Author of the publication

Towards a Two Factor Authentication Method Using Zero-Knowledge Protocol in Online Banking Services.

, and . PDCAT, volume 931 of Communications in Computer and Information Science, page 459-472. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3D Backscatter Localization for Fine-Grained Robotics., , , , and . NSDI, page 765-782. USENIX Association, (2019)Efficient Peer-to-Peer Data Dissemination in Mobile Ad-Hoc Networks., , , and . ICPP Workshops, page 152-158. IEEE Computer Society, (2002)Contour extrapolation using probabilistic cue combination., and . CVPR Workshops, page 188. IEEE Computer Society, (2006)Protecting Sensitive Location Visits Against Inference Attacks in Trajectory Publishing., , and . PDCAT, page 232-239. IEEE, (2019)Information Exploration in E-Commerce Databases.. BDA, volume 9498 of Lecture Notes in Computer Science, page 41-56. Springer, (2015)Can Persistent Homology provide an efficient alternative for Evaluation of Knowledge Graph Completion Methods?, , , , , and . WWW, page 2455-2466. ACM, (2023)Mining Tag Relationships in CQA Sites., , and . ER, volume 13011 of Lecture Notes in Computer Science, page 345-355. Springer, (2021)Auditing Keyword Queries Over Text Documents., , and . ICON, page 378-387. NLP Association of India (NLPAI), (2021)FastGRNN: A Fast, Accurate, Stable and Tiny Kilobyte Sized Gated Recurrent Neural Network., , , , , and . NeurIPS, page 9031-9042. (2018)A Relaxed Balanced Lock-Free Binary Search Tree., , and . PDCAT, volume 12606 of Lecture Notes in Computer Science, page 304-317. Springer, (2020)