default search action
Ramasubramanian Natarajan
Person information
- affiliation: National Institute of Technology Tiruchirappalli, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Aditi Roy, Kokila Jagadeesh, Ramasubramanian Natarajan, B. Shameedha Begum:
OTK-based PUF CRP obfuscation for IoT device authentication. Microelectron. J. 144: 106070 (2024) - [j32]Utkarsh Tiwari, Satyanarayana Vollala, Ramasubramanian Natarajan, B. Shameedha Begum:
Improving the performance of authentication protocols using efficient modular multi exponential technique. Multim. Tools Appl. 83(4): 11061-11076 (2024) - [j31]Kalidasan Kannadasan, Jainendra Shukla, Sridevi Veerasingam, B. Shameedha Begum, Natarajan Ramasubramanian:
An EEG-Based Computational Model for Decoding Emotional Intelligence, Personality, and Emotions. IEEE Trans. Instrum. Meas. 73: 1-13 (2024) - [c6]Manjith Baby Sarojam Chellam, Ramasubramanian Natarajan, Nagi Naganathan:
Logic locking emulator on FPGA: A conceptual view. VLSID 2024: 553-559 - 2023
- [j30]Jobin Jose, N. Ramasubramanian:
Applying machine learning to enhance the cache performance using reuse distance. Evol. Intell. 16(4): 1195-1216 (2023) - [j29]Shathanaa Rajmohan, N. Ramasubramanian:
Improved Symbiotic organisms search for path planning of unmanned combat aerial vehicles. J. Ambient Intell. Humaniz. Comput. 14(4): 4289-4311 (2023) - [j28]Kalidasan Kannadasan, Sridevi Veerasingam, B. Shameedha Begum, Natarajan Ramasubramanian:
An EEG-based subject-independent emotion recognition model using a differential-evolution-based feature selection algorithm. Knowl. Inf. Syst. 65(1): 341-377 (2023) - [j27]Aditi Roy, Kokila Jagadeesh, Natarajan Ramasubramanian, B. Shameedha Begum:
Device-specific security challenges and solution in IoT edge computing: a review. J. Supercomput. 79(18): 20790-20825 (2023) - 2022
- [j26]Sangeetha Rajaram, Satyanarayana Vollala, Ramasubramanian Natarajan:
ERMAP: ECC-based robust mutual authentication protocol for smart grid communication with AVISPA simulations. Int. J. Ad Hoc Ubiquitous Comput. 41(4): 232-245 (2022) - [j25]Utkarsh Tiwari, Satyanarayana Vollala, Natarajan Ramasubramanian, B. Shameedha Begum, G. Lakshminarayanan:
Secure and Energy Efficient Design of Multi-Modular Exponential Techniques for Public-Key Cryptosystem. J. Commun. Inf. Networks 7(3): 309-323 (2022) - [j24]Utkarsh Tiwari, Satyanarayana Vollala, Natarajan Ramasubramanian, B. Shameedha Begum:
Efficient hardware realization and high radix implementation of modular multi exponential techniques for public key cryptography. Microelectron. J. 128: 105548 (2022) - [j23]Sangeetha Rajaram, Satyanarayana Vollala, Natarajan Ramasubramanian, Kokila Jagadeesh:
Enhanced and secured random number generation for eUASBP. Int. J. Syst. Assur. Eng. Manag. 13(3): 1135-1150 (2022) - [j22]Siranjeevi Rajamanickam, Satyanarayana Vollala, Natarajan Ramasubramanian:
EAPIOD: ECC based authentication protocol for insider attack protection in IoD scenario. Secur. Priv. 5(5) (2022) - [c5]Aditi Roy, Kokila Jagadeesh, Ramasubramanian Natarajan, B. Shameedha Begum:
Random Number Generation for PKI Using Controlled Anderson PUF. PKIA 2022: 1-6 - 2021
- [b1]Satyanarayana Vollala, Natarajan Ramasubramanian, Utkarsh Tiwari:
Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques. Springer 2021, ISBN 978-3-030-74523-3, pp. 3-252 - [j21]Bhukya Krishna Priya, Ramasubramanian Natarajan:
Improving the Lifetime of Phase Change Memory by Shadow Dynamic Random Access Memory. Int. J. Serv. Sci. Manag. Eng. Technol. 12(2): 154-168 (2021) - [j20]Shathanaa Rajmohan, N. Ramasubramanian, Nagi Naganathan:
Design Space Exploration for Reducing Cost of Hardware Trojan Detection and Isolation during Architectural Synthesis. J. Circuits Syst. Comput. 30(9): 2150156:1-2150156:27 (2021) - 2020
- [j19]Marshal Raj, Gopalakrishnan Lakshminarayanan, Seok-Bum Ko, Nagi Naganathan, N. Ramasubramanian:
Configurable Logic Blocks and Memory Blocks for Beyond-CMOS FPGA-Based Embedded Systems. IEEE Embed. Syst. Lett. 12(4): 113-116 (2020) - [j18]Manjith B. C., Ramasubramanian Natarajan:
Securing AES Accelerator from Key-Leaking Trojans on FPGA. Int. J. Embed. Real Time Commun. Syst. 11(3): 84-105 (2020) - [j17]Sangeetha Rajaram, Tanmoy Maitra, Satyanarayana Vollala, N. Ramasubramanian, Ruhul Amin:
