Author of the publication

Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol.

, , , , , , , , , , and . ACIS-ICIS, page 575-580. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Restoring clinical information system operations post data disaster: the role of IT investment, integration and interoperability., , and . Ind. Manag. Data Syst., 121 (12): 2672-2696 (2021)A Cybersecurity Executive DBA?, and . J. Inf. Technol. Educ. Discuss. Cases, (2017)Quantifying the impacts of online fake news on the equity value of social media platforms - Evidence from Twitter., and . Int. J. Inf. Manag., (2022)Machine learning for psychiatric patient triaging: an investigation of cascading classifiers., , , , , and . J. Am. Medical Informatics Assoc., 25 (11): 1481-1487 (2018)A data driven framework for early prediction of customer response to promotions., and . AMCIS, Association for Information Systems, (2015)Extreme value theory and neural network for catastrophic fall prediction: a study of year 2008-2009., , and . IJIDS, 6 (2): 193-210 (2014)Detection and Classification of Attacks on IoT Networks., , , and . AMCIS, Association for Information Systems, (2018)Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol., , , , , , , , , and 1 other author(s). ACIS-ICIS, page 575-580. IEEE Computer Society, (2008)The implications of patient data security considerations for EHR interoperability and downtime recovery., , and . AMCIS, Association for Information Systems, (2019)On a deadlock and performance analysis of ALBR and DAR algorithm on X-Torus topology by optimal utilization of Cross Links and minimal lookups., , and . J. Supercomput., 59 (3): 1252-1288 (2012)