M. Sethumadhavan

Orcid: 0000-0001-5476-5461

Affiliations:
  • Amrita School of Engineering, Coimbatore, India


According to our database1, M. Sethumadhavan authored at least 36 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Runtime verification on abstract finite state models.
J. Syst. Softw., 2024

An efficient composable 1-out-of-2 oblivious transfer scheme using vector decomposition.
Int. J. Adv. Intell. Paradigms, 2024

ALGAES: An Authenticated Lattice-based Generic Asymmetric Encryption Scheme.
IACR Cryptol. ePrint Arch., 2024

Construction and enumeration of balanced rotation symmetric Boolean functions.
Discret. Appl. Math., 2024

Runtime Verification on Abstract Finite State Models.
CoRR, 2024

2023
Proactive visual cryptographic schemes for general access structures.
Multim. Tools Appl., November, 2023

Analyzing Component Composability of Cloud Security Configurations.
IEEE Access, 2023

2022
Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web.
Proceedings of the Advances in Computing and Data Sciences - 6th International Conference, 2022

2021
An IND-CCA2 Secure Certificateless Hybrid Signcryption.
Wirel. Pers. Commun., 2021

Finite-state model extraction and visualization from Java program execution.
Softw. Pract. Exp., 2021

Holistic Analytics of Digital Artifacts: Unique Metadata Association Model.
Int. J. Digit. Crime Forensics, 2021

Medical Records Management Using Distributed Ledger and Storage.
Proceedings of the Advances in Computing and Data Sciences - 5th International Conference, 2021

2020
Video Game DRM: Analysis and Paradigm Solution.
Proceedings of the 11th International Conference on Computing, 2020

2019
Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations.
Multim. Tools Appl., 2019

Hardware Random Number GeneratorUsing FPGA.
J. Cyber Secur. Mobil., 2019

Anti-forensic Approach to Remove StegoContent from Images and Videos.
J. Cyber Secur. Mobil., 2019

Exploitation of HTTP/2 Proxies for Cryptojacking.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Blockchain for the Internet of Vehicles.
Proceedings of the Advances in Computing and Data Sciences, 2019

2018
The Art of Piecewise Hashing: A StepToward Better Evidence Provability.
J. Cyber Secur. Mobil., 2018

HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

2017
An Android Application for Secret Image Sharing with Cloud Storage.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Opaque Predicate Detection by Static Analysis of Binary Executables.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Jordan Center Segregation: Rumors in Social Media Networks.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

On the extension of XOR step construction for optimal contrast grey level visual cryptography.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya's theorem approach.
J. Math. Cryptol., 2016

Hash-One: a lightweight cryptographic hash function.
IET Inf. Secur., 2016

Active Steganalysis on SVD-Based Embedding Algorithm.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

2014
Counting rotation symmetric functions using Polya's theorem.
Discret. Appl. Math., 2014

Results on (2, n) Visual Cryptographic Scheme.
Proceedings of the Security in Computing and Communications, 2014

On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q = p, prime).
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

On the Extensions of (k, n)*-Visual Cryptographic Schemes.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Novel mutual authentication protocol for cloud computing using secret sharing and steganography.
Proceedings of the Fifth International Conference on the Applications of Digital Information and Web Technologies, 2014

2012
A more efficient and faster pairing computation with cryptographic security.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Reconciliation engine and metric for network vulnerability assessment.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2011
Complexity Measures of Cryptographically Secure Boolean Functions.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

Error Linear Complexity Measures of Binary Multisequences.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011


  Loading...