Title | Authors | Month, Year | Publication details |
---|---|---|---|
Blockchain Powered Supply Chain Management in Small and Medium Scale Industries | Anand Haridas, Thahseen Shadat, Fathima Nazrin S., Devaprasad V., Diya S. | Jun 2021 | International Research Journal of Modernization in Engineering Technology & Science. Volume:03, Issue:06, June-2021 |
Handbook of Blockchain Basics | Anand Haridas | Apr 2021 | Amazon Kindle e-book. |
To Design Smart and Secure Purchasing System Integrated with ERP using Blockchain Technology. | Anand Haridas, Juhi Shree, Dhanush G. A., Priyanka Kumar, Anala Sravani, Kanimozhi N. R. | Nov 2020 | 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA). DOI: 10.1109/ICCCA49541.2020.9250884 |
RM Chain: A Block Chain System for Risk Monitoring in Supply Chain Network | Anand Haridas | Aug 2020 | Journal of Network Security Computer Networks Volume-6, Issue-2 (May-August, 2020) |
Blockchain Based Crowd Funding for Startups | Anand Haridas, Mrudula R., Bavitha B., Clincy Baby, Aswathy M. | May 2020 | International Journal of Scientific Research & Development (IJSRD), vol. 8, issue 3 |
S Chain: A Block Chain System for Small and Medium Sized Enterprises | Anand Haridas, Mrudula R., Clincy Baby | 2020 | International Journal of Current Engineering and Scientific Research Orgnization, vol. 7, issue 2 |
Puzzle Based Highly Secure Steganography | Siva Shankar S. | Feb. 2017 | ICAMMAET Conference |
A Robust Image Encryption in Semantic Content for High Security | Siva Shankar S., Rangarjan Alwar, M. Rajeshkhanna, Rajasekaran S. | Sept. 2016 | International Journal of Control Theory and Applications |
Entity Recognition in Malayalam Using Fuzzy Support Vector Machine | Lakshmy G., Janu R. Panikar, Meera M. | Aug. 2016 | International Conference in Information Science |
Data Hiding in Encrypted Images Using Arnold Transform | Siva Shankar S., A. Rangarajan | Aug. 2016 | ICTACT Journal on Image and Video Processing, vol. 7, issue 1 |
A comparative study in image compression using halftoning based block truncation coding for color image | Meharban M. S., Priya S. | Apr. 2016 | International Journal on Cybernetics and Informatics, vol. 5, issue 2 |
A Review on Image Retrieval Technique | Meharban M. S., S. Priya | Apr. 2016 | Bonfiring International Journal of Advances in Image Processing, vol. 6, issue 2 |
QR Code Security Using Proxy Re-Encryption | Akhil N.V., Athira S., Vijay, Deepa S. Kumar | Mar. 2016 | International Conference on Circuit, Power and Computing Technologies |
A Hybrid Scheme of DDBTC Encoding and CCF, BPF Extraction for Image Retrieval Process with Relevance Feedback | Meharban M. S., S. Priya | Feb. 2016 | International Journal for Engineering and Future Technology, vol. 1, issue 1 |
DSPAA: A Data Sharing Platform with Automated Annotation | Keethana I. P., T. Aby Abahai | Feb. 2016 | Elsevier International Conference on Computational Modeling and Security, vol. 85 |
Secure Two Factor Authentication using QR | Akhil N.V., D. S. Kumar | Jan. 2016 | Joint International Conference ICPCIT 2016 and ICAIECES 2016 |
Color Visual Cryptography Scheme for Natural Image Using Complement Cover and Share Authentication | Dr. R. Ramesh Kumar, S. Chandramathi | Jan. 2016 | Asian Journal of Information Technology |
A survey on selection of efficient web service based on service quality | Arun S., Aravind Srinivas C. V., Johith Sundar, Roshan Sanu | Jan. 2016 | International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, issue 1 |