Author of the publication

DNA based Password Authentication Scheme using Hyperelliptic Curve Cryptography for Smart Card

, , and . (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Encryption of Intra and Inter Frames in MPEG Video., , and . CNSA, volume 89 of Communications in Computer and Information Science, page 93-104. Springer, (2010)Automatic segmentation of sub-acute ischemic stroke lesion by using DTCWT and DBN with parameter fine tuning., and . Evol. Intell., 12 (3): 479-490 (2019)Increased level of security using DNA steganography., , and . Int. J. Adv. Intell. Paradigms, 10 (1/2): 74-82 (2018)Game chromatic number of lexicographic product graphs., and . AKCE Int. J. Graphs Comb., 12 (Issues): 216-220 (2015)Reinforcement learning-based multi-objective energy-efficient task scheduling in fog-cloud industrial IoT-based systems., and . Soft Comput., 27 (23): 17473-17491 (December 2023)Multiplicity of triangles in cocktail party graphs.. Discret. Math., 206 (1-3): 217-218 (1999)An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography., , and . Wireless Personal Communications, 89 (4): 1221-1242 (2016)Soil salinity prediction based on hybrid classifier: study on Bellary and Chamarajanagar district in Karnataka., , , and . Multim. Tools Appl., 83 (16): 47225-47246 (May 2024)A Tweakable Key Alternating Lightweight Cipher for Internet of Things., , , and . Int. J. Inf. Secur. Priv., 14 (4): 113-133 (2020)Revisiting Knowledge Management System Use: Unravelling Interventions that Nurture Knowledge Seeking., and . Int. J. Knowl. Manag., 18 (1): 1-25 (2022)