displayNone
Banner

Publications

Books Chapters

  • Colin Boyd Group Key Establishment in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 389-440 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_9
  • Colin Boyd Password-Based Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 329-387 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_8
  • Colin Boyd Key Agreement Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_5
  • Colin Boyd Computational Security Models in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_2
  • Anshu Chittora and Hemant A. Patil Understanding infant cry analysis for pathology classification in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 1- 62. doi: 10.1515/9781501513138-001
  • Hardik B. Sailor and Hemant A. Patil Unsupervised auditory filterbank learning for infant cry classification in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 63- 92. doi: 10.1515/9781501513138-002
  • Kirtana Sunil Phatnani and Hemant A. Patil Role of Music on Infant Developments in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 198-212. doi: 10.1515/9781501513138-006
  • Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion in Voice Technologies for Speech Reconstruction and Enhancement, Hemant A. Patil and Amy Neustein, (eds), Boston, MA: De Gruyter pp. 125-150. doi: 10.1515/9781501501265-006.
  • Ashwani Kumar, Girish Kumar Mekala, Rajeevan Chandel Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET) Balwinder Raj, Mamta Khosla and Amandeep Singh, Eds. USA: IGI Global, Jan. 2020, pp. 189-211, doi: 10.4018/978-1-7998-1393-4.ch009
  • Hardik Gajera, Manik Lal Das and Viral Shah Blockchain-powered healthcare insurance system in 'Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions' (Healthcare Technologies, 2019), Tanwar, Sudeep; Tyagi, Sudhanshu; Kumar, Neeraj (eds), IET Digital Library, pp. 369-387 ISBN: 9781785618994 doi: 10.1049/PBHE020E_ch16
Back to Top