Personal Information
Organização/Local de trabalho
Coimbatore Area, India, TamilNadu India
Cargo
Founder at TechnicalTamil.com, Asst. Prof. at SRIT, Former CTO at Mindnotix Soft. Solns., Principal Researcher at TLTC
Setor
Technology / Software / Internet
Site
www.adrijovin.in
Sobre
A person capable of balancing Academic,Industrial and Research challenges.
Had been a reviewer for the approval of ISO/IEC/IEEE Standards
• ISO/IEC 12207 - Software Life Cycle Processes
• ISO/IEC 15026 - Systems and Software Assurance -- Part 1: Concepts and Vocabulary
• ISO/IEC/IEEE 15289 - Content of Life-Cycle Information Products (Documentation)
• ISO/IEC 29119 - Software Testing -- Part 5: Keyword- Driven Testing
• IEEE 1062 - Recommended Practice for Software Acquisition
• ISO/IEC 15026 - Systems and software assurance -- Part 3: Systems integrity levels
• IEEE 1722 - Standard for a Transport Protocol for Time Sensitive Applications in a Bridged Local Area Network
• ISO/IEC 24748...
Marcadores
adri jovin
sri ramakrishna institute of technology
information technology
artificial intelligence
computer science
security
computer engineering
cryptography
soft computing
department of information technology
database
under graduate
genetic algorithm
fuzzy logic
neural networks
information security
heartbleed bug
cybersecurity
nist
security models
technology
networks
blockchains
privacy
search algortihms
anna university
animation
color models
computer graphics
coimbatore
anna university coimbatore
stxaviers catholic college of engineering
cv
neural network
creativity
academic publishing
open source
licensing
creative commons
image security
securing images
digital image processing
visual cryptography
ethereum
bitcoin
consensus
chennai
amet
workshop
distributed systems
risk management
risk
exploit
vulnerability
threat
asset management
breaches
best practices
fips
cia model
block cipher modes of operation
advanced encryption standard
web security
video conferencing
zoom
secure key exchange
variants of elliptic curve
elliptic curves
elliptic curve arithmetic
elliptic curve cryptography
network
key exchange
elgamal cryptosystem
standard
basis of modern encryption
encryption
des variants
double des
triple des
data encryption standard
playfair cipher
hill cipher
railfence ciphers
transposition ciphers
shift ciphers
steganography
caeser cipher
vigenere cipher
vernam cipher
block cipher
stream cipher
feistel cipher
classical cryptography
euler's theorem
modular arithmetic
extended euclidean algorithm
euclidean algorithm
fermat's theorem
theorems
divisibility
number theory
mathematics
access control
security architecture
cia
rfc 2828
x.800
security services
osi security architecture
security mechanisms
security attacks
adrijovin
network security
basics
advances
engineering
augustine babu
security tools
teaching learning practice
flipped classroom
teaching
web
faculty
programming
microsoft azure
ge8151
jupyter notebooks
python
graph theory
np problems
spanning trees
cliques
vertex cover
graph
network flow
theoretical computer science
chess
min-max
alpha-beta pruning
breadth first search
best first search
depth first search
production systems
control strategies
search algorithms
problem description
problem formulation
cs6659
disadvantages
alan turing
clipping
nvidia
rotation
visualization
seminar
opengl
3d representation
3d
graphics processing unit
translation
transformation
time
frame
keywords in animation
computer vision and graphics
rgb
computer graphics and vision
hsv
print
colors
cmyk
desktop
ooad
anna university of technology
alibahrami
project
c
wild life conservation
exit
getpid
fork
linux
c program
adr
Ver mais
Apresentações
(36)Documentos
(4)Gostaram
(10)Advanced Encryption System & Block Cipher Modes of Operations
Adri Jovin
•
Há 4 anos
Heartbleed Bug: A case study
Adri Jovin
•
Há 4 anos
Zoom: Privacy and Security - A case study
Adri Jovin
•
Há 4 anos
Elliptic Curve Cryptography
Adri Jovin
•
Há 4 anos
El Gamal Cryptosystem
Adri Jovin
•
Há 4 anos
Data Encryption Standard
Adri Jovin
•
Há 4 anos
Classical cryptographic techniques, Feistel cipher structure
Adri Jovin
•
Há 4 anos
Mathematical Foundations of Cryptography
Adri Jovin
•
Há 4 anos
Security Models
Adri Jovin
•
Há 4 anos
Introduction to Cryptography
Adri Jovin
•
Há 4 anos
Personal Information
Organização/Local de trabalho
Coimbatore Area, India, TamilNadu India
Cargo
Founder at TechnicalTamil.com, Asst. Prof. at SRIT, Former CTO at Mindnotix Soft. Solns., Principal Researcher at TLTC
Setor
Technology / Software / Internet
Site
www.adrijovin.in
Sobre
A person capable of balancing Academic,Industrial and Research challenges.
