|
Search the dblp DataBase
K. P. Subbalakshmi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:309-324 [Conf]
- Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:448-458 [Conf]
- Mohamed A. Haleem, K. P. Subbalakshmi
Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels. [Citation Graph (0, 0)][DBLP] DCC, 2007, pp:383- [Conf]
- Ning Liu, K. P. Subbalakshmi
Worst Case Attack on Quantization Based Data Hiding. [Citation Graph (0, 0)][DBLP] ISM, 2006, pp:679-684 [Conf]
- Rajarathnam Chandramouli, S. Bapatla, K. P. Subbalakshmi, R. N. Uma
Battery power-aware encryption. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:162-180 [Journal]
- Goce Jakimoski, K. P. Subbalakshmi
On Efficient Message Authentication Via Block Cipher Design Techniques. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:232-248 [Conf]
- Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli
Steganalysis of GIM-based data hiding using kernel density estimation. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:149-160 [Conf]
- Chetan Nanjunda Mathur, K. P. Subbalakshmi
Energy Efficient Wireless Encryption. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:4, pp:313-324 [Journal]
- Yiping Xing, Chetan Nanjunda Mathur, Mohamed A. Haleem, Rajarathnam Chandramouli, K. P. Subbalakshmi
Dynamic Spectrum Access with QoS and Interference Temperature Constraints. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2007, v:6, n:4, pp:423-433 [Journal]
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks. [Citation Graph (, )][DBLP]
Towards Secure Spectrum Decision. [Citation Graph (, )][DBLP]
Detecting Hidden Messages Using Image Power Spectrum. [Citation Graph (, )][DBLP]
Gender identification from E-mails. [Citation Graph (, )][DBLP]
Impact of Constraints on the Complexity of Dynamic Spectrum Assignment. [Citation Graph (, )][DBLP]
Current trends in steganalysis: a critical survey. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|