Improved fully polynomial time approximation scheme for the 0-1 multiple-choice knapsack problem M Bansal, V Venkaiah International Institute of Information Technology Tech Report, 1-9, 2004 | 47 | 2004 |
Multi-stage multi-secret sharing scheme for hierarchical access structure A Basit, NC Kumar, VC Venkaiah, SA Moiz, AN Tentu, W Naik 2017 International Conference on Computing, Communication and Automation …, 2017 | 31 | 2017 |
Intrusion detection systems-analysis and containment of false positives alerts GJ Victor, MS Rao, VCH Venkaiah Int. J. Comput. Appl 5 (8), 27-33, 2010 | 28 | 2010 |
A concise algorithm to solve over-/under-determined linear systems EA Lord, SK Sen, VC Venkaiah Simulation 54 (5), 239-240, 1990 | 25 | 1990 |
Sequential secret sharing scheme based on Chinese remainder theorem N Singh, AN Tentu, A Basit, VC Venkaiah 2016 IEEE International Conference on Computational Intelligence and …, 2016 | 22 | 2016 |
Lightweight cryptography for distributed PKI based MANETS NC Kumar, A Basit, P Singh, VC Venkaiah arXiv preprint arXiv:1804.06313, 2018 | 18 | 2018 |
Conjunctive hierarchical secret sharing scheme based on MDS codes AN Tentu, P Paul, CV Vadlamudi Combinatorial Algorithms: 24th International Workshop, IWOCA 2013, Rouen …, 2013 | 17* | 2013 |
Acyclic vertex coloring of graphs of maximum degree 5 K Yadav, S Varagani, K Kothapalli, VC Venkaiah Discrete mathematics 311 (5), 342-348, 2011 | 17 | 2011 |
Open Educational Resources in India: A study of attitudes and perceptions of distance teachers V Venkaiah Commonwealth of Learning (COL), 2008 | 17 | 2008 |
Computing a matrix symmetrizer exactly using modified multiple modulus residue arithmetic VC Venkaiah, SK Sen Journal of computational and applied mathematics 21 (1), 27-40, 1988 | 17 | 1988 |
Quasi-cyclic codes over F13 and enumeration of defining polynomials VC Venkaiah, TA Gulliver Journal of Discrete Algorithms 16, 249-257, 2012 | 16 | 2012 |
Vertex Magic Total Labelings of Complete Graphs HK Krishnappa, K Kothapalli, VC Venkaiah AKCE International Journal of Graphs and Combinatorics 6 (1), 143-154, 2009 | 16 | 2009 |
A shrinking polytope method for linear programming EA Lord, VC Venkaiah, SK Sen Neural, Parallel & Scientific Computations 4 (3), 325-340, 1996 | 16 | 1996 |
Ideal and perfect hierarchical secret sharing schemes based on mds codes AN Tentu, P Paul, VC Venkaiah Cryptology ePrint Archive, 2013 | 15 | 2013 |
Reusable multi-stage multi-secret sharing schemes based on CRT A Endurthi, OB Chanu, AN Tentu, VC Venkaiah Journal of Communications Software and Systems 11 (1), 15-24, 2015 | 14 | 2015 |
Computationally perfect compartmented secret sharing schemes based on MDS codes AN Tentu, P Paul, VC Venkaiah International Journal of Trust Management in Computing and Communications 2 …, 2014 | 13 | 2014 |
Householder transform in Cm VC Venkaiah, VV Krishna, A Paulraj Digital Signal Processing 3 (4), 226-227, 1993 | 13 | 1993 |
CRT based multi-secret sharing schemes: revisited AN Tentu, VC Venkaiah, VK Prasad International Journal of Security and Networks 13 (1), 1-9, 2018 | 12 | 2018 |
Sequential Secret Sharing Scheme Based on Level Ordered Access Structure. DK Pattipati, AN Tentu, VC Venkaiah, AA Rao Int. J. Netw. Secur. 18 (5), 874-881, 2016 | 12 | 2016 |
Multi-secret sharing scheme for level-ordered access structures AN Tentu, A Basit, K Bhavani, VC Venkaiah Number-Theoretic Methods in Cryptology: First International Conference …, 2018 | 11 | 2018 |