If you made any changes in Pure these will be visible here soon.

Personal profile

Research Interests

Information and Communication Technology

External positions

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 17 Similar Profiles
Authentication Engineering & Materials Science
Intrusion detection Engineering & Materials Science
Mobile commerce Engineering & Materials Science
Cryptography Engineering & Materials Science
Data transfer Engineering & Materials Science
Learning algorithms Engineering & Materials Science
Communication Engineering & Materials Science
Industry Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2010 2019

  • 29 Citations
  • 2 h-Index
  • 19 Conference contribution
  • 4 Article
  • 1 Paper

A comparative analysis of different soft computing techniques for intrusion detection system

Varghese, J. E. & Muniyal, B., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 563-577 15 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Soft computing
Soft Computing
Intrusion detection
Intrusion Detection
Comparative Analysis

Analysis of execution time for encryption during data integrity check in cloud environment

Akshay, K. C. & Muniyal, B., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 617-627 11 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Integrity
Encryption
Execution Time
Cryptography
Cloud computing

A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems

Prakasha, K., Kalkur, R., Acharya, V., Muniyal, B. & Khandelwal, M., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 578-590 13 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Key Exchange
Secure Communication
Cryptosystem
Data Transfer
Data transfer

Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card

Prakasha, K., Muniyal, B. & Acharya, V., 01-01-2019, In : IEEE Access. 7, p. 17981-18007 27 p., 8630929.

Research output: Contribution to journalArticle

Mobile devices
Authentication
Analog to digital conversion
Electronic mail
Biometrics

Analysis of Data Hiding Methods in Image Steganography

Akshay, K. C. & Muniyal, B., 30-11-2018, 2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018. Institute of Electrical and Electronics Engineers Inc., p. 2023-2027 5 p. 8554540

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Security of data
Cloud computing
Authentication