Publications

List of Publications

Journals 2015

  1.   Raaghave Sood, P. Venkata Subba Reddy, D. Rambabu “Radio Number of 1, 2- Cartesian Product of Paths”. 23rd International Conference of FIM on Interdisciplinary Mathematical, Statictical and Computational Technique, 18-20 December, 2014
  2. U.S.N. Raju, K.V.Kadambari, P.Venkata Subba Reddy “A New Method of Assessing the Students using Video Assignments”. IEEE International Conference on IT and Engineering Pedagogy(ITEP’15) EDUCON 2015
  3. Sriram G. Sanjeevi, Srikanth.Grandhe, Himanshu. Shrivastav, Ankit. Yadav, Tapas Kumar.Mahanta, Ch.Naveen Kumar “An Adaptive Clustering and Incremental learning solution to cold start problem in Recommendation Systems”. 3rd International Conference on Computer and Intelligent Systems Dubai(ICCIS’2015)

Journals 2014:

  1.  Bhagavatula, S.S. ;Sanjeevi, S.G. ; Kumar, D. ; Yadav, C.K. , “Multi- Objective Indicator Based Evolutionary Algorithm for Portfolio Optimization” pp. 1206, IEEE International Advance Computing Conference (IACC)
  2. Rashmi Ranjan Rout, S. K. Ghosh “Adaptive Data Aggregation and Energy Efficiency using Network Coding in a Clustered Wireless Sensor Network: An Analytical Approach”, Computer Communications (Elsevier), Vol. 40, pp-65-75
  3. SG Sanjeevi, Divya Kumar, Chitranjan Kumar Yadav “Multi-Object Indicator Based Evolutionary Algorithm for Portfolio Optimization”. IEEE Xplore March 2014

Journals 2013:

  1.  Syed Taqi Ali, B. B. Amberker, “A Dynamic Constant Size Attribute Based Group Signature Scheme with Attribute Anonymity”, Int. J. of Information Privacy, Security and Integrity. (Accepted)
  2. B. R. Purushothama, B. Srinath, B B Amberker, “Secure Cloud Storage Service and Limited Proxy Re-Encryption for Enforcing Access Control in Public Cloud”, International Journal of Information and Communication, vol. 5, No. 2, pp.167 – 186.
  3. T Ramakrishnudu,R B V Sbramanyam ,“Mining positive and Negative association rules using FII-tree”, International Journal of Advanced Computer Science and Applications, Vol. 4 No.9, September 2013, pp.147-151.
  4. R.Padmavathy, Chakravarthy Bhagvati “Index Calculus Method based on Smooth Numbers of ±1 over Zp*”, International Journal on Network Security, v15(4), pp265-273
  5. Rashmi Ranjan Rout, S. K. Ghosh “Enhancement of Lifetime using Duty Cycle and Network Coding in Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, Vol. 12 (2), page: 656-667.
  6. Ayon Chakrabarty, Rashmi Ranjan Rout, Aveek Chakrabarti, S. K. Ghosh, “On Network Lifetime Expectancy with Realistic Sensing and Traffic Generation Model in Wireless Sensor Networks”, IEEE Sensors Journal, Vol. 13 (7), page: 2771-2779.
  7. Nagesh Bhattu Sristy, DVLN SOmayajulu and R B V Subramanyam “Paired Feature Constraints for Latent Dirichlet Topic Models. International Conference on Soft Computing and Pattern Recognition-2013 IEEE ISBN:978-1-4799-3400-3
  8. Swapnil Ashok Jadhav, Durvasula V. L. N. Somayajulu, S. Nagesh Bhattu, R. B. V. Subramanyam, P. Suresh “Context Dependent Bag of words generation.” In Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on (pp. 1526-1531). IEEE
  9. Swapnil Ashok Jadhav, Durvasula V. L. N. Somayajulu, S. Nagesh Bhattu, R. B. V. Subramanyam, P. Suresh “Topic dependent cross-word Spelling Corrections for Web Sentiment Analysis.” In Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on (pp. 1093-1096). IEEE.
  10. Sreekumar Vobugari, D.V.L.N. Somayajulu, B.M. Subraya, Madhan Kumar Srinivasan , “A Roadmap on Improved Performance-centric Cloud Storage Estimation Approach for Database System Deployment in Cloud Environment”, IEEE, ISBN: 978-1-4673-6068-5
  11. Nagaraj V. Dharwadkar and B. B. Amberker, “An Adaptive gray-Scale image Watermarking Scheme using Smooth and Edge areas of an image”, International Conference on Intelligent System and Signal Processing (ISSP2013), Gujarat.
  12. Sagar Gujjunoori and B. B. Amberker, “A Reversible Data Embedding Scheme for MPEG-4 Video Using HVS Characteristics”, International Conference on Intelligent System and Signal Processing (ISSP2013), Gujarat, India,
  13. B.R. Purushothama, B.B. Amberker, “Secure Group Key Managenent Scheme Based on Dual receiver Cryptosystem”, 2013 ACM Asia Public-Key Cryptography Workshop (AsiaPKC 2013), Hangzhou, China
  14. B.R. Purushothama, B.B. Amberker, “Provable Data Possession Scheme with Constant Proof Size for Outsourced Data in Public Cloud”, Second International Workshop on Cloud Computing & Identity Management (CloudID) 2013, Mysore
  15. Syed Taqi Ali, B.B. Amberker, “Short Attribute-Based Group Signature without Random Oracles with Attribute Anonymity”, International Symposium on Security in Computing and Communications (SSCC-13), Mysore
  16. B.R. Purushothama, B.B. Amberker, “Secure Multilayer Key Management Scheme With New Multilayer Rekeying Approach”, Second International Conference on Advances in Computing, Communication and Informatics (ICACCI),Mysore
  17. A. S. Poornima and B.B. Amberker, “Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks”, Ad Hoc & Sensor Wireless Networks, Vol 17, No. 3 – 4, and p.193 – 219.
  18. Syed Taqi Ali, B. B. Amberker, “Dynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard Model”, Third International Conference on Security, Privacy and Cryptographic Applications (SPACE – 2013),
  19. P. Venkata Subba Reddy and K. Viswanathan Iyer, “Conditional and Unique Conditional Colorability of Graphs,” September 22-26, 2013, Bhopal.

