Items where Author is "Kishore, B"
Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 28.

Article

Bhat, Chethan R and Kishore, B (2018) Reversible data hiding in encrypted images with RSA and Elgamal algorithm. International Journal of Engineering and Technology(UAE), 7 (4). pp. 3437-3441. ISSN 2227-524X

Sinha, Nishith and Bhowmick, Anirban and Kishore, B (2015) Encrypted Information Hiding using Audio Steganography and Audio Cryptography. International Journal of Computer Applications, 112 (5). pp. 49-53. ISSN 0975 – 8887

Krishna, Vishal and Kumar, Ayush and Kishore, B (2015) Textural Feature Extraction of Natural Objects for Image Classification. International Journal of Image Processing, 9 (6). pp. 320-334.

Kishore, B and Hegde, Govardhan (2014) The Need, Use, Analysis And Efficiency Of Intrusion Detection System In Web-Based Environment. International Journal of Advanced Computational Engineering and Networking, 2 (9). pp. 75-79. ISSN 2320-2106

Sinha, Nishith and Kishore, B (2014) Improving Security of Vigenère Cipher by Double Columnar Transposition. International Journal of Computer Applications, 100 (14). ISSN 0975 – 8887

Sinha, Nishith and Chawda, Mallika and Kishore, B (2014) Enhancing Security of Improved RC4 Stream Cipher by Converting into Product Cipher. International Journal of Computer Applications, 94 (18). pp. 17-21. ISSN 0975 – 8887

Selvan, Siva and Arjunan, Vijaya R and Kishore, B and Babu, Ganesh C (2014) An Elliptic Curve Arithmetic based Private Credentials System that uses Schnorr Blind Signature Scheme. International Journal of Computer Applications. ISSN 0975 – 8887

Arjunan, Vijaya R and Kishore, B and Selvan, Siva (2014) An Improved Adaptive Wavelet Thresholding Image Denoising Method. International Journal of Computer Applications. ISSN 0975 – 8887

Kishore, B and Arjunan, Vijaya R and Saha, Rupsa and Selvan, Siva (2014) Using Haralick Features for the Distance Measure Classification of Digital Mammograms. International Journal of Computer Applications. pp. 17-21. ISSN 0975 – 8887

Arjunan, Vijaya R and Ramya, . and Kishore, B (2013) Data Staging under Supply Planning Landscape. CiiT International Journal of Data Mining and Knowledge Engineering., 5 (5). pp. 209-215. ISSN 0974-9691

Verma, Anuj and Kishore, B (2013) A survey of memory based methods for collaborative filtering based techniques for online recommender systems. International Journal of Computer Engineering and Technology (IJCET), 4 (2). pp. 366-372. ISSN 0976 – 6375

Reddy, Boreddy Nikhil and Acharya, Nimit and Kishore, B (2012) A Novel Methodology to Protect from Attacks using Multiple Hashing Algorithms. International Journal of Computer Applications, 59 (17). pp. 38-41. ISSN 0975 – 8887

Kishore, B and Nagaraj, Srinivasan and Muppidi, Satish (2012) Optimistic way of Accessing Open Storage using Collaborative Approach. International Journal of Electronics and Computer Science Engineering. pp. 502-507. ISSN 2277-1956

Conference or Workshop Item

Anirban, Bhowmick and Sinha, Nishith and Vijaya, Arjunan and Kishore, B (2017) Permutation-Substitution Architecture Based Image Encryption Algorithm Using Middle Square and RC4 PRNG. In: International Conference on Inventive Systems and Control, Coimbatore.

Kishore, B and Hegde, Govardhan (2014) The Need, Use, Analysis And Efficiency Of Intrusion Detection System In Web-Based Environment. In: International Conference on Computer Science and Mechanical Engineering, July 13th, 2014, Vizag, India.

Sivaselvan, N and Arjunan, Vijaya R and Kishore, B and Babu, Ganesh C (2014) An Elliptic Curve Arithmetic Based Private Credentials System that Uses Schnorr Blind Signature Scheme. In: Fourth International Conference On Advanced Computing & Communication Technologies For High Performance Applications, June 19-21, 2014.

Arjunan, Vijaya R and Kishore, B and Sivaselvan, N (2014) An Improved Adaptive Wavelet Thresholding Image Denoising Method. In: Fourth International Conference On Advanced Computing & Communication Technologies For High Performance Applications, June 19-21, 2014.

Kishore, B and Arjunan, Vijaya R and Saha, Rupsa and Selvan, Siva (2014) Using Haralick Features for the Distance Measure classification of Digital Mammograms. In: Fourth International Conference On Advanced Computing & Communication Technologies For High Performance Applications, June 19-21, 2014.

Kishore, B and Nagaraj, Srinivasan and Babu, Ganesh C (2014) OptimisticWay to Mobile Performance Using Checkpointing Algorithm. In: International conference on Advanced Computer Theory and Engineering (ICACTE), May 18th, 2014.

Arjunan, Vijaya R and Kishore, B (2013) An Efficient Approach for Salt and Pepper Noise Minimization using Multi Stage Thresholding and Image Restoration. In: International Conference on Convergence of Science, Engineering & Management in Education and Research – A Global perspective., 26-27 Sept 2013.

Arjunan, Vijaya R and Mahalingam, Siva Chandra B and Kishore, B (2013) Automated Finger Print Authentication System. In: International Conference on Recent Trends in Engineering and Technology , 15th &16th March 2013, Kodaikanal, Tamilnadu.

Kishore, B and Kumar, Vijaya V and Arjunan, Vijaya R (2013) A Study on Digital Mammography: Microcalcification Detection and Classification based on Wavelets. In: International Conference on Recent Trends in Engineering and Technology , 15th &16th March 2013, Kodaikanal, Tamilnadu.

Kishore, B and Gampala, Veerraju and Muppidi, Satish (2013) Route Optimization of IPV6. In: National Conference on Recent Trends in Information Technology at PVP Siddhartha Inst. of Technology, , 22nd Feb, 2013, Vijayawada. A.P.

Nagaraj, Srinivasan and Raju, D S V P and Kishore, B (2013) A New Substitution Block Cipher using Genetic Algorithm. In: Proceedings of International Conference on, Berlin Heidelberg .

Nagaraj, Srinivasan and Raju, D S V P and Kishore, B (2013) Randomized Approach for Block Cipher Encryption. In: Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications , Jan 2013.

Kishore, B and Karanth, Shyam S (2012) The Need, Use and Efficiency of Trustworthy Security Model in Cloud Computing for Information Assurance. In: International Conference on Cloud Computing, Technologies, Applications and Management (ICCCTAM – 12), Dec 2012, BITS Pilani, Dubai Campus.

Kishore, B (2012) E-commerce Security: The Need, Use and Efficiency of Encryption Methods for Secure E-commerce Websites. In: Proceedings of 2nd International Conference on Computer Applications 2012 [ICCA 2012], June 2012, Pondicherry India.

Kishore, B and Arjunan, Vijaya R and Kumar, Vijaya V (2012) FPGA usage in Real time Steganography. In: Proceedings of International Conference on Recent Advances in Computer Sciences-ICRACS2012, 2012.

This list was generated on Wed Mar 20 16:31:42 2019 UTC.