displayNone
Banner

Publications

Books Chapters

  • Nabin K. Sahu, Ouayl Chadli and R. N. Mohapatra Variational Inequalities in Semi-inner Product Spaces Optimization and Its Applications vol 159 in Computational Mathematics and Variational Analysis, Daras N., Rassias T., (eds), Cham: Springer, pp. 421-439.
  • Arnav Saha, Srikumar Sastry Modeling the Dynamics of Carbon Dioxide Over an Educational Institute in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore. pp. 65-75 ISBN: 9789811506307 doi: 10.1007/978-981-15-0630-7_7
  • Colin Boyd Preface in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, pp. vii-ix ISBN: 9783662581452
  • Colin Boyd Introduction to Authentication and Key Establishment in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 1-52 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_1
  • Sanjay Srivastava ODDMS: Online Distributed Dynamic Meeting Scheduler in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore pp. 199-208 ISBN: 9789811506307 doi: 10.1007/978-981-15-0630-7_19
  • Colin Boyd Protocols Using Shared Key Cryptography in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 95-134 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_3
  • Colin Boyd Authentication and Key Transport Using Public Key Cryptography in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 135-164 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_4
  • Vishvajit Pandya and Madhumita Mazumdar Feeding the Jarawas in Food and Power : Expressions of Food-Politics in South Asia, Kanchan Mukhopadhyay (eds), Chapter- 8, SAGE Publications pp. 141-167. ISBN: 9789353886059. doi: 10.4135/9789353886059.n8.
  • Colin Boyd Transport Layer Security Protocol in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 241-288 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_6
  • Colin Boyd Identity-Based Key Agreement in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 289-327 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_7
Back to Top