Design of pseudo-random number generator from turbulence padded chaotic map

S Krishnamoorthi, P Jayapaul, RK Dhanaraj… - Nonlinear …, 2021 - Springer
Transmission of the information in any form requires security. Security protocols used for
communication rely on the use of random numbers. Pseudo-random numbers are required …

Cancelable Iris template for secure authentication based on random projection and double random phase encoding

V Rajasekar, J Premalatha, K Sathya - Peer-to-Peer Networking and …, 2021 - Springer
Biometric recognition approaches have overwhelmed major issues in traditional
authentication systems. Privacy invasion and security are the needed features in the …

A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments

S Ullah, Z Jiangbin, MT Hussain, N Din, F Ullah… - Journal of Information …, 2022 - Elsevier
Abstract In modern cryptography, Light Weighted Environments (LWE) refer to low-
constrained environments (Pelzl et al., 2003) such as smartphones and other electronic …

Enhanced WSN routing protocol for internet of things to process multimedia big data

V Rajasekar, P Jayapaul, S Krishnamoorthi… - Wireless Personal …, 2022 - Springer
Due to the massive use of wireless Internet of Things (IoT), the advent of multimedia-big-
data in recent decades poses numerous obstacles for successful contact with the virtual era …

Introduction to classical cryptography

V Rajasekar, J Premalatha… - Quantum Blockchain …, 2022 - Wiley Online Library
In today's world, with societies of information that transmits a growing number of personal
data via public channels, the protection of information is a global challenge. It is the …

An Enhanced Anti-phishing Scheme to Detect Phishing Website

V Rajasekar, J Premalatha, K Sathya… - IOP Conference …, 2021 - iopscience.iop.org
Phishing is a network attack in which attacker generates a replica of current legitimate site to
contrivance the users into submitting their personal and sensitive information. A good anti …

Cybersecurity in 5G and IoT Networks

V Rajasekar, J Premalatha, M Saracevic - Secure Communication for 5G …, 2022 - Springer
Abstract 5G is generally regarded as a major improvement over 4G in terms of data
encryption and network consumer authentication. 5G would be a physical transformation of …

[PDF][PDF] Analysis and Improvement of Some Signcryption Schemes Based on Elliptic Curve

MZU Bashir - PhD diss., CAPITAL UNIVERSITY, 2022 - cust.edu.pk
Signcryption is a new technique in cryptography that fulfills the security requirements of
encryption and digital signature in a single logical step. This helps in reducing the …

Design and development of digital e-library

V Rajasekar, J Varthini R - AIP Conference Proceedings, 2021 - pubs.aip.org
Digital libraries are platforms that allow users to access structured information in a
knowledge-based repository of data and access. In the end, the availability of good content …

[PDF][PDF] MASK AND TEMPERATURE DETECTION SYSTEM USING TRANSFER LEARNING FOR PROTECTION AGAINST COVID-19

D Bisht, N Singhal, D Hara, M Sabharwal - researchgate.net
Businesses have challenges during COVID-19 era to upgrade their present structure and to
be more prompt, risk-free, and useful for worker, customers, and the people. With ongoing …