2008 |
25 | EE | Brian L. Gaines,
Mahalingam Ramkumar:
A Framework for Dual-Agent MANET Routing Protocols.
GLOBECOM 2008: 1968-1973 |
24 | EE | Kulasekaran A. Sivakumar,
Mahalingam Ramkumar:
Improving the resiliency of Ariadne.
WOWMOM 2008: 1-6 |
23 | EE | Mahalingam Ramkumar:
On the scalability of an efficient "Nonscalable" key distribution scheme.
WOWMOM 2008: 1-6 |
22 | EE | Mahalingam Ramkumar:
Trustworthy Computing under Resource Constraints with the DOWN Policy.
IEEE Trans. Dependable Sec. Comput. 5(1): 49-61 (2008) |
2007 |
21 | EE | Kulasekaran A. Sivakumar,
Mahalingam Ramkumar:
An Efficient Secure Route Discovery Protocol for DSR.
GLOBECOM 2007: 458-463 |
20 | EE | Kulasekaran A. Sivakumar,
Mahalingam Ramkumar:
Safeguarding Mutable Fields in AODV Route Discovery Process.
ICCCN 2007: 645-651 |
19 | EE | Husrev T. Sencar,
Mahalingam Ramkumar,
Ali N. Akansu,
Amol Sukerkar:
Improved utilization of embedding distortion in scalar quantization based data hiding techniques.
Signal Processing 87(5): 877-890 (2007) |
2006 |
18 | EE | Mahalingam Ramkumar:
I-HARPS: An Efficient Key Predistribution Scheme for Mobile Computing Applications.
GLOBECOM 2006 |
17 | EE | Mahalingam Ramkumar:
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies.
GLOBECOM 2006 |
16 | EE | Mahalingam Ramkumar,
Nasir D. Memon:
Secure collaborations over message boards.
IJSN 1(1/2): 113-124 (2006) |
15 | EE | Mahalingam Ramkumar:
Broadcast Encryption Using Probabilistic Key Distribution and Applications.
JCP 1(3): 1-12 (2006) |
14 | EE | Husrev T. Sencar,
Mahalingam Ramkumar,
Ali N. Akansu:
An overview of scalar quantization based data hiding methods.
Signal Processing 86(5): 893-914 (2006) |
2005 |
13 | EE | Mahalingam Ramkumar:
On Broadcast Encryption with Random Key Pre-distribution Schemes.
ICISS 2005: 304-316 |
12 | EE | Mahalingam Ramkumar,
Nasir D. Memon:
An efficient key predistribution scheme for ad hoc network security.
IEEE Journal on Selected Areas in Communications 23(3): 611-621 (2005) |
2004 |
11 | | Ismail Avcibas,
Sevinc Bayram,
Nasir D. Memon,
Mahalingam Ramkumar,
Bülent Sankur:
A classifier design for detecting Image manipulations.
ICIP 2004: 2645-2648 |
10 | | Mahalingam Ramkumar,
Nasir D. Memon:
A system for digital rights management using key predistribution.
ICME 2004: 431-434 |
9 | EE | Mahalingam Ramkumar,
Ali N. Akansu:
A robust protocol for proving ownership of multimedia content.
IEEE Transactions on Multimedia 6(3): 469-478 (2004) |
8 | EE | Mahalingam Ramkumar,
Ali N. Akansu:
On the design of data hiding methods robust to lossy compression.
IEEE Transactions on Multimedia 6(6): 947-951 (2004) |
2003 |
7 | | Husrev T. Sencar,
Mahalingam Ramkumar,
Ali N. Akansu:
A new perspective for embedding-detection methods with distortion compensation and thresholding processing techniques.
ICIP (2) 2003: 507-510 |
2001 |
6 | EE | Mahalingam Ramkumar,
Ali N. Akansu:
Capacity estimates for data hiding in compressed images.
IEEE Transactions on Image Processing 10(8): 1252-1263 (2001) |
2000 |
5 | | Mahalingam Ramkumar,
Ali N. Akansu,
Xiaodong Cai:
Floating Signal Constellations for Multimedia Steganography.
ICC (1) 2000: 249-253 |
4 | | Mahalingam Ramkumar,
Ali N. Akansu:
A Robust Oblivious Watermarking Scheme.
ICIP 2000 |
3 | EE | Mahalingam Ramkumar,
Ali N. Akansu:
Robust Protocols for Proving Ownership of Images.
ITCC 2000: 22-29 |
1999 |
2 | | Mahalingam Ramkumar,
Ali N. Akansu,
A. Aydin Alatan:
A Robust Data Hiding Scheme for Images Using DFT.
ICIP (2) 1999: 211-215 |
1 | EE | Mahalingam Ramkumar,
G. V. Anand,
Ali N. Akansu:
On the implementation of 2-band cyclic filterbanks.
ISCAS (3) 1999: 520-523 |