displayNone
banner

Publications

Books Chapters

  • Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion Voice Technologies for Speech Reconstruction and Enhancement Hemant A. Patil and Amy Neustein, Eds. Boston, MA: De Gruyter, 2020, pp. 125-150.
  • Key Agreement Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 doi: 10.1007/978-3-662-58146-9_5
  • Girish Kumar Mekala, Yash Agrawal, Rajeevan Chandel and Ashwani Kumar Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET) Balwinder Raj, Mamta Khosla and Amandeep Singh, Eds. USA: IGI Global, Jan. 2020, pp. 189-211, doi: 10.4018/978-1-7998-1393-4.ch009
  • Computational Security Models in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 doi: 10.1007/978-3-662-58146-9_2
  • Understanding infant cry analysis for pathology classification in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 1- 62. doi: 10.1515/9781501513138-001
  • Unsupervised auditory filterbank learning for infant cry classification in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 63- 92. doi: 10.1515/9781501513138-002
  • Role of Music on Infant Developments in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 198-212. doi: 10.1515/9781501513138-006
  • Non-audible murmur to audible speech conversion in Voice Technologies for Speech Reconstruction and Enhancement, Hemant A. Patil and Amy Neustein, (eds), Boston, MA: De Gruyter pp. 125-150. doi: 10.1515/9781501501265-006.
  • Blockchain-powered healthcare insurance system in 'Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions' (Healthcare Technologies, 2019), Tanwar, Sudeep; Tyagi, Sudhanshu; Kumar, Neeraj (eds), IET Digital Library, pp. 369-387 doi: 10.1049/PBHE020E_ch16
  • Privacy-Preserving Scheme Against Inference Attack in Social Networks in Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019). Lecture Notes in Networks and Systems, vol 121.,Singh P., Paw?owski W., Tanwar S., Kumar N., Rodrigues J., Obaidat M. (eds), Springer, Singapore pp. 819-830 doi: 10.1007/978-981-15-3369-3_60
Back to Top