Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Mohona Ghosh from books.google.com
... Mohona Ghosh Santosh Ghosh Shamit Ghosh Sylvain Guilley Nupur Gupta Jens Hermans Michael Herrmann Abhishek Kumar Prasanna Kumar Yogesh Kumar Jake Longo Galea Eduard Marin Bodhisatwa Mazumdar Jelena Milosevic Sweta Mishra Dukjae Moon ...
Mohona Ghosh from books.google.com
... Mohona Ghosh , Kishan Chand Gupta , Arpan Jati , Abhishek Kumar , Dukjae Moon , Indranil Ghosh Ray , 64 and Somitra Kumar Sanadhya Transposition of AES Key Schedule 84 Jialin Huang , Hailun Yan , and Xuejia Lai Revisiting the Security ...
Mohona Ghosh from books.google.com
... Mohona Ghosh 1 Introduction The major evolution of the last decade is the usage of social media. The platform is used by almost half of the world [1]. These platforms have a humongous amount of data. Social Media is an essential driver ...
Mohona Ghosh from books.google.com
... Systems 164, https://doi.org/10.1007/978-981-15-9774-9_48 1 Introduction Mobile commerce, also known as m-commerce, is a. A Secure Lightweight Authentication Protocol for Mobile Payment Gungun Sharma and Mohona Ghosh.
Mohona Ghosh from books.google.com
... Mohona Ghosh, and Kusum Kumari Bharti 1 Introduction Complex systems are present all around us. They can be seen in ... Ghosh ( B ) Indira Gandhi Delhi Technical University for Women, Delhi, India e-mail: mohonaghosh@igdtuw.ac.in ...
Mohona Ghosh from books.google.com
... Mohona Ghosh , and Somitra Kumar Sanadhya Rig : A Simple , Secure and Flexible Design for Password Hashing 361 Donghoon Chang , Arpan Jati , Sweta Mishra , and Somitra Kumar Sanadhya Authentication and Encryption Efficient Hardware ...
Mohona Ghosh from books.google.com
... Mohona Ghosh Abstract The term community defines and explains the fact that there exists a group where the members of that group happen to have more commonality amongst each other in terms of features, comparing to the feature of that ...
Mohona Ghosh from books.google.com
... Mohona Ghosh, and Niyati Baliyan Abstract In order to analyse and detect Bot-malware early stage infections in user machine, we need approaches that can complement the current anti-virus and signature-based approaches for Bot-malware ...
Mohona Ghosh from books.google.com
... Mohona Ghosh , Arpan Jati , Abhishek Kumar , and Somitra Kumar Sanadhya Similarity Based Interactive Private Information Retrieval Sashank Dara and V.N. Muralidhara 151 A Secure and Efficient Implementation of the Quotient Digital ...
Mohona Ghosh from books.google.com
... Mohona Ghosh Michael Hutter Arpan Jati Anthony Journault Sabyasachi Karat Ilya Kizhvatov University of Waterloo, Canada Lund University, Sweden NXP Semiconductors, USA Indian Statistical Institute, India Royal Holloway, University of ...