Author of the publication

A novel secure key-exchange protocol using biometrics of the sender and receiver.

, , , and . Comput. Electr. Eng., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient private key generation from iris data for privacy and security applications., , , and . J. Inf. Secur. Appl., (June 2023)Bayesian Analysis of Different Hybrid and Progressive Life Tests., , , and . Commun. Stat. Simul. Comput., 42 (9): 2160-2173 (2013)Order restricted Bayesian inference for exponential simple step-stress model., , , and . Commun. Stat. Simul. Comput., 46 (2): 1113-1135 (2017)A Novel Approach to Fingerprint Biometric-Based Cryptographic Key Generation and its Applications to Storage Security., and . Comput. Electr. Eng., (2018)A blockchain-based approach to secure electronic health records using fuzzy commitment scheme., , , and . Secur. Priv., (2022)Medical Information Retrieval and Interpretation: A Question-Answer based Interaction Model., , , and . CoRR, (2021)ASRA: Automatic singular value decomposition-based robust fingerprint image alignment., , , and . Multim. Tools Appl., 80 (10): 15647-15675 (2021)Enumerating message paths for interaction testing of object-oriented systems., and . Innov. Syst. Softw. Eng., 12 (4): 279-301 (2016)Removal of Eye Blink Artifacts From EEG Signals Using Sparsity., , , and . IEEE J. Biomed. Health Informatics, 22 (5): 1362-1372 (2018)An efficient approach to iris detection for iris biometric processing., and . Int. J. Comput. Appl. Technol., 35 (1): 2-9 (2009)