Journals 2012:

  1.  Nagaraj Dharwadkar and B.B. Amberker, High perceptual quality and robust color image watermarking scheme using Julian set patterns in DWT-SVD, International Journal of Tomography & Statistics, Volume 19, Issue Number 1, pp 14-31, 2012.
  2. Nagaraj V.Dharwadkar and B. B. Amberker, Secure and distortionless gray-scale medical image watermarking scheme, Journal of Medical Imaging and Health Informatics, American Scientific Publishers, Vo.2, No.3, September, 2012.
  3. Aparna R, B.B. Amberker, Key Management Schemes for Multilayer and Multiple Simultaneous Secure Group Communication, ISRN Communications and Networkworking, Volume 2012, 2012.
  4. A.S. Poornima and B.B. Amberker, Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks, Ad Hoc & Sensor Wireless Networks (Accepted)
  5. B. R. Purushothama, B B Amberker, Secure group and multi-layer group communication schemes based on polynomial interpolation, Security and Communication Networks, Wiley, DOI:10.1002/sec.607
  6. B. R. Purushothama, B. Srinath, B B Amberker, Secure Cloud Storage Service and Limited Proxy Re-Encryption for Enforcing Access Control in Public Cloud, International Journal of Information and Communication (Accepted)
  7. Siddharth Agarwal, Abhinav Rungta, Mayank Shankar, Nipun Rajan and R.Padmavathy, Improved Fast and Secure Hash Algorithm, Journal of Information and Processing Systems, v8(1), pp119-132, 2012.
  8. R. Padmavathy, Chakravarthy Bhagvati, Index Calculus Method based on Smooth Numbers of ±1 over Zp*, International Journal of Network Security, v15(1), pp 210-218, 2013.
  9. R.Padmavathy, Chakravarthy Bhagvati, Discrete Logarithm Problem using Index Calculus Method, Mathematical and Computer Modelling, (Elsevier), (SCIE) Impact Factor 1.1 v55(1-2), pp161-169, 2012.

