Christo, Mary Subaja
29  results:
Search for persons X
?
2

Any Bluetooth device can be hacked. Know how?:

Muraleedhara, Prathibha ; Christo, Mary Subaja ; J, Jaya.
Cyber Security and Applications.  2 (2024)  - p. 100041 , 2024
 
?
3

Effective Implementations of Scalar Multiplications in Elli..:

, In: 2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI),
 
?
5

A Flexible and Verifiable Keyword PIR Scheme for Cloud–Edge..:

Yang, Huijie ; Zheng, Wenying ; Zhang, Tao...
IEEE Internet of Things Journal.  11 (2024)  10 - p. 18111-18122 , 2024
 
?
6

DDoS Detection using Multilayer Perceptron:

, In: 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC),
 
?
 
?
8

Deep Learning Method of Predicting MANET Lifetime Using Gra..:

T A, Mohanaprakash ; Christo, Mary Subaja ; Vivekanandan, M..
International Journal of Electrical and Electronics Research.  11 (2023)  3 - p. 808-813 , 2023
 
?
9

The Revelation of Tamil Cryptographic Lexicon –Connecting T..:

, In: 2023 International Conference on Networking and Communications (ICNWC),
 
?
10

Artificial Intelligence-Based Security Protocols to Resist ..:

Khilar, Rashmita ; Mariyappan, K. ; Christo, Mary Subaja...
Wireless Communications and Mobile Computing.  2022 (2022)  - p. 1-10 , 2022
 
?
11

Adiabatic Configurable Reversible Synthesizer for 5G Applic..:

Bommi, R. M. ; Christo, Mary Subaja
Arabian Journal for Science and Engineering.  47 (2021)  2 - p. 2315-2328 , 2021
 
?
 
?
14

Cloud-Assisted Privacy-Preserving Method for Healthcare Usi..:

Thanga Revathi, S. ; Gayathri, A. ; Kalaivani, J....
Security and Communication Networks.  2021 (2021)  - p. 1-10 , 2021
 
?
15

Multi Path Routing Technique Based RRP for P2P Network:

Christo, Mary Subaja ; Bommi, R. M. ; Mariyappan, K.
IOP Conference Series: Materials Science and Engineering.  994 (2020)  1 - p. 012029 , 2020
 
1-15