Hardik B. Sailor and Hemant A. Patil Unsupervised Auditory Filterbank Learning for Infant Cry Classification
Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 63- 92. [in press]
Protocols Using Shared Key Cryptography
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 95-134 doi: 10.1007/978-3-662-58146-9_3
Feeding the Jarawas
in Food and Power : Expressions of Food-Politics in South Asia, Kanchan Mukhopadhyay (eds), Chapter- 8, SAGE Publications pp. 141-167. doi: 10.4135/9789353886059.n8.
Kirtana Sunil Phatnani and Hemant A. Patil Role of Music on Infant Developments
Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 198-212. [in press]
Authentication and Key Transport Using Public Key Cryptography
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 135-164 doi: 10.1007/978-3-662-58146-9_4
Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion
Voice Technologies for Speech Reconstruction and Enhancement Hemant A. Patil and Amy Neustein, Eds. Boston, MA: De Gruyter, 2020, pp. 125-150.
Transport Layer Security Protocol
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 241-288 doi: 10.1007/978-3-662-58146-9_6
Identity-Based Key Agreement
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 289-327 doi: 10.1007/978-3-662-58146-9_7
Group Key Establishment
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 389-440 doi: 10.1007/978-3-662-58146-9_9
Password-Based Protocols
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 329-387 doi: 10.1007/978-3-662-58146-9_8