displayNone
banner

Publications

Books Chapters

  • Smart Soldier Health Monitoring System Incorporating Embedded Electronics in Advances in VLSI and Embedded Systems. AVES-2019, SVNIT Surat, Lecture Notes in Electrical Engineering, vol 676. , Patel Z., Gupta S., Kumar Y. B. N. (eds), Springer, Singapore. pp. 223–234 doi: 10.1007/978-981-15-6229-7_18
  • Variability Analysis of On-Chip Interconnect System Using Prospective Neural Network in Advances in VLSI and Embedded Systems, Lecture Notes in Electrical Engineering, vol 676., Patel Z., Gupta S., Kumar Y. B. N. (eds), Springer, Singapore pp. 259-271 doi: 10.1007/978-981-15-6229-7_21
  • Modular facial expression recognition using double channel DNNs
  • Group Key Establishment in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 389-440 doi: 10.1007/978-3-662-58146-9_9
  • Password-Based Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 329-387 doi: 10.1007/978-3-662-58146-9_8
  • Key Agreement Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 doi: 10.1007/978-3-662-58146-9_5
  • Girish Kumar Mekala, Yash Agrawal, Rajeevan Chandel and Ashwani Kumar Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET) Balwinder Raj, Mamta Khosla and Amandeep Singh, Eds. USA: IGI Global, Jan. 2020, pp. 189-211, doi: 10.4018/978-1-7998-1393-4.ch009
  • Blockchain-powered healthcare insurance system in 'Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions' (Healthcare Technologies, 2019), Tanwar, Sudeep; Tyagi, Sudhanshu; Kumar, Neeraj (eds), IET Digital Library, pp. 369-387 doi: 10.1049/PBHE020E_ch16
  • Privacy-Preserving Scheme Against Inference Attack in Social Networks in Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019). Lecture Notes in Networks and Systems, vol 121.,Singh P., Paw?owski W., Tanwar S., Kumar N., Rodrigues J., Obaidat M. (eds), Springer, Singapore pp. 819-830 doi: 10.1007/978-981-15-3369-3_60
  • Computational Security Models in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 doi: 10.1007/978-3-662-58146-9_2
Back to Top