dblp.uni-trier.dewww.uni-trier.de

Mahalingam Ramkumar

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
25EEBrian L. Gaines, Mahalingam Ramkumar: A Framework for Dual-Agent MANET Routing Protocols. GLOBECOM 2008: 1968-1973
24EEKulasekaran A. Sivakumar, Mahalingam Ramkumar: Improving the resiliency of Ariadne. WOWMOM 2008: 1-6
23EEMahalingam Ramkumar: On the scalability of an efficient "Nonscalable" key distribution scheme. WOWMOM 2008: 1-6
22EEMahalingam Ramkumar: Trustworthy Computing under Resource Constraints with the DOWN Policy. IEEE Trans. Dependable Sec. Comput. 5(1): 49-61 (2008)
2007
21EEKulasekaran A. Sivakumar, Mahalingam Ramkumar: An Efficient Secure Route Discovery Protocol for DSR. GLOBECOM 2007: 458-463
20EEKulasekaran A. Sivakumar, Mahalingam Ramkumar: Safeguarding Mutable Fields in AODV Route Discovery Process. ICCCN 2007: 645-651
19EEHusrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu, Amol Sukerkar: Improved utilization of embedding distortion in scalar quantization based data hiding techniques. Signal Processing 87(5): 877-890 (2007)
2006
18EEMahalingam Ramkumar: I-HARPS: An Efficient Key Predistribution Scheme for Mobile Computing Applications. GLOBECOM 2006
17EEMahalingam Ramkumar: On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies. GLOBECOM 2006
16EEMahalingam Ramkumar, Nasir D. Memon: Secure collaborations over message boards. IJSN 1(1/2): 113-124 (2006)
15EEMahalingam Ramkumar: Broadcast Encryption Using Probabilistic Key Distribution and Applications. JCP 1(3): 1-12 (2006)
14EEHusrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu: An overview of scalar quantization based data hiding methods. Signal Processing 86(5): 893-914 (2006)
2005
13EEMahalingam Ramkumar: On Broadcast Encryption with Random Key Pre-distribution Schemes. ICISS 2005: 304-316
12EEMahalingam Ramkumar, Nasir D. Memon: An efficient key predistribution scheme for ad hoc network security. IEEE Journal on Selected Areas in Communications 23(3): 611-621 (2005)
2004
11 Ismail Avcibas, Sevinc Bayram, Nasir D. Memon, Mahalingam Ramkumar, Bülent Sankur: A classifier design for detecting Image manipulations. ICIP 2004: 2645-2648
10 Mahalingam Ramkumar, Nasir D. Memon: A system for digital rights management using key predistribution. ICME 2004: 431-434
9EEMahalingam Ramkumar, Ali N. Akansu: A robust protocol for proving ownership of multimedia content. IEEE Transactions on Multimedia 6(3): 469-478 (2004)
8EEMahalingam Ramkumar, Ali N. Akansu: On the design of data hiding methods robust to lossy compression. IEEE Transactions on Multimedia 6(6): 947-951 (2004)
2003
7 Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu: A new perspective for embedding-detection methods with distortion compensation and thresholding processing techniques. ICIP (2) 2003: 507-510
2001
6EEMahalingam Ramkumar, Ali N. Akansu: Capacity estimates for data hiding in compressed images. IEEE Transactions on Image Processing 10(8): 1252-1263 (2001)
2000
5 Mahalingam Ramkumar, Ali N. Akansu, Xiaodong Cai: Floating Signal Constellations for Multimedia Steganography. ICC (1) 2000: 249-253
4 Mahalingam Ramkumar, Ali N. Akansu: A Robust Oblivious Watermarking Scheme. ICIP 2000
3EEMahalingam Ramkumar, Ali N. Akansu: Robust Protocols for Proving Ownership of Images. ITCC 2000: 22-29
1999
2 Mahalingam Ramkumar, Ali N. Akansu, A. Aydin Alatan: A Robust Data Hiding Scheme for Images Using DFT. ICIP (2) 1999: 211-215
1EEMahalingam Ramkumar, G. V. Anand, Ali N. Akansu: On the implementation of 2-band cyclic filterbanks. ISCAS (3) 1999: 520-523

Coauthor Index

1Ali N. Akansu [1] [2] [3] [4] [5] [6] [7] [8] [9] [14] [19]
2A. Aydin Alatan [2]
3G. V. Anand [1]
4Ismail Avcibas [11]
5Sevinc Bayram [11]
6Xiaodong Cai [5]
7Brian L. Gaines [25]
8Nasir D. Memon [10] [11] [12] [16]
9Bülent Sankur [11]
10Husrev T. Sencar [7] [14] [19]
11Kulasekaran A. Sivakumar [20] [21] [24]
12Amol Sukerkar [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)