displayNone
banner

Publications

Books Chapters

  • Smart Soldier Health Monitoring System Incorporating Embedded Electronics in Advances in VLSI and Embedded Systems. AVES-2019, SVNIT Surat, Lecture Notes in Electrical Engineering, vol 676. , Patel Z., Gupta S., Kumar Y. B. N. (eds), Springer, Singapore. pp. 223–234 doi: 10.1007/978-981-15-6229-7_18
  • Variability Analysis of On-Chip Interconnect System Using Prospective Neural Network in Advances in VLSI and Embedded Systems, Lecture Notes in Electrical Engineering, vol 676., Patel Z., Gupta S., Kumar Y. B. N. (eds), Springer, Singapore pp. 259-271 doi: 10.1007/978-981-15-6229-7_21
  • Modular facial expression recognition using double channel DNNs
  • ODDMS: Online Distributed Dynamic Meeting Scheduler in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore pp. 199-208 doi: 10.1007/978-981-15-0630-7_19
  • Girish Kumar Mekala, Yash Agrawal, Rajeevan Chandel and Ashwani Kumar Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET) Balwinder Raj, Mamta Khosla and Amandeep Singh, Eds. USA: IGI Global, Jan. 2020, pp. 189-211, doi: 10.4018/978-1-7998-1393-4.ch009
  • Introduction to Authentication and Key Establishment in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 1-52 doi: 10.1007/978-3-662-58146-9_1
  • Protocols Using Shared Key Cryptography in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 95-134 doi: 10.1007/978-3-662-58146-9_3
  • Feeding the Jarawas in Food and Power : Expressions of Food-Politics in South Asia, Kanchan Mukhopadhyay (eds), Chapter- 8, SAGE Publications pp. 141-167. doi: 10.4135/9789353886059.n8.
  • Authentication and Key Transport Using Public Key Cryptography in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 135-164 doi: 10.1007/978-3-662-58146-9_4
  • Transport Layer Security Protocol in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 241-288 doi: 10.1007/978-3-662-58146-9_6
Back to Top