Author of the publication

An Approach to Cryptographic Key Exchange Using Fingerprint.

, , and . SSCC, volume 467 of Communications in Computer and Information Science, page 162-172. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ASRA: Automatic singular value decomposition-based robust fingerprint image alignment., , , and . Multim. Tools Appl., 80 (10): 15647-15675 (2021)Bayesian Analysis of Different Hybrid and Progressive Life Tests., , , and . Commun. Stat. Simul. Comput., 42 (9): 2160-2173 (2013)Order restricted Bayesian inference for exponential simple step-stress model., , , and . Commun. Stat. Simul. Comput., 46 (2): 1113-1135 (2017)A Novel Approach to Fingerprint Biometric-Based Cryptographic Key Generation and its Applications to Storage Security., and . Comput. Electr. Eng., (2018)A blockchain-based approach to secure electronic health records using fuzzy commitment scheme., , , and . Secur. Priv., (2022)Medical Information Retrieval and Interpretation: A Question-Answer based Interaction Model., , , and . CoRR, (2021)Detection of alcoholism by combining EEG local activations with brain connectivity features and Graph Neural Network., , , and . Biomed. Signal Process. Control., (August 2023)Enumerating message paths for interaction testing of object-oriented systems., and . Innov. Syst. Softw. Eng., 12 (4): 279-301 (2016)Removal of Eye Blink Artifacts From EEG Signals Using Sparsity., , , and . IEEE J. Biomed. Health Informatics, 22 (5): 1362-1372 (2018)An efficient approach to iris detection for iris biometric processing., and . Int. J. Comput. Appl. Technol., 35 (1): 2-9 (2009)