Search for persons
X
?
2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS) ,
2
An Efficient Quantum cryptanalysis of lightweight hash func..:
, In:
?
2023 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA) ,
4
An ECC based Anonymous Authentication Protocol for Internet..:
, In:
?
Lecture Notes in Electrical Engineering; Advances in Micro-Electronics, Embedded Systems and IoT ,
5
Analysis of Password Protected Documents Using Statistical ..:
, In:
?
Lecture Notes in Networks and Systems; Computer Communication, Networking and IoT ,
6
Securing Communication in IoT Environment Using Lightweight..:
, In:
?
Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing ,
7
Ceiling Improvement on Breast Cancer Prediction Accuracy Us..:
, In:
?
Lecture Notes in Electrical Engineering; High Performance Computing and Networking ,
8
Cryptanalysis of SIMON (32/64) Cipher Using Satisfiability ..:
, In:
?
Computer Networks, Big Data and IoT; Lecture Notes on Data Engineering and Communications Technologies ,
9
Reduced Complexity of LDPC Codes using Hard Decision Decode:
, In:
?
Transactions on Computational Science and Computational Intelligence; Second International Conference on Networks and Advances in Computational Technologies ,
10
Rainbow Tables for Cryptanalysis of A5/1 Stream Cipher:
, In:
?
2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) ,
12
Secret Sharing Scheme Using Identity Based Signatures:
, In:
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
14
A Machine Vision Attack Model on Image Based CAPTCHAs Chall..:
, In:
?
Advances in Intelligent Systems and Computing; Computational Intelligence: Theories, Applications and Future Directions - Volume II ,
15