Author of the publication

2F-MASK-VSS: Two-factor mutual authentication and session key agreement scheme for video surveillance system.

, , and . J. Syst. Archit., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Suitability analysis of software reliability models for its applicability on NPP systems., , and . Qual. Reliab. Eng. Int., 34 (8): 1491-1509 (2018)Software reliability analysis for safety-critical and control systems., , and . Qual. Reliab. Eng. Int., 36 (1): 340-353 (2020)Biometric Template Protection Using Deep Learning., , and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 964-974. Springer, (2020)Cross domain sentiment analysis using transfer learning., , , , , , and . ICIIS, page 1-5. IEEE, (2017)SOFTii: Soft Tangible Interface for Continuous Control of Virtual Objects with Pressure-based Input., , , , and . TEI, page 539-544. ACM, (2015)Convex Optimization of Energy and Delay Using Logical Effort Method in Deep Sub-micron Technology., , , and . VDAT, volume 382 of Communications in Computer and Information Science, page 185-193. Springer, (2013)Leaf-Shaped Antennas for Sub-6 GHz 5G Applications., , , , and . IEEE Access, (2024)An Explainable Machine Learning Approach for Definition Extraction., , , and . MIND (2), volume 1241 of Communications in Computer and Information Science, page 145-155. Springer, (2020)Interpretive structural modeling of lean six sigma critical success factors in perspective of industry 4.0 for Indian manufacturing industries., , , and . Int. J. Syst. Assur. Eng. Manag., 15 (8): 3776-3793 (August 2024)Power-Efficient Secured Hardware Design of AES Algorithm on High Performance FPGA., , , , , and . IC3I, page 1634-1637. IEEE, (2022)