Kumari, Saru
13  Ergebnisse:
Personensuche X
?
1

Correctness Proof of the Verification of 'A Combined Public..:

, In: Cryptology and Network Security with Machine Learning; Lecture Notes in Networks and Systems,
Goel, Shivani ; Gupta, M. K. ; Kumari, Saru - p. 253-262 , 2024
 
?
2

Fick's Law Algorithm with Gaussian Mutation: Design and Ana..:

, In: Lecture Notes in Electrical Engineering; Genetic and Evolutionary Computing,
Li, Haonan ; Chu, Shu-Chuan ; Kumari, Saru. - p. 456-467 , 2024
 
?
3

Analyzing and Enhancing a User Authentication Scheme for Ad..:

, In: Cryptology and Network Security with Machine Learning; Lecture Notes in Networks and Systems,
Kumari, Saru ; Tyagi, Pooja - p. 505-525 , 2024
 
?
4

To Analyze Security Requirements of Two AKA Protocols in WB..:

, In: Advances in Smart Vehicular Technology, Transportation, Communication and Applications; Smart Innovation, Systems and Technologies,
Wu, Haozhi ; Kumari, Saru ; Wu, Tsu-Yang - p. 491-500 , 2023
 
?
5

TUDF-NeRF: Generalizable Neural Radiance Field via Truncate..:

, In: 2023 Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC),
Yang, Zhongqi ; Chen, Yihua ; Kumari, Saru - p. 366-371 , 2023
 
?
6

Privileged Insider Attacks on Two Authentication Schemes:

, In: Advances in Smart Vehicular Technology, Transportation, Communication and Applications; Smart Innovation, Systems and Technologies,
Hao, Yiru ; Kumari, Saru ; Lakshmanna, Kuruva. - p. 515-524 , 2023
 
?
7

Security Analysis of Two Authentication and Key Agreement P..:

, In: Advances in Smart Vehicular Technology, Transportation, Communication and Applications; Smart Innovation, Systems and Technologies,
Wang, Liyang ; Kumari, Saru ; Wu, Tsu-Yang - p. 563-574 , 2023
 
?
8

Comments on "Two Authentication and Key Agreement Protocols..:

, In: Advances in Smart Vehicular Technology, Transportation, Communication and Applications; Smart Innovation, Systems and Technologies,
Kong, Fangfang ; Kumari, Saru ; Wu, Tsu-Yang - p. 551-561 , 2023
 
?
9

Flaws of a Password-Based Three-Party Authenticated Key Agr..:

, In: Cryptology and Network Security with Machine Learning; Algorithms for Intelligent Systems,
Yadav, Sonam ; Dabra, Vivek ; Malik, Pradeep. - p. 63-70 , 2023
 
?
10

A Traceable and Revocable Attribute-based Encryption Scheme..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Zhao, Yang ; Liu, Zhaozhong ; An, Jingmin.. - p. 624-639 , 2022
 
?
11

Security Flaws in Dhillon and Kalra's User Authentication S..:

, In: 2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT),
Tyagi, Pooja ; Kumari, Saru - p. 1-4 , 2022
 
?
12

Flaws and Amendment in an ECC-based Authentication Scheme f..:

, In: 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART),
Gupta, Mridul K. ; Kumar, Rahul ; Kumari, Saru - p. 372-376 , 2020
 
?
13

Agile Approaches and Practices in Higher Education Systems:

, In: Enhancing Education With Intelligent Systems and Data-Driven Instruction; Advances in Educational Technologies and Instructional Design,
Dhir, Saru ; Kumari, Sakshi ; Gupta, Sumita - p. 1-22 , 2024
 
1-13