Hemant A. Patil, Nirmesh J. Shah Non-audible murmur to audible speech conversion
Voice Technologies for Speech Reconstruction and Enhancement Hemant A. Patil and Amy Neustein, Eds. Boston, MA: De Gruyter, 2020, pp. 125-150.
Colin Boyd Protocols Using Shared Key Cryptography
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 95-134 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_3
Colin Boyd Authentication and Key Transport Using Public Key Cryptography
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 135-164 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_4
Vishvajit Pandya and Madhumita Mazumdar Feeding the Jarawas
in Food and Power : Expressions of Food-Politics in South Asia, Kanchan Mukhopadhyay (eds), Chapter- 8, SAGE Publications pp. 141-167. ISBN: 9789353886059. doi: 10.4135/9789353886059.n8.
Colin Boyd Transport Layer Security Protocol
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 241-288 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_6
Colin Boyd Identity-Based Key Agreement
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 289-327 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_7
Colin Boyd Group Key Establishment
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 389-440 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_9
Colin Boyd Password-Based Protocols
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 329-387 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_8
Colin Boyd Key Agreement Protocols
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_5
Colin Boyd Computational Security Models
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_2