Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion
Voice Technologies for Speech Reconstruction and Enhancement Hemant A. Patil and Amy Neustein, Eds. Boston, MA: De Gruyter, 2020, pp. 125-150.
Protocols Using Shared Key Cryptography
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 95-134 doi: 10.1007/978-3-662-58146-9_3
Authentication and Key Transport Using Public Key Cryptography
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 135-164 doi: 10.1007/978-3-662-58146-9_4
Feeding the Jarawas
in Food and Power : Expressions of Food-Politics in South Asia, Kanchan Mukhopadhyay (eds), Chapter- 8, SAGE Publications pp. 141-167. doi: 10.4135/9789353886059.n8.
Transport Layer Security Protocol
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 241-288 doi: 10.1007/978-3-662-58146-9_6
Identity-Based Key Agreement
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 289-327 doi: 10.1007/978-3-662-58146-9_7
Group Key Establishment
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 389-440 doi: 10.1007/978-3-662-58146-9_9
Password-Based Protocols
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 329-387 doi: 10.1007/978-3-662-58146-9_8
Key Agreement Protocols
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 doi: 10.1007/978-3-662-58146-9_5
Computational Security Models
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 doi: 10.1007/978-3-662-58146-9_2