Had been a reviewer for the approval of ISO/IEC/IEEE Standards
• ISO/IEC 12207 - Software Life Cycle Processes
• ISO/IEC 15026 - Systems and Software Assurance -- Part 1: Concepts and Vocabulary
• ISO/IEC/IEEE 15289 - Content of Life-Cycle Information Products (Documentation)
• ISO/IEC 29119 - Software Testing -- Part 5: Keyword- Driven Testing
• IEEE 1062 - Recommended Practice for Software Acquisition
• ISO/IEC 15026 - Systems and software assurance -- Part 3: Systems integrity levels
• IEEE 1722 - Standard for a Transport Protocol for Time Sensitive Applications in a Bridged Local Area Network
• ISO/IEC 24748...
Marcadores
adri jovin
sri ramakrishna institute of technology
information technology
artificial intelligence
computer science
security
computer engineering
cryptography
soft computing
department of information technology
database
under graduate
genetic algorithm
fuzzy logic
neural networks
information security
heartbleed bug
cybersecurity
nist
security models
technology
networks
blockchains
privacy
search algortihms
anna university
animation
color models
computer graphics
coimbatore
anna university coimbatore
stxaviers catholic college of engineering
cv
neural network
creativity
academic publishing
open source
licensing
creative commons
image security
securing images
digital image processing
visual cryptography
ethereum
bitcoin
consensus
chennai
amet
workshop
distributed systems
risk management
risk
exploit
vulnerability
threat
asset management
breaches
best practices
fips
cia model
block cipher modes of operation
advanced encryption standard
web security
video conferencing
zoom
secure key exchange
variants of elliptic curve
elliptic curves
elliptic curve arithmetic
elliptic curve cryptography
network
key exchange
elgamal cryptosystem
standard
basis of modern encryption
encryption
des variants
double des
triple des
data encryption standard
playfair cipher
hill cipher
railfence ciphers
transposition ciphers
shift ciphers
steganography
caeser cipher
vigenere cipher
vernam cipher
block cipher
stream cipher
feistel cipher
classical cryptography
euler's theorem
modular arithmetic
extended euclidean algorithm
euclidean algorithm
fermat's theorem
theorems
divisibility
number theory
mathematics
access control
security architecture
cia
rfc 2828
x.800
security services
osi security architecture
security mechanisms
security attacks
adrijovin
network security
basics
advances
engineering
augustine babu
security tools
teaching learning practice
flipped classroom
teaching
web
faculty
programming
microsoft azure
ge8151
jupyter notebooks
python
graph theory
np problems
spanning trees
cliques
vertex cover
graph
network flow
theoretical computer science
chess
min-max
alpha-beta pruning
breadth first search
best first search
depth first search
production systems
control strategies
search algorithms
problem description
problem formulation
cs6659
disadvantages
alan turing
clipping
nvidia
rotation
visualization
seminar
opengl
3d representation
3d
graphics processing unit
translation
transformation
time
frame
keywords in animation
computer vision and graphics
rgb
computer graphics and vision
hsv
print
colors
cmyk
desktop
ooad
anna university of technology
alibahrami
project
c
wild life conservation
exit
getpid
fork
linux
c program
adr
Ver mais