The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

K. P. Subbalakshmi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi
    High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:309-324 [Conf]
  2. Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi
    On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:448-458 [Conf]
  3. Mohamed A. Haleem, K. P. Subbalakshmi
    Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels. [Citation Graph (0, 0)][DBLP]
    DCC, 2007, pp:383- [Conf]
  4. Ning Liu, K. P. Subbalakshmi
    Worst Case Attack on Quantization Based Data Hiding. [Citation Graph (0, 0)][DBLP]
    ISM, 2006, pp:679-684 [Conf]
  5. Rajarathnam Chandramouli, S. Bapatla, K. P. Subbalakshmi, R. N. Uma
    Battery power-aware encryption. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:162-180 [Journal]
  6. Goce Jakimoski, K. P. Subbalakshmi
    On Efficient Message Authentication Via Block Cipher Design Techniques. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:232-248 [Conf]
  7. Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli
    Steganalysis of GIM-based data hiding using kernel density estimation. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:149-160 [Conf]
  8. Chetan Nanjunda Mathur, K. P. Subbalakshmi
    Energy Efficient Wireless Encryption. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  9. Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi
    Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:4, pp:313-324 [Journal]
  10. Yiping Xing, Chetan Nanjunda Mathur, Mohamed A. Haleem, Rajarathnam Chandramouli, K. P. Subbalakshmi
    Dynamic Spectrum Access with QoS and Interference Temperature Constraints. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:4, pp:423-433 [Journal]

  11. Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks. [Citation Graph (, )][DBLP]


  12. Towards Secure Spectrum Decision. [Citation Graph (, )][DBLP]


  13. Detecting Hidden Messages Using Image Power Spectrum. [Citation Graph (, )][DBLP]


  14. Gender identification from E-mails. [Citation Graph (, )][DBLP]


  15. Impact of Constraints on the Complexity of Dynamic Spectrum Assignment. [Citation Graph (, )][DBLP]


  16. Current trends in steganalysis: a critical survey. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002