Search Results - "V, Panchami"

Refine Results
  1. 1

    A Substitution Box for Lightweight Ciphers to Secure Internet of Things by Panchami, V., Mathews, Mahima Mary

    “…The Internet of Things is a resource-constrained device that demands lightweight cryptographic solutions to achieve high performance and optimal security. In…”
    Get full text
    Journal Article
  2. 2

    Quantum Cryptanalysis of Affine Cipher by Mathews, Mahima Mary, V, Panchami, Ajith, Vishnu

    “…Quantum Algorithms reduce the computational complexity or solve certain difficult problems that were originally impossible to solve with classical computers…”
    Get full text
    Journal Article
  3. 3

    QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks by Mary Mathews, Mahima, V., Panchami

    “…Delay tolerant networks supporting heterogeneous communication are a promising network architecture solution that can meet today’s communication requirements…”
    Get full text
    Journal Article
  4. 4
  5. 5

    A Blockchain-assisted lightweight privacy preserving authentication protocol for peer-to-peer communication in vehicular ad-hoc network by Payattukalanirappel, Sharon Justine, Vamattathil, Panchami V, Cheeramthodika, Mohammed Ziyad C

    Published in Peer-to-peer networking and applications (01-11-2024)
    “…Vehicular Ad-Hoc Network (VANET), provides considerable real-time traffic information services that enhance safety and traffic effectiveness. However, as most…”
    Get full text
    Journal Article
  6. 6

    Dynamic colour table: A novel S‐box for cryptographic applications by V, Panchami, Paul, Varghese, Wahi, Amitabh

    “…Summary In cryptography, S‐boxes play an important role in symmetric ciphers. S‐boxes are used for substitution process to enable diffusion in encryption and…”
    Get full text
    Journal Article
  7. 7

    An integrative analysis to identify pancancer epigenetic biomarkers by V U, Panchami, T I, Manish, K K, Manesh

    Published in Computational biology and chemistry (01-12-2024)
    “…Integrating and analyzing the pancancer data collected from different experiments is crucial for gaining insights into the common mechanisms in the molecular…”
    Get full text
    Journal Article
  8. 8

    Frequency Analysis Attack on Ceaser Cipher using Quantum Support Vector Machine by Ajith, Vishnu, Mathews, Mahima Mary, V, Panchami

    “…Quantum technology accelerated computing may have the capacity to provide solutions that are much better compared to their best known classical solutions…”
    Get full text
    Conference Proceeding
  9. 9

    A Survey on Consensus Algorithms in Blockchain Based on Post Quantum Cryptosystems by Jose, Jisha Mary, V, Panchami

    “…Blockchain is a distributed, decentralized ledger mechanism with a various features. It is used in diverse applications nowadays, from financial sector to…”
    Get full text
    Conference Proceeding
  10. 10

    Effect of Combining Nano- and Microfillers for the Assessment of Thermal Class of Glass Fiber-Reinforced Epoxy Composites for Outdoor Insulation by Suchitra, M., Vinay, B. K., Parameshwara, S., Umashankar, M., Panchami, S. V.

    “…The present work was taken up with the objective to develop a compact and reliable hybrid composite insulation, investigate the thermal properties of the…”
    Get full text
    Journal Article
  11. 11

    A Novel Multiplicative Substitution Cryptosystem by Rajesh, Vemulapalli, V., Panchami

    “…A cryptosystem primarily used for data encryption and data security. Nowadays the misuse of confidential information by unauthorized parties became a very big…”
    Get full text
    Conference Proceeding
  12. 12

    Bladder Cancer Prediction Using Genetic Algorithm and Fuzzy Rule-Based System by U, Panchami V, I, Manish T

    “…The aberrations in the DNA Methylation levels are known cause diseases like Cancer by regulating the gene expression. The effect of DNA Methylation in Bladder…”
    Get full text
    Conference Proceeding
  13. 13

    Real-time Scene Change Detection with Object Detection for Automated Stock Verification by Yedla, Sandeep Kumar, Manikandan, V.M., Panchami, V.

    “…Automation is a process of utilizing technology to reduce human efforts. In this paper, we propose a computer vision-based automated system for stock…”
    Get full text
    Conference Proceeding
  14. 14

    A novel approach for predicting the length of hospital stay with DBSCAN and supervised classification algorithms by Panchami, V. U., Radhika, N.

    “…Patient length of stay is the most commonly employed outcome measure for hospital resource consumption and to monitor the performance of the hospital…”
    Get full text
    Conference Proceeding
  15. 15

    A Review on Federated Learning with a Focus on Security and Privacy by Mathew, Amala, V, Panchami

    “…Federated Learning (FL) enables the collaborative training of a global model without centralizing data, effectively addressing privacy concerns in the field of…”
    Get full text
    Conference Proceeding
  16. 16

    "The effect of combining nano and micro fillers for the assessment of thermal class of glass fiber reinforced epoxy composites for outdoor insulation" by Suchitra, M, Vinay, B K, Parameshwara, S, Umashankar, M, Panchami, S V

    “…The present work was taken up with the objective to develop a compact and reliable hybrid composite insulation, investigate the thermal properties of the…”
    Get full text
    Journal Article
  17. 17
  18. 18

    BISC authentication algorithm: An efficient new authentication algorithm using three factor authentication for mobile banking by Shaju, Shilpa, Panchami, V.

    “…Mobile banking, is a hottest topic in the development of banking sector which is expected to be replaced by online or net banking in the near future. Mobile…”
    Get full text
    Conference Proceeding
  19. 19

    An encryption protocol for end-to-end secure transmission of SMS by Thomas, Minta, Panchami, V.

    “…Short Message Service (SMS) is a process of transmission of short messages over the network. SMS is used in daily life applications including mobile commerce,…”
    Get full text
    Conference Proceeding
  20. 20

    Date time keyed - HMAC by Mathews, Mahima Mary, Panchami, V.

    “…Data integrity and Data Origin Integrity is major factor that develops or measures the trust between the communicators in any sort of communication …”
    Get full text
    Conference Proceeding