Tony Thomas

Orcid: 0000-0002-9323-6607

According to our database1, Tony Thomas authored at least 31 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cancelable Biometric Template Generation Using Random Feature Vector Transformations.
IEEE Access, 2024

2023
Cancelable biometric scheme based on dynamic salting of random patches.
Multim. Tools Appl., April, 2023

Partial palm vein based biometric authentication.
J. Inf. Secur. Appl., 2023

Finger Vein Recognition Based on Anatomical Features of Vein Patterns.
IEEE Access, 2023

2022
Detection of malware applications from centrality measures of syscall graph.
Concurr. Comput. Pract. Exp., 2022

2021
On Existence of Common Malicious System Call Codes in Android Malware Families.
IEEE Trans. Reliab., 2021

Finger Vein Pulsation-Based Biometric Recognition.
IEEE Trans. Inf. Forensics Secur., 2021

Graph based secure cancelable palm vein biometrics.
J. Inf. Secur. Appl., 2021

2020
A TAN based hybrid model for android malware detection.
J. Inf. Secur. Appl., 2020

GSDroid: Graph Signal Based Compact Feature Representation for Android Malware Detection.
Expert Syst. Appl., 2020

Evading Static and Dynamic Android Malware Detection Mechanisms.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

FEBA - An Anatomy Based Finger Vein Classification.
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020

GRAMAC: A Graph Based Android Malware Classification Mechanism.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2018
Liveness Detection in Finger Vein Imaging Device Using Plethysmographic Signals.
Proceedings of the Intelligent Human Computer Interaction - 10th International Conference, 2018

2017
Object coding based video authentication for privacy protection in immersive communication.
J. Ambient Intell. Humaniz. Comput., 2017

2014
Moving people tracking with detection by latent semantic analysis for visual surveillance applications.
Multim. Tools Appl., 2014

2012
Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption.
IEEE Trans. Multim., 2012

Secure interoperable digital content distribution mechanisms in a multi-domain architecture.
Multim. Tools Appl., 2012

Privacy enabled video surveillance using a two state Markov tracking algorithm.
Multim. Syst., 2012

2011
A privacy preserving content distribution mechanism for drm without trusted third parties.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

2010
Privacy preserving video surveillance using pedestrian tracking mechanism.
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, 2010

An Authentication Mechanism Using Chinese Remainder Theorem for Efficient Surveillance Video Transmission.
Proceedings of the Seventh IEEE International Conference on Advanced Video and Signal Based Surveillance, 2010

2009
Joint watermarking scheme for multiparty multilevel DRM architecture.
IEEE Trans. Inf. Forensics Secur., 2009

Secure Two-party Protocols for Point Inclusion Problem.
Int. J. Netw. Secur., 2009

Secure Domain Architecture for Interoperable Content Distribution.
Proceedings of the Advances in Multimedia Information Processing, 2009

Secure multimedia content delivery with multiparty multilevel DRM architecture.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009

A CRT based watermark for multiparty multilevel DRM architecture.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

2008
A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting.
Int. J. Netw. Secur., 2008

2007
Towards generating secure keys for braid cryptography.
Des. Codes Cryptogr., 2007

2006
Group Signature Schemes Using Braid Groups
CoRR, 2006

Undeniable Signature Schemes Using Braid Groups
CoRR, 2006


  Loading...