Search

Your search keyword '"Samrat Mondal"' showing total 39 results

Search Constraints

Start Over You searched for: Author "Samrat Mondal" Remove constraint Author: "Samrat Mondal" Topic computer Remove constraint Topic: computer
39 results on '"Samrat Mondal"'

Search Results

1. Exploiting similarities across multiple dimensions for author name disambiguation

2. On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things

3. Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services

4. Dispersion Ratio based Decision Tree Model for Classification

5. Towards incorporating honeywords in n‐session recording attack resilient unaided authentication services

6. On Overcoming the Identified Limitations of a Usable PIN Entry Method

7. On designing a modified-UI based honeyword generation approach for overcoming the existing limitations

8. GAEMTBD: Genetic algorithm based entity matching techniques for bibliographic databases

9. A Many Objective Optimization Based Entity Matching Framework for Bibliographic Database

10. Towards Predicting Risk of Coronary Artery Disease from Semi-Structured Dataset

11. A multiobjective optimization based entity matching technique for bibliographic databases

12. On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness

13. MobSecure: A Shoulder Surfing Safe Login Approach Implemented on Mobile Device

14. Towards Improving Storage Cost and Security Features of Honeyword Based Approaches

15. SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones

16. drPass: A Dynamic and Reusable Password Generator Protocol

17. Unsupervised method to ensemble results of multiple clustering solutions for bibliographic data

18. SG-PASS: A Safe Graphical Password Scheme to Resist Shoulder Surfing and Spyware Attack

19. CRDT: Correlation Ratio Based Decision Tree Model for Healthcare Data Mining

20. On Designing Leakage-Resilient Vibration Based Authentication Techniques

21. An automatic framework for entity matching in bibliographic databases

22. Security analysis of GTRBAC and its variants using model checking

23. Sensitivity - An Important Facet of Cluster Validation Process for Entity Matching Technique

24. SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing

25. Few notes towards making honeyword system more secure and usable

26. On Validation of Clustering Techniques for Bibliographic Databases

27. Color Pass: An intelligent user interface to resist shoulder surfing attack

28. Cluster validation techniques for Bibliographic databases

29. An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack

30. Tag Digit Based Honeypot to Detect Shoulder Surfing Attack

31. SLASS: Secure Login against Shoulder Surfing

32. Entity Matching Technique for Bibliographic Database

33. A location sensitive access control system

34. Detecting policy misconfigurations in temporal domain using object priority

35. Supporting Negative Authorization in Spatiotemporal Role Based Access Control

36. Role Based Access Control with Spatiotemporal Context for Mobile Applications

37. XML-based policy specification framework for spatiotemporal access control

38. HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack

39. I-SLASS: an improved login approach over SLASS

Catalog

Books, media, physical & digital resources