Journals 2011:

  1. Poornima A.S, B.B.Amberker, PERSEN: Power Efficient Logical Ring based Key Management for Clustered Sensor Networks, Int. J. of Sensor Networks 2011 – Vol. 10, No.1/2 pp. 94 – 103, 2011
  2. A.S.Poornima, B.B.Amberker, Secure Data Collection Using Mobile Data Collector in Clustered Wireless Sensor Networks, IET Wireless Sensor Systems, Vol.1, No.2, pp.85–95, June, 2011.
  3. Aparna R, B.B. Amberker, Efficient Scheme to Handle Bursty Behavior in Secure Group Communication using Binomial Trees, Security and Communication Networks, John Wiley (Accepted)
  4. R. Padmavathy, Cryptanalysis of C3-PEKE protocol, International Journal of Computer Applications, v20(4), pp 22-31, 2011.
  5. R.Padmavathy, Chakravarthy Bhagvati, A Password Attack on S3-PAKE, International Journal of Security and its applications, v5(4), 2011.
  6. R.Padmavathy, Impersonating the Server Attack on Simple Three Password Key Exchange Protocol, IJCSES, v5(2), 2011.
  7. R.Padmavathy, Chakravarthy Bhagvati, A Small Sub group Attack for Recovering Ephemeral Keys in Chang and Chang Key Exchange Protocol, Journal of Computers v6(4), pp804-811, 2011.

Journals 2010:

  1. Sri Ramesh and Prof T Ramesh Model Driven Framework for Networked Application Software Generation Intl. Journal of computing July 2010.
  2. DVLN Somayajulu Professor Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining Journal of Computing Vol2 ,Issue 1, 2010.
  3. Aparna R, B.B. Amberker, A key Management Scheme for Secure Group Communication using Binomial Trees, International Journal of Network Management, Wiley, Vol. 20, pp.383 – 418, November/December 2010.
  4. Nagaraj V. Dharwadkar and B. B. Amberker, Digital Watermark Tracking using Intelligent Multi-Agents System, Special Issue , Journal of Applied Computer Science & Mathematics, No.7, pp. 53-56, February, 2010.
  5. Nagaraj V. Dharwadkar, B. B. Amberkar, An Efficient Non-blind Watermarking Scheme for Color Images using Discrete Wavelet Transformation, International Journal of Computer Applica tions, Volume 2, Number 3, pp 60-66, May, 2010.
  6. Nagaraj V. Dharwadkar, B.B. Amberker, Watermarking Scheme for Color Images using Wavelet Transform based Texture Properties and Secret Sharing, International Journal of Signal Processing, Vol. 6, No.2, pp. 93-100, 2010.
  7. Nagaraj V. Dharwadkar, B.B. Amberker, Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gray level Image Watermarking, International Journal of Image Processing, Vol. 4, No.2, pp. 89-105, 2010.
  8. Nagaraj V. Dharwadkar, B. B. Amberkar, An Efficient and secured Non-blind Watermarking Scheme for Color Images using DWT and Arnold Transformation, International Journal of Computing, Volume 9, Issue 2, pp. 183-191, June 2010.
  9. Nagaraj V. Dharwadkar, B. B. Amberkar, Steganographic Scheme for Gray-level Image using Pixel Neighborhood and LSB Substitution, International Journal of Image and Graphics, World Scientific Publishing, vol.10, Issue 4, pp. 589-607,October 2010.
  10. Nagaraj V. Dharwadkar, B. B. Amberkar, An Improved Reversible Steganography Scheme Based on Dual Cover Image, Int. J. Multimedia Intelligence and Security, Vol. 1, No. 4, pp. 336-349, 2010.
  11. Nagaraj V. Dharwadkar, B. B. Amberker, Sushil Raj Joshi, Visual Cryptography for Color Image using Color Error Diffusion International Journal on Graphics, Vision and Image Processing,vol.10,Issue 1,pp.1-8,2010.
  12. R.Padmavathy, Chakravarthy Bhagvati, Improved Index Calculus Method by using the property of Field elements of Zp*, International Journal of Applied Mathematics and Computation, v2(3), pp 49-63, 2010.
  13. R.Padmavathy, Chakravarthy Bhagvati, Solving Discrete Logarithm Problem for Ephemeral Key Recovery Chang and Chang Key Exchange Protocol, JIPS, v6(3), pp52-62, 2010.
  14. R.Padmavathy, Improved Three Party EKE protocol, Information Technology and Control, v39(3), pp 220-226, 2010.
  15. R.Padmavathy, T.Sirisha, Cryptanalysis on a Three Party Key Exchange Protocol-STPKE’, Journal of Information Processing and Systems, v6(1), pp 43-52, 2010 (KCIE), DOI : 10.3745/JIPS.2010.6.1.001, ISSN 1976-913X
  16. R.Padmavathy and Chakravarthy Bhagvati, Ephemeral Key Recovery using Index Calculus Method, Journal of Discrete Mathematical Sciences and Cryptography, v13(1), pp29-43, 2010 .
  17. R.Padmavathy, Chakravarthy Bhagvati, Improved Random Method using smooth numbers over Zp*, International Journal of Applied Mathematics and Computing, v2(3), pp 49-63, 2010.

