Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey
Dharshini, P, Arokia Renjith, J, Mohan Kumar, P
Published in Security and communication networks (01.12.2016)
Published in Security and communication networks (01.12.2016)
Get full text
Journal Article
Smart Spotting of Pulmonary TB Cavities Using CT Images
Selvam, L., Swanly, V. Ezhil, Kumar, P. Mohan, Renjith, J. Arokia, Arunachalam, M., Shunmuganathan, K. L.
Published in Computational and mathematical methods in medicine (01.01.2013)
Published in Computational and mathematical methods in medicine (01.01.2013)
Get full text
Journal Article