Ajita Misra, Vinay Palaparthy, Yash Agrawal Variability Analysis of On-Chip Interconnect System Using Prospective Neural Network
in Advances in VLSI and Embedded Systems, Lecture Notes in Electrical Engineering, vol 676., Patel Z., Gupta S., Kumar Y. B. N. (eds), Springer, Singapore pp. 259-271 ISBN: 9789811562297. doi: 10.1007/978-981-15-6229-7_21
Sujata and Suman K. Mitra Modular facial expression recognition using double channel DNNs
Priyanka Gupta and Hemant A. Patil Voice Biometrics: Attacker's Perspective
in Voice Biometrics: Technology, Trust and Security, Carmen Garcia-Mateo and Gerard Chollet, (eds), IET, UK pp. 125-150. ISBN: 9781785619007
Colin Boyd Transport Layer Security Protocol
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 241-288 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_6
Colin Boyd Identity-Based Key Agreement
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 289-327 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_7
Colin Boyd Group Key Establishment
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 389-440 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_9
Colin Boyd Password-Based Protocols
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 329-387 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_8
Colin Boyd Key Agreement Protocols
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_5
Colin Boyd Computational Security Models
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_2
Anshu Chittora and Hemant A. Patil Understanding infant cry analysis for pathology classification
in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 1- 62. doi: 10.1515/9781501513138-001