Introduction to Authentication and Key Establishment
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 1-52 doi: 10.1007/978-3-662-58146-9_1
Anshu Chittora and Hemant A. Patil Infant cry analysis and its classification
Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 1- 61.
ODDMS: Online Distributed Dynamic Meeting Scheduler
in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore pp. 199-208 doi: 10.1007/978-981-15-0630-7_19
Protocols Using Shared Key Cryptography
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 95-134 doi: 10.1007/978-3-662-58146-9_3
Hardik B. Sailor and Hemant A. Patil Unsupervised Auditory Filterbank Learning for Infant Cry Classification
Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 63- 92. [in press]
Authentication and Key Transport Using Public Key Cryptography
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 135-164 doi: 10.1007/978-3-662-58146-9_4
Kirtana Sunil Phatnani and Hemant A. Patil Role of Music on Infant Developments
Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 198-212. [in press]
Feeding the Jarawas
in Food and Power : Expressions of Food-Politics in South Asia, Kanchan Mukhopadhyay (eds), Chapter- 8, SAGE Publications pp. 141-167. doi: 10.4135/9789353886059.n8.
Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion
Voice Technologies for Speech Reconstruction and Enhancement Hemant A. Patil and Amy Neustein, Eds. Boston, MA: De Gruyter, 2020, pp. 125-150.
Transport Layer Security Protocol
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 241-288 doi: 10.1007/978-3-662-58146-9_6