Skip to main content

and
  1. No Access

    Article

    A Bilinear Map** Based Ring Signature Scheme with Batch Verification for Applications in VANETs

    Nowadays, the traditional transportation systems are being replaced by the Vehicular Ad-hoc Networks (VANETs) based intelligent transportation system. In VANETs, vehicles communicate by sending messages over t...

    Lalit Negi, Devender Kumar in Wireless Personal Communications (2024)

  2. No Access

    Chapter and Conference Paper

    Text-to-Image Synthesis using BERT Embeddings and Multi-Stage GAN

    A technique called text-to-image creation is used to create visuals that correspond to provided written descriptions. In this study, we have proposed a Multi-Stage GAN model using BERT Embeddings which consist...

    Poonam Rani, Devender Kumar, Nupur Sudhakar in International Conference on Innovative Com… (2023)

  3. No Access

    Chapter and Conference Paper

    Statistical Analysis of Feature Selection and Clustering for Building the Optimised Drug Toxicity Prediction Model

    Artificial intelligence and machine learning are crucial in medication research and development. Because of the likelihood of toxicity, many pharmacological evaluations can be omitted. Toxicity prediction is c...

    Kamal, Devender Kumar, Anuj Kumar Sharma in Information and Communication Technology f… (2023)

  4. No Access

    Chapter and Conference Paper

    A Systematic Analysis of Fingerprint Matching Techniques for Fingerprint Recognition System

    The recognition of fingerprints is the widely adaptable and recognizable biometric system for the identification of individuals. The fingerprint authentication system pertains the high-end security than the ot...

    Mahesh Kumar, Devender Kumar in Innovations in Computer Science and Engineering (2022)

  5. No Access

    Chapter and Conference Paper

    Cryptanalysis and Improvement of a User Authentication Scheme for SIP

    Recently, Lu et al. discussed a user authentication scheme for session initiation protocol(SIP) using elliptic curve cryptography (ECC). In this paper, we cryptanalyze this scheme and find that it is not resis...

    Devender Kumar in International Conference on Wireless, Inte… (2018)