoor, Jesy Pachat, Anjana Ambika Mahesh, Deepthi P. P., B. Sundar Rajan:
Index Coded - NOMA in Vehicular Ad Hoc Networks. CoRR abs/2110.11098 (2021) - 2020
- [j23]Sona Alex
, Deepthi P. Pattathil, Dhanaraj Kakkanattu Jagalchandran
:
SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby. IET Inf. Secur. 14(6): 670-682 (2020) - [j22]Amit Satish Unde
, P. P. Deepthi
:
Design and Analysis of Compressive Sensing-Based Lightweight Encryption Scheme for Multimedia IoT. IEEE Trans. Circuits Syst. II Express Briefs 67-II(1): 167-171 (2020) - [j21]Amit Satish Unde
, Deepthi P. Pattathil
:
Adaptive Compressive Video Coding for Embedded Camera Sensors: Compressed Domain Motion and Measurements Estimation. IEEE Trans. Mob. Comput. 19(10): 2250-2263 (2020) - [j20]Jesy Pachat
, Nujoom Sageer Karat, Deepthi P. P.
, B. Sundar Rajan
:
Index Coding in Vehicle to Vehicle Communication. IEEE Trans. Veh. Technol. 69(10): 11926-11936 (2020) - [i1]Jesy Pachat, Nujoom Sageer Karat, Deepthi P. P., B. Sundar Rajan:
Index Coding in Vehicle to Vehicle Communication. CoRR abs/2007.00559 (2020)
2010 – 2019
- 2019
- [j19]Aneesh M. Koya
, Deepthi P. P.:
Plug and play self-configurable IoT gateway node for telemonitoring of ECG. Comput. Biol. Medicine 112 (2019) - [j18]V. S. Lakshmi
, P. P. Deepthi:
A secure channel code-based scheme for privacy preserving data aggregation in wireless sensor networks. Int. J. Commun. Syst. 32(1) (2019) - [j17]V. S. Lakshmi
, P. P. Deepthi:
A secure regenerating code-based cloud storage with efficient integrity verification. Int. J. Commun. Syst. 32(9) (2019) - [j16]V. S. Lakshmi
, P. P. Deepthi:
An efficient scheme for secure domain medical image fusion over cloud. Multim. Tools Appl. 78(15): 20609-20636 (2019) - 2018
- [j15]Aneesh M. Koya
, Deepthi P. P.:
Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput. Networks 140: 138-151 (2018) - [j14]Amit Satish Unde, P. P. Deepthi:
Fast BCS-FOCUSS and DBCS-FOCUSS with augmented Lagrangian and minimum residual methods. J. Vis. Commun. Image Represent. 52: 92-100 (2018) - [j13]Amit Satish Unde, P. P. Deepthi:
Rate-distortion analysis of structured sensing matrices for block compressive sensing of images. Signal Process. Image Commun. 65: 115-127 (2018) - 2017
- [j12]Celine Mary Stuart, Deepthi P. Pattathil:
FPGA implementation of highly secure, hardware-efficient QC-LDPC code-based nonlinear cryptosystem for wireless sensor networks. Int. J. Commun. Syst. 30(10) (2017) - [j11]Amit Satish Unde, P. P. Deepthi:
Block compressive sensing: Individual and joint reconstruction of correlated images. J. Vis. Commun. Image Represent. 44: 187-197 (2017) - [j10]Celine Mary Stuart, Deepthi P. Pattathil:
Nonlinear Cryptosystem Based on QC-LDPC Codes for Enhanced Security and Reliability with Low Hardware Complexity and Reduced Key Size. Wirel. Pers. Commun. 96(3): 4177-4197 (2017) - 2016
- [j9]Celine Mary Stuart
, Spandana K., Dhanaraj K. J.
, Deepthi P. Pattathil
:
Design and implementation of hardware-efficient modified Rao-Nam scheme with high security for wireless sensor networks. J. Inf. Secur. Appl. 29: 65-79 (2016) - [c8]Amit Satish Unde, Ravikumar Malla, P. P. Deepthi:
Low complexity secure encoding and joint decoding for distributed compressive sensing WSNs. RAIT 2016: 89-94 - [c7]Payingat Jilna
, P. P. Deepthi:
Light Weight Key Establishment Scheme for Wireless Sensor Networks. SPACE 2016: 124-137 - 2015
- [j8]Nishanth Augustine, Sudhish N. George, Deepthi P. Pattathil
:
An audio encryption technique through compressive sensing and Arnold transform. Int. J. Trust. Manag. Comput. Commun. 3(1): 74-92 (2015) - [j7]Sudhish N. George, Nishanth Augustine, Deepthi P. Pattathil
:
Audio security through compressive sampling and cellular automata. Multim. Tools Appl. 74(23): 10393-10417 (2015) - [j6]Celine Mary Stuart, Deepthi P. Pattathil
:
A novel low-complexity scheme for improving security of NLFG-based symmetric key cryptosystem using secure concatenated RS-QCLDPC code. Secur. Commun. Networks 8(16): 2888-2900 (2015) - [j5]Payingat Jilna
, Deepthi P. Pattathil
:
A key management technique based on elliptic curves for static wireless sensor networks. Secur. Commun. Networks 8(18): 3726-3738 (2015) - [c6]Payingat Jilna
, P. P. Deepthi, U. K. Jayaraj:
Optimized hardware design and implementation of EC based key management scheme for WSN. ICITST 2015: 164-169 - 2014
- [c5]Nishanth Augustine, Sudhish N. George, P. P. Deepthi:
Compressive Sensing Based Audio Scrambling Using Arnold Transform. SNDS 2014: 172-183 - [c4]Payingat Jilna
, P. P. Deepthi:
Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments. SNDS 2014: 520-529 - [c3]Abhishek Kolazi, Sudhish N. George, P. P. Deepthi:
PWLCM Based Secure Measurement Matrix Generation for Secure Video Compressive Sensing. SSCC 2014: 182-191 - [c2]Celine Mary Stuart, Deepthi P. Pattathil:
Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code. SSCC 2014: 313-324 - 2012
- [c1]R. Arun Raj, Sudhish N. George, P. P. Deepthi:
An expeditious chaos based digital image encryption algorithm. RAIT 2012: 14-18
2000 – 2009
- 2009
- [j4]P. P. Deepthi, Deepa Sara John, P. S. Sathidevi:
Design and analysis of a highly secure stream cipher based on linear feedback shift register. Comput. Electr. Eng. 35(2): 235-243 (2009) - [j3]P. P. Deepthi, V. S. Nithin, P. S. Sathidevi:
Implementation and analysis of stream ciphers based on the elliptic curves. Comput. Electr. Eng. 35(2): 300-314 (2009) - [j2]P. P. Deepthi, P. S. Sathidevi:
New stream ciphers based on elliptic curve point multiplication. Comput. Commun. 32(1): 25-33 (2009) - [j1]P. P. Deepthi, P. S. Sathidevi:
Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. Comput. Secur. 28(3-4): 229-241 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint