Author of the publication

On designing a modified-UI based honeyword generation approach for overcoming the existing limitations.

, and . Comput. Secur., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Few notes towards making honeyword system more secure and usable., and . SIN, page 237-245. ACM, (2015)SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones., , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 129-145. Springer, (2018)An Automated Policy Verification and Enforcement Framework for Ethereum Applications., , and . ICBC, page 1-5. IEEE, (2023)COVID-19 Detection from Lung Ultrasound Images using a Fuzzy Ensemble-based Transfer Learning Technique., , , and . ICPR, page 5170-5176. IEEE, (2022)Tag Digit Based Honeypot to Detect Shoulder Surfing Attack., and . SSCC, volume 467 of Communications in Computer and Information Science, page 101-110. Springer, (2014)Multi-Objective Heuristic Charge Scheduling and Eco-Routing Mechanism for Electric Vehicles., , and . e-Energy, page 468-470. ACM, (2018)Subdomain adaptation via correlation alignment with entropy minimization for unsupervised domain adaptation., , , and . Pattern Anal. Appl., 27 (1): 13 (March 2024)Vision Transformer Based COVID-19 Detection Using Chest CT-scan images., , , and . BHI, page 1-4. IEEE, (2022)Supporting Negative Authorization in Spatiotemporal Role Based Access Control., and . NetCoM, page 422-427. IEEE Computer Society, (2009)Vision Transformer-Based Federated Learning for COVID-19 Detection Using Chest X-Ray., , , , and . ICONIP (7), volume 1794 of Communications in Computer and Information Science, page 77-88. Springer, (2022)