displayNone
Banner

Publications

Books Chapters

  • Ajita Misra, Vinay Palaparthy, Yash Agrawal Variability Analysis of On-Chip Interconnect System Using Prospective Neural Network in Advances in VLSI and Embedded Systems, Lecture Notes in Electrical Engineering, vol 676., Patel Z., Gupta S., Kumar Y. B. N. (eds), Springer, Singapore pp. 259-271 ISBN: 9789811562297. doi: 10.1007/978-981-15-6229-7_21
  • Sujata and Suman K. Mitra Modular facial expression recognition using double channel DNNs
  • Priyanka Gupta and Hemant A. Patil Voice Biometrics: Attacker's Perspective in Voice Biometrics: Technology, Trust and Security, Carmen Garcia-Mateo and Gerard Chollet, (eds), IET, UK pp. 125-150. ISBN: 9781785619007
  • Colin Boyd Transport Layer Security Protocol in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 241-288 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_6
  • Colin Boyd Identity-Based Key Agreement in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 289-327 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_7
  • Colin Boyd Group Key Establishment in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 389-440 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_9
  • Colin Boyd Password-Based Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 329-387 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_8
  • Colin Boyd Key Agreement Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_5
  • Colin Boyd Computational Security Models in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_2
  • Anshu Chittora and Hemant A. Patil Understanding infant cry analysis for pathology classification in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 1- 62. doi: 10.1515/9781501513138-001
Back to Top