1. Jeyanthi, N., N. C. S. N. Iyengar. An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks. – International Journal of Network Security, Vol. 14, 2012, No 5, pp. 257-269.
2. Wu, H. C., C. C. Chang. Sharing Visual Multi-Secrets Using Circle Share. – Computer Standards & Interfaces, Vol. 28, 2005, No 1, pp. 123-135.10.1016/j.csi.2004.12.006
3. Shyu, S. J., S. Y. Huang, Y. K. Lee, R. Z. Wang, K. Chen. Sharing Multiple Secrets in Visual Cryptography. – Pattern Recognition, Vol. 40, 2007, No 12, pp. 3633-3651.10.1016/j.patcog.2007.03.012
4. Sardana, A. Multiple Secrets Sharing with Meaningful Shares. – In: International Conference on Advances in Computing and Communications, Berlin, Heidelberg, Springer, July 2011, pp. 233-243.10.1007/978-3-642-22726-4_25
5. Naor, M., A. Shamir. Visual Cryptography. – In: Proc. of Advance in Cryptology (EUROCRYPT’94), Lecture Notes in Computer Science, Springer-Verlag, Vol. 950, 1995, pp. 1-12.10.1007/BFb0053419
6. Mandal, S. N., S. Dutta, R. Sarkar. Block Based Symmetry Key Visual Cryptography. – International Journal of Computer Network and Information Security, Vol. 4, No 9, pp. 10-19.10.5815/ijcnis.2012.09.02
7. Thandeeswaran, R., S. Subhashini, N. Jeyanthi, M. A. Saleem Durai. Secured Multi-Cloud Virtual Infrastructure with Improved Performance. – Cybernetics and Information Technologies, Vol. 12, 2012, No 2, pp. 11-22.10.2478/cait-2012-0009
9. Mondal, U. K., S. N. Mandal, J. P. Choudhury, J. K. Mandal. A New Approach to Cryptography. – In: Proc. of International Conference Systematics, Cybernatics & Informatics (ICSCI’08), 2008, pp. 1-12.
11. Jeyanthi, N., N. C. S. N. Iyengar. Escape-On-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, No 1, pp. 46-60.10.2478/cait-2013-0005
12. Yang, C. N. New Visual Secret Sharing Schemes Using Probabilistic Method. – Pattern Recognition Letter, Vol. 25, 2004, No 4, pp. 481-494.10.1016/j.patrec.2003.12.011
13. Jaafar, A., A. Samsudin. A Survey of Black and White Visual Cryptography Model. – International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 6, 2012, No 15, pp. 237-249.10.4156/jdcta.vol6.issue15.28
14. Jeyanthi, N., P. C. Mogan Kumar. A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks. – Cybernetics and Information Technologies, Vol. 14, 2014, No 3, pp. 71-85.10.2478/cait-2014-0034
15. Blundo, C., A. De Santis, M. Naor. Visual Cryptography for Grey Level Images. – Information Processing Letters, Vol. 75, 2000, No 6, pp. 255-259.10.1016/S0020-0190(00)00108-3
16. Lee, Kai-Hui, Pei-Ling Chiu. An Extended Visual Cryptography Algorithm for General Access Structures. – IEEE Transaction on Information Forensics and Security, Vol. 7, 2012, No 1, pp. 219-229.10.1109/TIFS.2011.2167611
17. Jaya. Securing Cloud Data and Cheque Truncation System with Visual Cryptography. – International Journal of Computer Applications, Vol. 70, 2013, No 2, pp. 16-21.10.5120/11934-7721
21. Boldyreva, A., V. Goyal, V. Kumar. Identity-Based Encryption with Efficient Revocation. – In: Proc. of 15th ACM Conference on Computer and Communications Security, 2008, pp. 417-426.10.1145/1455770.1455823
22. Jeyanthi, N., R. Thandeeswaran, J. Vinithra. RQA Based Approach to Detect and Prevent DDoS Attacks in VoIP Networks. – Cybernetics and Information Technologies, Vol. 14, 2014, No 1, pp. 11-24.10.2478/cait-2014-0002
23. Boneh, D., B. Waters. Conjunctive, Subset, and Range Queries on Encrypted Data. – Theory of Cryptography, Springer, 2007, pp. 535-554.10.1007/978-3-540-70936-7_29
25. Jaya, A. Sardana. Multiple Secrets Sharing with Meaningful Shares. – In: International Conference on Advances in Computing and Communications, Heidelberg, Springer, 2011, pp. 233-243.10.1007/978-3-642-22726-4_25
26. Yang, Ching-Nung Tse-Shih Chen. Size-Adjustable Visual Secret Sharing Schemes. – IEICE Transactions on Fundamental of Electronics, Communication and Computer Science, Vol. 88, 2005, No 9, pp. 2471-2474.10.1093/ietfec/e88-a.9.2471
27. Yang, Ching-Nung, Tse-Shih Chen. New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. – IEICE Transactions on Electronics, Communication and Computer Science, Vol. 89, 2006, No 2, pp. 620-625.10.1093/ietfec/e89-a.2.620
29. Brindha, K., N. Jeyanthi. Secured Document Sharing Using Visual Cryptography to Protect Cloud Data Storage. – Cybernetics and Information Technologies, Vol. 15, 2015, No 4, pp. 111-123.10.1515/cait-2015-0058
30. Brindha, K., N. Jeyanthi. DOVC: Data Obfuscation Visual Cryptography to Protect Cloud Storage. – International Journal of Soft Computing, Vol. 11, 2016, No 6, pp. 374-381.