Proceedings 2012:

  1. Purushothma B.R and B.B. Amberker, Access Control Mechanisms for Outsourced Data in Cloud, The fourth International Conference on COMmunication Systems and NETworkS (COMSNETS 2012), January 3 – 7, Bangalore, India, 2012.
  2. Sagar Gujjunoori and B.B. Amberker, A DCT Based Reversible Data Hiding Scheme for MPEG-4 Video, The International Conference on Signal, Image and Video Processing (ICSIVP) 2012, IIT Patna, Jan 13 – 14, 2012.
  3. Nagaraj Dharwadkar and B.B. Amberker, High Embedding Capacity and Fast Imaging watermarking using Reversible Contrast Mapping, The International Conference on Signal, Image and Video Processing (ICSIVP) 2012, IIT Patna, Jan 13 – 14, 2012.
  4. Purushothama B. R., and B.B. Amberker, Remote Data Checking and Dynamic Access Control schemes for Outsourced Data in Cloud, International Conference on Industrial and Intelligent Information (ICIII 2012), Singapore, March 17 – 18, 2012.
  5. Nagaraj V.Dharwadkar, B. B. Amberker, Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images, 9th International Conference on Security and Cryptography (SECRYPT), Rome, Italy, 24 – 27, July, 2012
  6. Thejaswini S, N R Sunitha, B B Amberker, Role Based Dynamic Trust Model for Routing in Mobile Wireless Sensor Networks, Sixth International Conference on Information Processing-ICIP 2012, August 10th to 12th, 2012, Bangalore, INDIA
  7. Sagar Gujjunoori and B. B. Amberker, A DCT Based Reversible Data Embedding Scheme for MPEG-4 Video Using HVS Characteristics, The Eighth Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 2012), 16 – 19 December 2012, IIT Bombay.
  8. Sagar Gujjunoori and B. B. Amberker, A DCT Based Near Reversible Data Embedding Scheme for MPEG-4 Video, Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012), Lecture Notes in Electrical Engineering Volume 221, 2013, pp 69-79
  9. B. R. Purushothama, B B Amberker, Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation, International Conference on Security in Computer Networks and Distributed Systems (SNDS-2012), CCIS- Springer, Vol 335, pp.11-22
  10. B. R. Purushothama, Kusuma Shirisha, B. B. Amberker, Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree, International Conference on Security in Computer Networks and Distributed Systems (SNDS-2012), CCIS- Springer, Vol 335, pp.135-146.
  11. B. R. Purushothama, B B Amberker, Duplication with Trapdoor Sensitive Attribute Values: A New Approach for Privacy Preserving Data Publishing, International Conference on Communication, Computing & Security, Elsevier Procedia Technology, Vol 6, NIT Rourkela, 2012, Pages 970–977.
  12. B. R. Purushothama, B B Amberker, Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation, IEEE International Symposium on Cloud and Service Computing (ISCOS 2012), , NIT Surathkal, Dec 17-18, 2012.
  13. Malla Harish, SantKaustubh Vilas, Ganesh Rajasekharan and R. Padmavathy, “Block Lanczos to solve Integer Factorization using GPU’s”, International Conference on Network and Communication Security, NCS 3.0, 2012, (Accepted), Springer LNICST.

