R. Velumadhava Rao

Learn More
Providing security for messages in group communication is more essential and critical nowadays. In group oriented applications such as Video conferencing and entertainment applications, it is necessary to secure the confidential data in such a way that intruders are not able to modify or transmit the data. Key transfer protocols fully rely on trusted Key(More)
This paper is an effort of literature review of the existing / designed distributed embedded systems carried out as part of the doctoral dissertation work. It is clearly indicated here that distributed embedded systems have been found to be adaptive to vivid environments ranging from the automation of Library system, Agricultural machines control, Wild life(More)
Large Volumes of personal data is regularly collected from different sources and analyzed by different types of applications using data mining algorithms , sharing of these data is useful to the application users.On one hand it is an important asset to business organizations and governments for decision making at the same time analysing such data opens(More)
  • 1