P. S. Avadhani

According to our database1, P. S. Avadhani authored at least 16 papers between 1994 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
New approach of authentication method based on profiles.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

2015
Implementing high interaction honeypot to study SSH attacks.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
A novel secure protocol called FSSL using fuzzy controller for Web security.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

2013
A Model on Dynamic Threshold Multi-Secret Sharing Scheme using Pell's Equation with Jacobi Symbol.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

2011
A Novel Approach for Password Authentication Using Bidirectional Associative Memory
CoRR, 2011

Hilbert Matrix Based Cryptosystem using a Session Key
CoRR, 2011

A Cryptosystem Based on Hilbert Matrix using Cipher Block Chaining Mode
CoRR, 2011

A Probabilistic Approach for Authenticating Text or Graphical Passwords Using Back Propagation
CoRR, 2011

A Novel Approach for Pass Word Authentication using Brain -State -In -A Box (BSB) Model
CoRR, 2011

Handwritten Text Image Authentication using Back Propagation
CoRR, 2011

A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network
CoRR, 2011

Threshold Cryptosystem Using Pell's Equation.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Modified Protocols for Internet Key Exchange (IKE) Using Public Encryption and Signature Keys.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2009
Message Encryption Scheme Using Cheating Text.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
IP-Surveillance System for Unmanned Platforms of Offshore Oil and Gas Field Using WiMAX Technology.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

1994
Reasoning with Fuzzy Censors.
IEEE Trans. Syst. Man Cybern. Syst., 1994


  Loading...