Abstract is missing.
- A Lightweight Security Protocol for IoT Using Merkle Hash Tree and Chaotic CryptographyNashreen Nesa, Indrajit Banerjee. 3-16 [doi]
- A Quantitative Methodology for Business Process-Based Data Privacy Risk ComputationAsmita Manna, Anirban Sengupta, Chandan Mazumdar. 17-33 [doi]
- Architectural Design-Based Compliance Verification for IoT-Enabled Secure Advanced Metering Infrastructure in Smart GridManali Chakraborty, Shalini Chakraborty, Nabendu Chaki. 35-55 [doi]
- A Novel Approach to Human Recognition Based on Finger GeometryMaciej Szymkowski, Khalid Saeed 0001. 57-69 [doi]
- Biometric Fusion System Using Face and Voice Recognition - A Comparison Approach: Biometric Fusion System Using Face and Voice CharacteristicsAleksander Kusmierczyk, Martyna Slawinska, Kornel Zaba, Khalid Saeed 0001. 71-89 [doi]
- A Multi-class Image Classifier for Assisting in Tumor Detection of Brain Using Deep Convolutional Neural NetworkAbhishek Bal, Minakshi Banerjee, Punit Sharma, Rituparna Chaki. 93-111 [doi]
- Determining Perceptual Similarity Among Readers Based on Eyegaze DynamicsAniruddha Sinha, Sanjoy Kumar Saha, Anupam Basu. 113-124 [doi]
- 2D Qubit Placement of Quantum Circuits Using LONGPATHMrityunjay Ghosh, Nivedita Dey, Debdeep Mitra, Amlan Chakrabarti. 127-141 [doi]
- Debugging Errors in Microfluidic ExecutionsPushpita Roy, Ansuman Banerjee, Bhargab B. Bhattacharya. 143-158 [doi]
- Effect of Volumetric Split-Errors on Reactant-Concentration During Sample Preparation with Microfluidic BiochipsSudip Poddar, Robert Wille, Hafizur Rahaman, Bhargab B. Bhattacharya. 159-165 [doi]