Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Designing Leakage-Resilient Vibration Based Authentication Techniques., , , and . Trustcom/BigDataSE/ISPA, page 1875-1881. IEEE, (2016)Improved solution to the non-domination level update problem., , and . Appl. Soft Comput., (2017)A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability., and . CoRR, (2015)SG-PASS: A Safe Graphical Password Scheme to Resist Shoulder Surfing and Spyware Attack., and . IHCI, volume 10127 of Lecture Notes in Computer Science, page 27-38. Springer, (2016)A Many Objective Optimization Based Entity Matching Framework for Bibliographic Database., , and . TENCON, page 2054-2058. IEEE, (2019)Towards achieving efficient access control of medical data with both forward and backward secrecy., , , and . Comput. Commun., (2022)An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack., and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 298-317. Springer, (2014)A Federated Multi-stage Light-Weight Vision Transformer for Respiratory Disease Detection., , , and . ICONIP (10), volume 1964 of Communications in Computer and Information Science, page 300-311. Springer, (2023)Security Analysis of Temporal-RBAC Using Timed Automata., and . IAS, page 37-40. IEEE Computer Society, (2008)An unsupervised heuristic based approach for author name disambiguation., , and . COMSNETS, page 540-542. IEEE, (2018)