Proceedings 2011:

  1. Nagaraj Dharwadkar and B.B. Amberker, Non-blind Watermarking scheme for color images in RGB space using DWT-SVD, International Conference on Communications and Signal Processing (ICCSP 2011), Calicut, India, February 10 – 12, 2011.
  2. Purushothma B.R and B.B. Amberker, Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Membership, The third International Conference on COMmunication Systems and NETworkS (COMSNETS 2011), January 4 – 8, Bangalore, India, 2011.
  3. Kavitha M, N R Sunitha, B B Amberker A new transferable digital cash protocol using proxy resignature scheme, International Conference on Computational Intelligence and Information Technology – CIIT 2011, Nov 07-08, 2011 Pune, India, 2010.
  4. S.G. Sanjeevi, A. Naga Nikhila, Thaseem Khan and G. Sumathi, “Function approximation with a neural network trained using simulated annealing”, National Conference on recent frontiers in applied dynamical systems, 21 – 22, January 2011, Coimbatore.
  5. S.G. Sanjeevi, A. Naga Nikhila, Thaseem Khan and G. Sumathi, “Using simulated annealing with a neural network for classification” National Conference on recent frontiers in applied dynamical systems, 21 – 22, January 2011, Coimbatore.

 Proceedings 2010:

  1. Sunitha N.R. and B.B. Amberker, Proxy Re-signature Scheme that translates one type of Signature Scheme to another type of Signature scheme, First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010), July 23 – 25, Chennai, India, 2010.
  2. A.S. Poornima and B.B. Amberker, Agent Based Secure Data Collection in Heterogeneous Sensor Networks, The 2nd International Conference on Machine Learning and Computing (ICMLC 2010), Bangalore, India, February 9-11, 2010.
  3. A.S. Poornima and B.B. Amberker, Logical Ring based Key Management for Clustered Sensor Networks with Changing Cluster Head, International Conference on Signal Processing and Communications – 2010 (SPCOM 2010), IISc, Bangalore, India, July 18-21, 2010.
  4. A.S. Poornima and B.B. Amberker, SEEDA : Secure End-to-End Data Aggregation in Wireless Sensor Networks, Seventh International Conference on Wireless and Optical Communication Networks (WOCN 2010), September 6-8, 2010.
  5. A.S.Poornima, B.B.Amberker, Secure Data Collection in Sensor Networks using Tree based Key Management and Secret Sharing, 6th International Conference on Next Generation Web Services and practices, Nov. 18-21, Gwalior, 2010.
  6. A.S.Poornima, B.B.Amberker, Key Establishment Scheme for Clustered Sensor Networks using Secret Sharing, 6th International conference on Information Systems Security (ICISS-2010), Dec. 15-19, Gujarat, 2010.
  7. Nagaraj Dharwadkar and B.B. Amberker, Estimating the Embedding Capacity of a Color Image using Color Difference, Seventh International Conference on Wireless and Optical Communication Networks (WOCN 2010), September 6-8, 2010.
  8. Nagaraj Dharwadkar and B.B. Amberker, S. Kualkarni, P.B. Panchannawar Reversible Fragile Medical Image Watermarking with zero Distortion, IEEE International Conference on Computer and Communication Technology (ICCCT-2010), Allahabad, September 17-19, 2010.
  9. R.Aparna, B.B.Amberker, Amoolya.P, Archana.J, Divya.K, DivyashreeJagadeesh., Implementation of Key Management Scheme for Multiple Simultaneous Secure Group Communication, International Conference on Communication, Computation, Control and NanoTechnology (ICN-2010), Oct.29-30, 2010.
  10. R.Padmavathy, Chakravarthy Bhagvati, “Unknown Key Share Attack on STPKE’”, BAIP 2010, Springer LNCS-CCIS, v70, pp604-608, 2010
  11. R.Padmavathy, Chakravarthy Bhagvati, “Discrete Logarithm Problem using Index Calculus Method’’, International Symposium on Advances in Cryptography and Security Applications for Future Computing, (2010), Gwangju, South korea , published in a proceeding.
  12. Sucheta Kolekar, S.G. Sanjeevi, Dattatraya S. Bormane: “The Framework of an Adaptive User Interface for E-learning Environment using Artificial Neural Network”, EEE’10 – 9th International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government, 65-69, July 12-15, 2010, Las Vegas, USA.
  13. Sucheta V. Kolekar, S. G. Sanjeevi, D. S. Bormane, “Learning Style Recognition using Artificial Neural Network for Adaptive User Interface in E-learning, IEEE International Conference On Computational Intelligence And Computing Research (ICCIC’10), Dec 28-29, 2010, Coimbatore.