Author of the publication

Efficient and provably secure intelligent geometrical method of secret key generation for cryptographic applications.

, , , and . Comput. Electr. Eng., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient private key generation from iris data for privacy and security applications., , , and . J. Inf. Secur. Appl., (June 2023)Bayesian Analysis of Different Hybrid and Progressive Life Tests., , , and . Commun. Stat. Simul. Comput., 42 (9): 2160-2173 (2013)Order restricted Bayesian inference for exponential simple step-stress model., , , and . Commun. Stat. Simul. Comput., 46 (2): 1113-1135 (2017)A Novel Approach to Fingerprint Biometric-Based Cryptographic Key Generation and its Applications to Storage Security., and . Comput. Electr. Eng., (2018)A blockchain-based approach to secure electronic health records using fuzzy commitment scheme., , , and . Secur. Priv., (2022)Advanced Feature Identification towards Research Article Recommendation: A Machine Learning Based Approach., , and . TENCON, page 7-12. IEEE, (2019)Multimodal Deep Sparse Subspace Clustering for Multiple Stimuli-based Cognitive task., , and . ICPR, page 1098-1104. IEEE, (2022)Detection of alcoholism by combining EEG local activations with brain connectivity features and Graph Neural Network., , , and . Biomed. Signal Process. Control., (August 2023)Enumerating message paths for interaction testing of object-oriented systems., and . Innov. Syst. Softw. Eng., 12 (4): 279-301 (2016)ASRA: Automatic singular value decomposition-based robust fingerprint image alignment., , , and . Multim. Tools Appl., 80 (10): 15647-15675 (2021)