Securing land registration using blockchain S Krishnapriya, G Sarath Procedia computer science 171, 1708-1715, 2020 | 99 | 2020 |
A survey on elliptic curve digital signature algorithm and its variants G Sarath, DC Jinwala, S Patel Computer Science & Information Technology (CS & IT)–CSCP, 121-136, 2014 | 24 | 2014 |
Securing database server using homomorphic encryption and re-encryption S Greeshma, R Jayapriya Security in Computing and Communications: Third International Symposium …, 2015 | 10 | 2015 |
Forensic sketch to real image using dcgan S Devakumar, G Sarath Procedia Computer Science 218, 1612-1620, 2023 | 9 | 2023 |
A Novel Approach for Preserving Numerical Ordering in Encrypted Data B Venugopal, G Sarath Information Technology (ICIT), 2016 International Conference on Information …, 2016 | 9 | 2016 |
A twitter-based software vulnerability alert framework using natural language processing CK Sneha, AR Thejaswi, SB Kumar, G Sarath 2023 8th International Conference on Communication and Electronics Systems …, 2023 | 8 | 2023 |
A trust network driven user authorization scheme for social cloud SP Susan, G Sarath Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th …, 2019 | 8 | 2019 |
Wheat head detection using YOLO: A comparative study NS Kumar, S Stephi, R Meenakshi, G Sarath 2022 International Conference on Automation, Computing and Renewable Systems …, 2022 | 7 | 2022 |
Privacy preservation and content protection in location based queries G Sarath, ML SH 2015 Eighth International Conference on Contemporary Computing (IC3), 325-330, 2015 | 7 | 2015 |
A hybrid proof based consensus algorithm for permission less blockchain A Suresh, AR Nair, A Lal, G Sarath 2020 Second International Conference on Inventive Research in Computing …, 2020 | 6 | 2020 |
IoT based device for fertility monitoring R Prasannan, G Sarath 2020 5th International Conference on Communication and Electronics Systems …, 2020 | 6 | 2020 |
UltraLightweight MAC protocol for RFID security using Permutation with double rotation RG Krishna, G Sarath 2017 International Conference on Technological Advancements in Power and …, 2017 | 6 | 2017 |
Finding a Trustworthy Service Provider in Online Service Oriented Trust Network RR Reghu, G Sarath 2018 International Conference on Data Science and Engineering (ICDSE), 1-5, 2018 | 4 | 2018 |
Inference detection in statistical database using frequent pattern KN Aravind, A Anand, G Sarath 2017 International Conference on Communication and Signal Processing (ICCSP …, 2017 | 4 | 2017 |
A Skill Based Image Grid Authentication Scheme D Walte, G Sarath 2018 Fourth International Conference on Computing Communication Control and …, 2018 | 3 | 2018 |
ESEC: An Ideal Secret Sharing Scheme G Sarath, S Deepu, S Sundararajan, K Achuthan Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014 …, 2015 | 2 | 2015 |
A Hybrid Trust Model for Cloud Service Provider Selection with NLP Support and Malicious User Feedback Filtering BP Poluparthi, GM Kishan, VBS Praneeth, A Manikanta, G Sarath 2021 12th International Conference on Computing Communication and Networking …, 2021 | 1 | 2021 |
Securing remote database server using fully homomorphic encryption and re-encryption G Sarath, R Jayapriya Security in Computing and Communications: Third International Symposium. 536 …, 2015 | 1 | 2015 |
Heart Attack Risk Prediction Using Advanced Machine Learning Techniques Y Bonthu, S Mannam, G Kandikunta, VG Keshagani, G Sarath 2024 15th International Conference on Computing Communication and Networking …, 2024 | | 2024 |
An Investigation of Model Poisoning Dynamics in Federated Learning Scenarios R Megha, AA Thampi, VBC Varma, G Sarath 2024 15th International Conference on Computing Communication and Networking …, 2024 | | 2024 |