Colin Boyd Group Key Establishment
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 389-440 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_9
Nidhi Desai and Manik Lal Das Privacy-Preserving Scheme Against Inference Attack in Social Networks
in Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019). Lecture Notes in Networks and Systems, vol 121.,Singh P., Paw?owski W., Tanwar S., Kumar N., Rodrigues J., Obaidat M. (eds), Springer, Singapore pp. 819-830 ISBN: 9789811533693 doi: 10.1007/978-981-15-3369-3_60
Alexander Tolstoy, Manik Lal Das, Natalia Miloslavskaya, Vladimir Budzko Blockchain Application for IoT Cybersecurity Management
in Essentials of Blockchain Technology, ByKuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino, Boca Raton, Chapman and Hall/CRC ISBN: 9780429674457. doi: 10.1201/9780429674457-7
Nabin K. Sahu, Ouayl Chadli and R. N. Mohapatra Variational Inequalities in Semi-inner Product Spaces Optimization and Its Applications vol 159
in Computational Mathematics and Variational Analysis, Daras N., Rassias T., (eds), Cham: Springer, pp. 421-439.
Colin Boyd Password-Based Protocols
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 329-387 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_8
Arnav Saha, Srikumar Sastry Modeling the Dynamics of Carbon Dioxide Over an Educational Institute
in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore. pp. 65-75 ISBN: 9789811506307 doi: 10.1007/978-981-15-0630-7_7
Colin Boyd Key Agreement Protocols
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_5
Sanjay Srivastava ODDMS: Online Distributed Dynamic Meeting Scheduler
in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore pp. 199-208 ISBN: 9789811506307 doi: 10.1007/978-981-15-0630-7_19
Vishvajit Pandya and Madhumita Mazumdar Feeding the Jarawas
in Food and Power : Expressions of Food-Politics in South Asia, Kanchan Mukhopadhyay (eds), Chapter- 8, SAGE Publications pp. 141-167. ISBN: 9789353886059. doi: 10.4135/9789353886059.n8.
Colin Boyd Computational Security Models
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_2