BibTeX records: Panduranga H. T

download as .bib file

@inproceedings{DBLP:conf/iccsp/DKPCRT19,
  author       = {Parameshachari Bidare Divakarachari and
                  Kiran and
                  Rashmi P and
                  Supriya M. C and
                  Rajashekarappa and
                  Panduranga H. T},
  editor       = {Yulin Wang and
                  Chin{-}Chen Chang},
  title        = {Controlled partial image encryption based on {LSIC} and chaotic map},
  booktitle    = {Proceedings of the 3rd International Conference on Cryptography, Security
                  and Privacy, {ICCSP} 2019, Kuala Lumpur, Malaysia, January 19-21,
                  2019},
  pages        = {60--63},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309074.3309107},
  doi          = {10.1145/3309074.3309107},
  timestamp    = {Mon, 18 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/DKPCRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/TKS13,
  author       = {Panduranga H. T and
                  Naveen Kumar S. K and
                  Sharath Kumar H. S},
  title        = {Hardware Software Co-Simulation of the Multiple Image Encryption Technique
                  Using the Xilinx System Generator},
  journal      = {J. Inf. Process. Syst.},
  volume       = {9},
  number       = {3},
  pages        = {499},
  year         = {2013},
  url          = {https://doi.org/10.3745/JIPS.2013.9.3.499},
  doi          = {10.3745/JIPS.2013.9.3.499},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jips/TKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acity/KumarPK12,
  author       = {H. S. Sharath Kumar and
                  Panduranga H. T and
                  S. K. Naveen Kumar},
  editor       = {Natarajan Meghanathan and
                  Dhinaharan Nagamalai and
                  Nabendu Chaki},
  title        = {A Two Stage Combinational Approach for Image Encryption},
  booktitle    = {Advances in Computing and Information Technology - Proceedings of
                  the Second International Conference on Advances in Computing and Information
                  Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 2},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {177},
  pages        = {843--849},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31552-7\_86},
  doi          = {10.1007/978-3-642-31552-7\_86},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acity/KumarPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1003-1239,
  author       = {Panduranga H. T and
                  Naveen Kumar S. K},
  title        = {Hybrid approach for Image Encryption Using {SCAN} Patterns and Carrier
                  Images},
  journal      = {CoRR},
  volume       = {abs/1003.1239},
  year         = {2010},
  url          = {http://arxiv.org/abs/1003.1239},
  eprinttype    = {arXiv},
  eprint       = {1003.1239},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1003-1239.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics