Browsing by Author Amberker, B.B.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 20
Issue DateTitleAuthor(s)
2012-01Access control mechanisms for outsourced data in cloudPurushothama, B.R.; Amberker, B.B.
2007Controlled Delegation in e-cheques using Proxy SignaturesSunitha, N.R; Amberker, B.B.; Koulgi, Prashant
2013-12DCT based reversible data embedding for MPEG-4 video using HVS characteristicsGujjunoori, S.; Amberker, B.B.
2012-12A DCT based reversible data embedding scheme for MPEG-4 video using HVS characteristicsGujjunoori, S.; Amberker, B.B.
2013Dynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard ModelAli, S.T; Amberker, B.B.
2012-12Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy PreservationPurushothama, B.R.; Amberker, B.B.
2009An Energy Efficient Deterministic Key Establishment Scheme for Clustered Wireless Sensor NetworksPoornima, A.S.; Amberker, B.B.; Jadhav, Harihar Baburao
2011Group key management scheme for simultaneous multiple groups with overlapped membershipPurushothama, B.R.; Amberker, B.B.
2009Key Management Scheme for Multiple Simultaneous Secure Group CommunicationAparna, R.; Amberker, B.B.
2010Logical Ring based Key Management for Clustered Sensor Networks with Changing Cluster HeadPoornima, A.S.; Amberker, B.B.
2009Multi-use Unidirectional Forward-Secure Proxy Re-signature SchemeSunitha, N.R.; Amberker, B.B.
2011-02Non-blind watermarking scheme for color images in RGB space using DWT-SVDDharwadkar, N.V..; Amberker, B.B.; Gorai, A.
2009Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor NetworksPoornima, A.S.; Amberker, B.B.
2013A reversible data embedding scheme for MPEG-4 video using HVS characteristicsGujjunoori, Sagar; Amberker, B.B.
2013-03A reversible data embedding scheme for MPEG-4 video using HVS characteristicsGujjunoori, S.; Amberker, B.B.
2012Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover ImagesNagaraj, V; Dharwadkar, N.V.; Amberker, B.B.
2010Secure Data Collection in Sensor Networks using Tree based Key management Scheme and Secret SharingPoornima, A.S.; Amberker, B.B.; Raj, H.S.Likith; Kumar, S.Naveen; Pradeep, K.N.; Ravithej, S.V.
2009Secure Group Communication Using Binomial TreesAparna, R.; Amberker, B.B.; Pola, Divya; Bathia, Pranjal
2012Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key TreePurushothama, B.R.; Shirisha, K.; Amberker, B.B.
2010SEEDA : Secure End-to-End Data Aggregation in Wireless Sensor NetworksPoornima, A.S.; Amberker, B.B.