Author of the publication

Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique.

, , , and . SSCC, volume 536 of Communications in Computer and Information Science, page 146-156. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real Stock Trading Using Soft Computing Models., , , and . ITCC (2), page 162-167. IEEE Computer Society, (2005)isbn: 0-7695-2315-3.Modelling of Assembly Partitions for a Distributed Environment., and . ICRA (2), page 52-57. IEEE Computer Society Press, (1993)Reducing Latency in Ad Hoc Networks by Pre-Fetching., , and . International Conference on Wireless Networks, page 952-958. CSREA Press, (2004)Multilevel Threshold Secret Sharing in Distributed Cloud., , , and . SSCC, volume 536 of Communications in Computer and Information Science, page 13-23. Springer, (2015)Dynamic Workload Balancing for Hadoop MapReduce., , , and . BDCloud, page 56-62. IEEE Computer Society, (2014)Location-Triggered Routing Protocol in Mobile Ad Hoc Networks., and . NCA, page 261-268. IEEE Computer Society, (2004)Sector-based routing for secure energy efficient communications., , , and . WCNC, page 457-462. IEEE, (2006)Cleaning Framework for BigData: An Interactive Approach for Data Cleaning., , , and . BigDataService, page 174-181. IEEE Computer Society, (2016)An Empirical Approach to Detection of Topic Bubbles in Tweets., , and . BDC, page 31-40. IEEE Computer Society, (2015)Quantum Circuit Optimization: Current trends and future direction., , , and . CoRR, (2024)