Unleashing the power of disruptive and emerging technologies amid COVID-19: A detailed review S Agarwal, NS Punn, SK Sonbhadra, M Tanveer, P Nagabhushan, ... arXiv preprint arXiv:2005.11507, 2020 | 109 | 2020 |
Terrain classification for traversability analysis for autonomous robot navigation in unknown natural terrain P Mathur, KS Pandian IJEST 4 (1), 38-49, 2012 | 17 | 2012 |
Traversability assessment of terrain for autonomous robot navigation K SoundraPandian, P Mathur Proceedings of the International MultiConference of Engineers and Computer …, 2010 | 17 | 2010 |
Dynamic Hash key‐based stream cipher for secure transmission of real time ECG signal KKS Pandian, KC Ray Security and Communication Networks 9 (17), 4391-4402, 2016 | 15 | 2016 |
Remote-access real-time laboratory: process monitoring and control through the internet protocol KK SoundraPandian, M Rao, S Khandekar International Journal of Mechanical Engineering Education 36 (3), 207-220, 2008 | 14 | 2008 |
An alternative practical public-key cryptosystems based on the Dependent RSA Discrete Logarithm Problems SK Tripathi, B Gupta, KKS Pandian Expert Systems with Applications 164, 114047, 2021 | 10 | 2021 |
Environment monitoring and control of a polyhouse farm through internet YR Sonawane, S Khandekar, BK Mishra, KKS Pandian World Bank: India Country Overview 6, 2008 | 10 | 2008 |
Cryptographic challenges and security in post quantum cryptography migration: A prospective approach AK Pandey, A Banati, B Rajendran, SD Sudarsan, KKS Pandian 2023 IEEE International Conference on Public Key Infrastructure and its …, 2023 | 9 | 2023 |
FPGA implementation of stream cipher using Toeplitz Hash function S Pal, KKS Pandian, KC Ray 2014 International Conference on Advances in Computing, Communications and …, 2014 | 9 | 2014 |
Five decade evolution of feedback shift register: algorithms, architectures and applications KKS Pandian, KC Ray International Journal of Communication Networks and Distributed Systems 15 …, 2015 | 8 | 2015 |
Revisiting the security of static masking and compaction: Discovering new vulnerability and improved scan attack on aes Y Sao, KKS Pandian, SS Ali 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2020 | 7 | 2020 |
Unleashing the power of disruptive and emerging technologies amid COVID-19: A detailed review. arXiv S Agarwal, NS Punn, SK Sonbhadra, M Tanveer, P Nagabhushan, ... arXiv preprint arXiv:2005.11507, 2020 | 7 | 2020 |
Low power testing of CMOS circuits: a review M Shakya, KKS Pandian Proceedings of the National Conference on Signal Processing, Communication …, 2009 | 7 | 2009 |
Unleashing the power of disruptive and emerging technologies amid COVID 2019: A detailed review. arXiv 2020 S Agarwal, NS Punn, SK Sonbhadra, P Nagabhushan, K Pandian, ... arXiv preprint arXiv:2005.11507, 0 | 7 | |
Mapping the research impact of collaboration and networking of ICAR fisheries research institutes in India: A scientometric study B Dasari, P Krishnan, G Kantharajan, S Agarwal, M Hemalatha, ... Indian Journal of Fisheries 69 (1), 1-21, 2022 | 4 | 2022 |
Invertible secret sharing: Using meaningful shadows based on Sorted Indexed Code SK Tripathi, S Badiya, KKS Pandian, B Gupta, H AlKhzaimi Optik 224, 165658, 2020 | 4 | 2020 |
The shortest register with non-linear update for generating a given finite or periodic sequence SK Tripathi, B Gupta, KKS Pandian IEEE Communications Letters 24 (6), 1173-1177, 2020 | 4 | 2020 |
Hybrid image sharing scheme using non-recursive hash key based stream cipher SK Tripathi, B Gupta, KKS Pandian Multimedia Tools and Applications 78 (8), 10837-10863, 2019 | 4 | 2019 |
Non‐singular sequence folding‐based pseudorandom key generation algorithm for cryptographic processor KK Soundra Pandian, KC Ray Security and Communication Networks 8 (18), 4019-4027, 2015 | 3 | 2015 |
Design and implementation of lightweight dynamic elliptic curve cryptography using schoof’s algorithm A Tyagi, KKS Pandian, S Khan International Conference on Computing Science, Communication and Security …, 2021 | 2 | 2021 |