Author of the publication

An Efficient and Secure Micro-payment Transaction Using Shell Cryptography.

, , , , and . QSHINE, volume 115 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 461-469. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Priyanshu,
add a person with the name Priyanshu,
 

Other publications of authors with the same name

An Efficient and Secure Micro-payment Transaction Using Shell Cryptography., , , , and . QSHINE, volume 115 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 461-469. Springer, (2013)FedBully: A Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders., , , and . J. Cyber Secur. Mobil., 12 (4): 465-496 (2023)Accurate torque control of finger joints with UT hand exoskeleton through Bowden cable SEA., , , , and . IROS, page 390-397. IEEE, (2016)Machine Learning Techniques for Channel Estimation in Free Space Optical Communication Systems., , , and . ANTS, page 1-6. IEEE, (2019)A Balanced Hybrid Active-Passive Actuation Approach for High-Performance Haptics., , , , , and . WHC, page 283-288. IEEE, (2019)Continual Distributed Learning for Crisis Management., , and . CoRR, (2021)Improving EEG Signal Classification Accuracy Using Wasserstein Generative Adversarial Networks., , and . CoRR, (2024)Was there COVID-19 back in 2012? Challenge for AI in Diagnosis with Similar Indications., , , , , , , and . CoRR, (2020)On Strong Scaling and Open Source Tools for Analyzing Atom Probe Tomography Data., , , , and . CoRR, (2020)Augmented Embeddings for Custom Retrievals., , , , and . CoRR, (2023)