Cloudlet services for healthcare applications in mobile cloud computing R Somula, C Anilkumar, B Venkatesh, A Karrothu, CS Pavan Kumar, ... Proceedings of the 2nd International Conference on Data Engineering and …, 2019 | 33 | 2019 |
Digital forensic evidence collection of cloud storage data for investigation S Easwaramoorthy, S Thamburasa, G Samy, SB Bhushan, K Aravind 2016 International Conference on Recent Trends in Information Technology …, 2016 | 18 | 2016 |
An efficient key management infrastructure for personal health records in cloud S Easwarmoorthy, F Sophia, A Karrothu 2016 International Conference on Wireless Communications, Signal Processing …, 2016 | 8 | 2016 |
Heterogeneous classifier model for e-mail spam classification using FSO feature selection method S Easwaramoorthy, S Thamburasa, K Aravind, SB Bhushan, H Rajadurai 2016 International Conference on Inventive Computation Technologies (ICICT …, 2016 | 7 | 2016 |
Digital forensic analysis of cloud storage data in IDrive and Mega cloud drive S Thamburasa, S Easwaramoorthy, K Aravind, SB Bhushan, U Moorthy 2016 International Conference on Inventive Computation Technologies (ICICT …, 2016 | 7 | 2016 |
A comprehensive review on secure data sharing in cloud environment SK Kotha, MS Rani, B Subedi, A Chunduru, A Karrothu, B Neupane, ... Wireless Personal Communications 127 (3), 2161-2188, 2022 | 6 | 2022 |
An analysis of LPN based HB protocols A Karrothu, J Norman 2016 Eighth International Conference on Advanced Computing (ICoAC), 138-145, 2017 | 5 | 2017 |
An efficient method for group key management in Internet of Things using machine learning approach A Karrothu, J Norman Evolutionary Intelligence 14, 445-452, 2021 | 3 | 2021 |
Group and hierarchical key management for secure communications in internet of things A Karrothu, J Norman International Journal of Communication Systems 33 (13), e3859, 2020 | 3 | 2020 |
A systematic analysis of identity based encryption (IBE) A Karrothu, J Norman International Journal of Knowledge-based and Intelligent Engineering Systems …, 2021 | 1 | 2021 |
Analysis of identity-based cryptography in Internet of Things (IoT) A Karrothu, J Norman Architecture and Security Issues in Fog Computing Applications, 64-82, 2020 | 1 | 2020 |
Experimental and comparative analysis of packet sniffing tools C Anilkumar, D Paul Joseph, V Madhu Viswanatham, A Karrothu, ... Proceedings of the 2nd International Conference on Data Engineering and …, 2019 | 1 | 2019 |
Recognition and Processing of phishing Emails Using NLP: A Survey C Anilkumar, A Karrothu, NS Mouli, CB Tej 2023 International Conference on Computer Communication and Informatics …, 2023 | | 2023 |
An Escrow-Free and Authenticated Group Key Management in Internet of Things A Karrothu, C Anilkumar, VE Sathishkumar Smart Intelligent Computing and Applications, Volume 2: Proceedings of Fifth …, 2022 | | 2022 |
Framework for Statistical Machine Recognition and Translation of Ancient Tamil Script C Anilkumar, A Karrothu, G Aishwaryalakshmi Smart Intelligent Computing and Applications, Volume 2: Proceedings of Fifth …, 2022 | | 2022 |