Publications

Export 3 results:
Sort by: Author [ Title  (Asc)] Type Year
A B C D E F G H I J K L M N O [P] Q R S T U V W X Y Z   [Show ALL]
G
Chacko, AM, Kumar S, Pathari V.  2013.  Generalized architecture to capture end to end provenance in a system , 18 Dec. International Conference on IT Convergence and Security (ICITCS) . , Macau
I
R, AD, Chacko AM, Pathari V.  2015.  Implementing Message Integrity in Mobile Phones (Android platform) Using Identity Based Encryption. International Journal of Applied Engineering Research (IJAER). 10(55):.2623-2627.
M
P., B, A.M. C, S.D. M.  2014.  Making an Application Provenance-Aware through UML – A General Scheme. Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. . :451-460.: Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg