Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Sreela Sreedhar"'
Publikováno v:
2022 3rd International Conference on Smart Electronics and Communication (ICOSEC).
Publikováno v:
Indian Journal of Science and Technology. 9:1-5
Background/Objectives: Privacy is considered as non-compromising demand of the user in utilities where the user’s private and vital information such as user name, user transaction details, user ID, and other specific particulars are used. In this s
Autor:
Arathi k Chandran, Sreela Sreedhar
Publikováno v:
International Journal of Research in Engineering and Technology. :48-52
Secure Speech with LFSR presents an encryption meth od for compressed and watermarked speech signal. Th ere are several number of techniques available for watermarking, compressi on and encryption purpose, but there are various fl aws in these techni
Autor:
Sreela Sreedhar, Vandana Purushothaman
Publikováno v:
2016 Online International Conference on Green Engineering and Technologies (IC-GET).
In order to share a secret information among a group of participants, the method of secret sharing is used. The secret sharing method that is used to share or encrypt images is called Visual Cryptography. The main problems that subsist in Visual Cryp
Autor:
Sreela Sreedhar, Sisily Sibichen
Publikováno v:
2013 Annual International Conference on Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy.
Openly available communication signals, in wireless adhoc network poses high security risk. The adhoc networks are very much vulnerable to Dos attacks on the network layer. Blackhole and Grayhole attacks are the widespread attacks on adhoc networks.