Author of the publication

Symmetrical Protection of Ownership Right's for IP Buyer and IP Vendor using Facial Biometric Pairing.

, and . iSES, page 272-277. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework., and . Security and Fault Tolerance in Internet of Things, Springer, (2019)Robust Digital Signature to Protect IP Core against Fraudulent Ownership and Cloning., , and . ICCE-Berlin, page 1-3. IEEE, (2019)A Formal Methodology for Modeling Threats to Enterprise Assets., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 149-166. Springer, (2014)A formal methodology for detection of vulnerabilities in an enterprise information system., , and . CRiSIS, page 74-81. IEEE, (2009)Multi-phase watermark for IP core protection., and . ICCE, page 1-3. IEEE, (2018)Audio and Video Technologies: Recent Advances in Consumer Electronics., and . IEEE Consumer Electron. Mag., 7 (5): 26 (2018)A Quantitative Methodology for Cloud Security Risk Assessment., , and . CLOSER, page 92-103. SciTePress, (2017)Secure Information Processing during System-Level: Exploration of an Optimized Trojan Secured Datapath for CDFGs during HLS Based on User Constraints., and . iNIS, page 1-6. IEEE, (2015)Signature Biometric based Authentication of IP Cores for Secure Electronic Systems., and . iSES, page 384-388. IEEE, (2021)User power-delay budget driven PSO based design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis., and . ISQED, page 289-292. IEEE, (2015)