If you made any changes in Pure these will be visible here soon.

Personal profile

Research Interests

Information and Communication Technology

External positions

Fingerprint Dive into the research topics where Balachandra M is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 18 Similar Profiles
Authentication Engineering & Materials Science
Intrusion detection Engineering & Materials Science
Mobile commerce Engineering & Materials Science
Cryptography Engineering & Materials Science
Data transfer Engineering & Materials Science
Learning algorithms Engineering & Materials Science
Communication Engineering & Materials Science
Industry Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2010 2019

  • 32 Citations
  • 2 h-Index
  • 19 Conference contribution
  • 4 Article
  • 1 Paper

A comparative analysis of different soft computing techniques for intrusion detection system

Varghese, J. E. & Muniyal, B., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 563-577 15 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Soft computing
Soft Computing
Intrusion detection
Intrusion Detection
Comparative Analysis

Analysis of execution time for encryption during data integrity check in cloud environment

Akshay, K. C. & Muniyal, B., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 617-627 11 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Integrity
Encryption
Execution Time
Cryptography
Cloud computing

A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems

Prakasha, K., Kalkur, R., Acharya, V., Muniyal, B. & Khandelwal, M., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 578-590 13 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Key Exchange
Secure Communication
Cryptosystem
Data Transfer
Data transfer

Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card

Prakasha, K., Muniyal, B. & Acharya, V., 01-01-2019, In : IEEE Access. 7, p. 17981-18007 27 p., 8630929.

Research output: Contribution to journalArticle

Mobile devices
Authentication
Analog to digital conversion
Electronic mail
Biometrics

Analysis of Data Hiding Methods in Image Steganography

Akshay, K. C. & Muniyal, B., 30-11-2018, 2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018. Institute of Electrical and Electronics Engineers Inc., p. 2023-2027 5 p. 8554540

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Security of data
Cloud computing
Authentication