eUASBP: enhanced user authentication scheme based on bilinear pairing. J. Ambient Intell. Humaniz. Comput. 11(7): 2827-2840 (2020) - [j16]Shathanaa Rajmohan, Ramasubramanian Natarajan:
A Memetic Algorithm-Based Design Space Exploration for Datapath Resource Allocation During High-Level Synthesis. J. Circuits Syst. Comput. 29(1): 2050001:1-2050001:30 (2020) - [j15]Bhukya Krishna Priya, N. Ramasubramanian:
Enhancing the Lifetime of a Phase Change Memory with Bit-Flip Reversal. J. Circuits Syst. Comput. 29(14): 2050219:1-2050219:28 (2020) - [j14]Siranjeevi Rajamanickam, Satyanarayana Vollala, Ruhul Amin, N. Ramasubramanian:
Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC. IEEE Syst. J. 14(2): 1972-1983 (2020) - [j13]Shathanaa Rajmohan, N. Ramasubramanian, Nagi Naganathan:
Hybrid Evolutionary Design Space Exploration Algorithm With Defence Against Third Party IP Vulnerabilities. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10): 2602-2614 (2020)
2010 – 2019
- 2019
- [j12]Shathanaa Rajmohan, Ramasubramanian Natarajan:
Group influence based improved firefly algorithm for Design Space Exploration of Datapath resource allocation. Appl. Intell. 49(6): 2084-2100 (2019) - [j11]Kokila Jagadeesh, Arjun Murali Das, B. Shameedha Begum, Natarajan Ramasubramanian:
Hardware Signature Generation Using a Hybrid PUF and FSM Model for an SoC Architecture. Period. Polytech. Electr. Eng. Comput. Sci. 63(4): 244-253 (2019) - [j10]Kokila Jagadeesh, Ramasubramanian Natarajan:
Lightweight signature scheme to protect intellectual properties of Internet of things applications in system on chip field-programmable gate arrays. Turkish J. Electr. Eng. Comput. Sci. 27(5): 3500-3515 (2019) - [j9]Kokila Jagadeesh, N. Ramasubramanian:
Enhanced Authentication Using Hybrid PUF with FSM for Protecting IPs of SoC FPGAs. J. Electron. Test. 35(4): 543-558 (2019) - [j8]B. Shameedha Begum, N. Ramasubramanian:
Design of an Intelligent Data Cache with Replacement Policy. Int. J. Embed. Real Time Commun. Syst. 10(2): 87-107 (2019) - [j7]Kokila Jagadeesh, N. Ramasubramanian, Nagi Naganathan:
Resource Efficient Metering Scheme for Protecting SoC FPGA Device and IPs in IoT Applications. IEEE Trans. Very Large Scale Integr. Syst. 27(10): 2284-2295 (2019) - 2018
- [j6]Kokila Jagadeesh, N. Ramasubramanian, Ravindra Thamma:
Dynamic Estimation of Temporary Failure in SoC FPGAs for Heterogeneous Applications. J. Univers. Comput. Sci. 24(12): 1776-1799 (2018) - [j5]P. S. Tamizharasan, N. Ramasubramanian:
Analysis of large deviations behavior of multi-GPU memory access in deep learning. J. Supercomput. 74(5): 2199-2212 (2018) - [c4]Shathanaa Rajmohan, Ramasubramanian Natarajan:
Improving Power & Latency Metrics for Hardware Trojan Detection During High Level Synthesis. ICCCNT 2018: 1-7 - 2017
- [j4]Satyanarayana Vollala, B. Shameedha Begum, Amit D. Joshi, N. Ramasubramanian:
Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation. Int. J. Inf. Secur. Priv. 11(2): 11-24 (2017) - [j3]Satyanarayana Vollala, Natarajan Ramasubramanian:
Energy efficient modular exponentiation for public-key cryptography based on bit forwarding techniques. Inf. Process. Lett. 119: 25-38 (2017) - [j2]Satyanarayana Vollala, V. V. Varadhan, K. Geetha, N. Ramasubramanian:
Design of RSA processor for concurrent cryptographic transformations. Microelectron. J. 63: 112-122 (2017) - [c3]Satyanarayana Vollala, Indrajeet S, B. Shameedha Begum, N. Ramasubramanian:
Evaluation of password encrypted key exchange authentication techniques: design approach perspective: evaluation of PAKE protocol. IML 2017: 16:1-16:9 - 2016
- [j1]Satyanarayana Vollala, Krishnan Geetha, Natarajan Ramasubramanian:
Efficient modular exponential algorithms compatible with hardware implementation of public-key cryptography. Secur. Commun. Networks 9(16): 3105-3115 (2016) - [c2]Bhukya Krishna Priya, Amit D. Joshi, N. Ramasubramanian:
A Survey on Performance of On-Chip Cache for Multi-core Architectures. ICIA 2016: 35:1-35:7 - 2011
- [i1]N. Ramasubramanian, Srinivas V. V., N. Ammasai Gounden:
Performance of Cache Memory Subsystems for Multicore Architectures. CoRR abs/1111.3056 (2011)
1980 – 1989
- 1980
- [c1]N. Ramasubramanian:
Computer education technology (CET). ACM Annual Conference 1980: 123
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint