Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services | 0 | 0.34 | 2022 |
Efficient and provably secure intelligent geometrical method of secret key generation for cryptographic applications | 0 | 0.34 | 2022 |
Two-stage approach to feature set optimization for unsupervised dataset with heterogeneous attributes | 2 | 0.35 | 2021 |
Asra: Automatic Singular Value Decomposition-Based Robust Fingerprint Image Alignment | 0 | 0.34 | 2021 |
Distance-based weighted sparse representation to classify motor imagery EEG signals for BCI applications | 1 | 0.35 | 2020 |
VectorEntry: Text Entry Mechanism Using Handheld Touch-Enabled Mobile Devices for People with Visual Impairments | 0 | 0.34 | 2020 |
Advanced Feature Identification towards Research Article Recommendation: A Machine Learning Based Approach | 0 | 0.34 | 2019 |
A Fuzzy-Based Two-Stage Biometric Sample Quality Evaluation System | 0 | 0.34 | 2019 |
Modeling and Coverage Analysis of Programs with Exception Handling | 1 | 0.35 | 2019 |
Classification of multiclass motor imagery EEG signal using sparsity approach. | 1 | 0.36 | 2019 |
Analysis of Weibull Step-Stress Model In Presence of Competing Risk | 0 | 0.34 | 2019 |
Biometric-based cryptography for digital content protection without any key storage | 2 | 0.40 | 2019 |
Weighted Sparse Representation For Classification Of Motor Imagery Eeg Signals | 0 | 0.34 | 2019 |
A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme. | 2 | 0.35 | 2019 |
Estimation and quantification of vigilance using ERPs and eye blink rate with a fuzzy model-based approach | 2 | 0.37 | 2019 |
Order restricted inference of a multiple step-stress model. | 0 | 0.34 | 2018 |
Network and Security Analysis of Anonymous Communication Networks. | 0 | 0.34 | 2018 |
Mental Workload Estimation from EEG Signals Using Machine Learning Algorithms. | 1 | 0.34 | 2018 |
Classification Of Eeg Signals For Cognitive Load Estimation Using Deep Learning Architectures | 0 | 0.34 | 2018 |
Removal of Eye Blink Artifacts From EEG Signals Using Sparsity. | 2 | 0.37 | 2018 |
Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment. | 2 | 0.36 | 2018 |
Stealing Neural Networks via Timing Side Channels. | 3 | 0.37 | 2018 |
A Novel Approach to Fingerprint Biometric-Based Cryptographic Key Generation and its Applications to Storage Security. | 1 | 0.37 | 2018 |
Privacy preserving two-server Diffie-Hellman key exchange protocol. | 0 | 0.34 | 2017 |
Order restricted Bayesian inference for exponential simple step-stress model. | 1 | 0.43 | 2017 |
Correlation Of P300 Erps With Visual Stimuli And Its Application To Vigilance Detection | 1 | 0.39 | 2017 |
A novel secure key-exchange protocol using biometrics of the sender and receiver. | 0 | 0.34 | 2017 |
Bci Augmented Text Entry Mechanism For People With Special Needs | 0 | 0.34 | 2016 |
PressTact: Side Pressure-Based Input for Smartwatch Interaction. | 3 | 0.38 | 2016 |
Enumerating message paths for interaction testing of object-oriented systems | 0 | 0.34 | 2016 |
SurfaceSense: Smartphone Can Recognize Where It Is Kept | 2 | 0.38 | 2015 |
Fingerprint-based crypto-biometric system for network security | 1 | 0.35 | 2015 |
ETAO Keyboard: Text Input Technique on Smartwatches. | 1 | 0.37 | 2015 |
A Protocol to Evaluate Virtual Keyboards for Indian Languages | 2 | 0.42 | 2015 |
Using Hall Effect Sensors for 3D Space Text Entry on Smartwatches. | 1 | 0.37 | 2015 |
Approach to cryptographic key generation from fingerprint biometrics. | 0 | 0.34 | 2015 |
A UML model-based approach to detect infeasible paths | 2 | 0.38 | 2015 |
On-the-Fly Mapping for Synthesizing Dynamic Domino Circuits | 0 | 0.34 | 2015 |
An Approach to Cryptographic Key Exchange Using Fingerprint. | 0 | 0.34 | 2014 |
Fingerprint indexing using minutiae-based invariable set of multidimensional features | 0 | 0.34 | 2014 |
Design and evaluation of a dwell-free eye typing technique | 6 | 0.48 | 2014 |
An Efficient Fingerprint Matching Approach Based on Minutiae to Minutiae Distance Using Indexing with Effectively Lower Time Complexity | 5 | 0.41 | 2014 |
Social Cloud: Concept, Current Trends and Future Scope. | 0 | 0.34 | 2014 |
An approach to cryptographic key distribution through fingerprint based key distribution center | 0 | 0.34 | 2014 |
Word Prediction System for Text Entry in Hindi | 6 | 0.64 | 2014 |
EasyTap: An Easy Text Entry Method for Blind Mobile Phone Users. | 0 | 0.34 | 2014 |
An Approach To Design Virtual Keyboards For Text Composition In Indian Languages | 4 | 0.41 | 2013 |
Bayesian Analysis of Different Hybrid and Progressive Life Tests | 3 | 0.55 | 2013 |
Exploring an effective interaction mode for blind mobile users in India | 2 | 0.36 | 2013 |
Automatic code generation from unified modelling language sequence diagrams | 0 | 0.34 | 2013 |