![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
A Bilinear Map** Based Ring Signature Scheme with Batch Verification for Applications in VANETs
Nowadays, the traditional transportation systems are being replaced by the Vehicular Ad-hoc Networks (VANETs) based intelligent transportation system. In VANETs, vehicles communicate by sending messages over t...
-
Chapter and Conference Paper
Text-to-Image Synthesis using BERT Embeddings and Multi-Stage GAN
A technique called text-to-image creation is used to create visuals that correspond to provided written descriptions. In this study, we have proposed a Multi-Stage GAN model using BERT Embeddings which consist...
-
Chapter and Conference Paper
Statistical Analysis of Feature Selection and Clustering for Building the Optimised Drug Toxicity Prediction Model
Artificial intelligence and machine learning are crucial in medication research and development. Because of the likelihood of toxicity, many pharmacological evaluations can be omitted. Toxicity prediction is c...
-
Chapter and Conference Paper
A Systematic Analysis of Fingerprint Matching Techniques for Fingerprint Recognition System
The recognition of fingerprints is the widely adaptable and recognizable biometric system for the identification of individuals. The fingerprint authentication system pertains the high-end security than the ot...
-
Chapter and Conference Paper
Cryptanalysis and Improvement of a User Authentication Scheme for SIP
Recently, Lu et al. discussed a user authentication scheme for session initiation protocol(SIP) using elliptic curve cryptography (ECC). In this paper, we cryptanalyze this scheme and find that it is not resis...