displayNone
banner

Publications

Books Chapters

  • Identity-Based Key Agreement in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 289-327 doi: 10.1007/978-3-662-58146-9_7
  • Group Key Establishment in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 389-440 doi: 10.1007/978-3-662-58146-9_9
  • Blockchain-powered healthcare insurance system in 'Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions' (Healthcare Technologies, 2019), Tanwar, Sudeep; Tyagi, Sudhanshu; Kumar, Neeraj (eds), IET Digital Library, pp. 369-387 doi: 10.1049/PBHE020E_ch16
  • Privacy-Preserving Scheme Against Inference Attack in Social Networks in Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019). Lecture Notes in Networks and Systems, vol 121.,Singh P., Paw?owski W., Tanwar S., Kumar N., Rodrigues J., Obaidat M. (eds), Springer, Singapore pp. 819-830 doi: 10.1007/978-981-15-3369-3_60
  • Blockchain Application for IoT Cybersecurity Management in Essentials of Blockchain Technology, ByKuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino, Boca Raton, Chapman and Hall/CRC doi: 10.1201/9780429674457-7
  • Password-Based Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 329-387 doi: 10.1007/978-3-662-58146-9_8
  • Variational Inequalities in Semi-inner Product Spaces Optimization and Its Applications vol 159 in Computational Mathematics and Variational Analysis, Daras N., Rassias T., (eds), Cham: Springer, pp. 421-439.
  • Anshu Chittora and Hemant A. Patil Infant cry analysis and its classification Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 1- 61.
  • Key Agreement Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 doi: 10.1007/978-3-662-58146-9_5
  • Modeling the Dynamics of Carbon Dioxide Over an Educational Institute in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore. pp. 65-75 doi: 10.1007/978-981-15-0630-7_7
Back to Top