displayNone
banner

Publications

Books Chapters

  • Risk Profile: Findings from the Field in Risks in Agriculture : Farmers' Perspective, Parikh A., SpringerBriefs in Economics. Springer, Singapore pp. 61-84. doi: 10.1007/978-981-10-6271-1_4
  • Message from the technical program chairs Information Systems Security, Lecture Notes in Computer Science 6503, by Somesh Jha, Anish Mathuria (Eds.) Springer-Verlag, Berlin, Heidelberg, Dec. 2010, pp. VII 10.1007/978-3-642-17714-9
  • Whose Bollywood is this anyway? : Exploring critical frameworks for studying popular Hindi cinema in Critical Pedagogy, Race, and Media : Diversity and Inclusion in Higher Education Teaching, Susan Flynn, Melanie A. Marotta (eds), Routledge, London pp.141-154 doi: 10.4324/9781003222835-10
  • Semi-inner Product: Application to Frame Theory and Numerical Range of Operators in Mathematics and Computing 2013, Ram N. Mohapatra, [et al.], ed. New Delhi, Springer pp 77-90. Doi: 10.1007/978-81-322-1952-1_6
  • Security and Privacy Issues in Outsourced Personal Health Record in Research advances in Cloud Computing, Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya, (eds), Singapore: Springer, pp. 431-447. doi: 10.1007/978-981-10-5026-8_17
  • Analysis of normal and pathological voices by novel chaotic titration method in Signal and Acoustic Modelling for Speech and Communication Disorders, Hemant A. Patil, Amy Neustein, and Manisha Kulshetra, (eds), Berlin: De Gruyter, pp. 87-120. doi: 10.1515/9781501502415
  • Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique in Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET), Balwinder Raj, Mamta Khosla and Amandeep Singh, (eds), USA: IGI Global pp. 189-211 doi: 10.4018/978-1-7998-1393-4.ch009.
  • Securing Digital Image with Authentication Code in Computer Vision and Image Processing in Intelligent Systems and Multimedia Technologies, Muhammad Sarfraz, (ed), Pennsylvania, USA: IGI Global pp. 203-215. Doi:10.4018/978-1-4666-6030-4.ch011
  • Privacy and Accountability Concerns in the Age of Big Data in Big Data: Storage, Sharing, and Security, Fei Hu (ed), CRC Press, pp. 341-356. DOI: 10.1201/b19694-17
  • Blind steganalysis using machine intelligence in Computational Techniques and Algorithms for Image Processing, S. Ramakrishnan and Ibrahiem M. M. El Emary Ed. Saarbr cken: Lambert Academic Publishing (LAP),
Back to Top