A Real-Time IoT-Enabled Biometric Attendance System (Englisch)
- Neue Suche nach: Tripathi, Ashish
- Weitere Informationen zu Tripathi, Ashish:
- https://orcid.org/http://orcid.org/0000-0002-7570-4067
- Neue Suche nach: Choudhary, Arjun
- Weitere Informationen zu Choudhary, Arjun:
- https://orcid.org/http://orcid.org/0000-0001-8594-936X
- Neue Suche nach: Srivastava, Arun Kumar
- Neue Suche nach: Kharbas, Vikash Kumar
- Neue Suche nach: Shukla, Varun
- Weitere Informationen zu Shukla, Varun:
- https://orcid.org/http://orcid.org/0000-0003-3921-1430
- Neue Suche nach: Chaturvedi, Atul
- Neue Suche nach: Hasan, Sartaj Ul
- Neue Suche nach: Roy, Bimal Kumar
- Neue Suche nach: Tsaban, Boaz
- Neue Suche nach: Tripathi, Ashish
- Weitere Informationen zu Tripathi, Ashish:
- https://orcid.org/http://orcid.org/0000-0002-7570-4067
- Neue Suche nach: Choudhary, Arjun
- Weitere Informationen zu Choudhary, Arjun:
- https://orcid.org/http://orcid.org/0000-0001-8594-936X
- Neue Suche nach: Srivastava, Arun Kumar
- Neue Suche nach: Kharbas, Vikash Kumar
- Neue Suche nach: Shukla, Varun
- Weitere Informationen zu Shukla, Varun:
- https://orcid.org/http://orcid.org/0000-0003-3921-1430
In:
Cryptology and Network Security with Machine Learning
: Proceedings of ICCNSML 2023
;
Kapitel: 42
;
619-630
;
2024
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:A Real-Time IoT-Enabled Biometric Attendance System
-
Weitere Titelangaben:Lect. Notes in Networks, Syst.
-
Beteiligte:Chaturvedi, Atul ( Herausgeber:in ) / Hasan, Sartaj Ul ( Herausgeber:in ) / Roy, Bimal Kumar ( Herausgeber:in ) / Tsaban, Boaz ( Herausgeber:in ) / Tripathi, Ashish ( Autor:in ) / Choudhary, Arjun ( Autor:in ) / Srivastava, Arun Kumar ( Autor:in ) / Kharbas, Vikash Kumar ( Autor:in ) / Shukla, Varun ( Autor:in )
-
Kongress:International Conference on Cryptology & Network Security with Machine Learning ; 2023 ; Kanpur, India
-
Erschienen in:Cryptology and Network Security with Machine Learning : Proceedings of ICCNSML 2023 ; Kapitel: 42 ; 619-630Lecture Notes in Networks and Systems ; 918 ; 619-630
-
Verlag:
- Neue Suche nach: Springer Nature Singapore
-
Erscheinungsort:Singapore
-
Erscheinungsdatum:23.04.2024
-
Format / Umfang:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Optimization of Network Mapping for Screening and Intrusion Sensing DevicesAtri, Haritima / Sharma, Amisha / Mehrotra, Tushar / Saxena, Sandeep et al. | 2024
- 2
-
Blockchain Technology in Health-Care Sector: A ReviewTiwari, Ashutosh / Kumar, Satyam / Mehrotra, Tushar / Saxena, Sandeep et al. | 2024
- 3
-
Video Steganography Techniques: A Comprehensive Review and Performance EvaluationKumar, Hemant / Mamoria, Pushpa / Kumari, Shivani / Misra, Manoj Kumar et al. | 2024
- 4
-
Real-Time Authenticated and Secure Monitoring and Control of Low-Cost Sustainable Hydroponic System in CloudShukla, Anju / Shukla, Varun / Kumar, Shishir / Kushwah, Virendra Singh / Malviya, Smarika et al. | 2024
- 5
-
Secure Design and Implementation of Smart Traffic Light Management SystemShukla, Anju / Shukla, Varun / Kumar, Shishir / Anand, Akshat et al. | 2024
- 6
-
Investigation of Sinkhole Attacks and Network Simulation on 6LoWPANSingh, Shreya / Gupta, Megha / Sharma, Deepak Kumar et al. | 2024
- 7
-
A Note on 5G Networks: Security Issues, Challenges and Connectivity ApproachesShukla, Varun / Kushwaha, Mrinal / Sharma, Risabh / Joshi, Hem Dutt et al. | 2024
- 8
-
Intrusion Detection in IoT Devices Using ML and DL Models with Fisher Score Feature SelectionRajput, Deeksha / Sharma, Deepak Kumar / Gupta, Megha et al. | 2024
- 9
-
Hybrid Encryption Technique for Securing Cloud DataJoshi, Mamta / Priya, Rashmi / Joshi, Mukesh et al. | 2024
- 10
-
A Comprehensive Review on Transforming Security and Privacy with NLPGarg, Rachit / Gupta, Anshul / Srivastava, Atul et al. | 2024
- 11
-
Multimodal Attention CNN for Human Emotion RecognitionTiwary, Gyanendra / Chauhan, Shivani / Goyal, Krishan Kumar et al. | 2024
- 12
-
Supervised Learning Approaches for Deceit Identification: Exploring EEG as a Non-invasive TechniqueSharma, Subhag / Gupta, Manoj Kumar et al. | 2024
- 13
-
A Novel Technique to Secure Telemedicine Using Blockchain and Visual CryptographyMittal, Poonam / Vashista, Hariom / Srivastava, Atul et al. | 2024
- 14
-
Blockchain-Based Cryptocurrency Payment System Model for Business-To-Consumer E-Commerce PlatformsPal, Prashnatita / Sahana, Bikash Chandra / Poray, Jayanta / Bhattacharya, Rituparna et al. | 2024
- 15
-
Sensor Node Design Optimization Methods for Enhanced Energy Efficiency in Wireless Sensor NetworksChoudhary, Arpita / Barwar, N.C et al. | 2024
- 16
-
On Assessment of Risk Factors for Cardiovascular Disease Complexities Utilizing q-Rung Picture Fuzzy Multi-criteria Decision-Making ApproachDhumras, Himanshu / Bajaj, Rakesh Kumar / Garg, Gaurav et al. | 2024
- 17
-
Correctness Proof of the Verification of ‘A Combined Public Key Scheme in the Case of Attribute-Based for Wireless Body Area Networks’Goel, Shivani / Gupta, M. K. / Kumari, Saru et al. | 2024
- 18
-
Congestion Management Techniques in WSNs: A Comparative StudyKumar, Ajai / Lobiyal, D. K. et al. | 2024
- 19
-
Enhancing Privacy in VANET Through Attribute-Based Encryption and Blockchain Integration: Uncovering the Benefits and ChallengesVerma, Vandani / Chinmay et al. | 2024
- 20
-
IoT-Based Face Mask and Temperature Detection Using ArduinoShukla, Varun / Gupta, Sakshi / Joshi, Hem Dutt et al. | 2024
- 21
-
A Secure RSA-Based Image Encryption MethodShukla, Varun / Tiwari, Sumiti Narayan / Al-Shareeda, Mahmood A. / Dixit, Shivani et al. | 2024
- 22
-
Enhancing FHE Over the Integers: Beyond Binary Numbers and Batch ProcessingUpadhyay, Rohitkumar R. / Padhye, Sahadeo et al. | 2024
- 23
-
A Study on Designated Verifier Signature Schemes and Their VariantsVerma, Vandani / Chugh, Nitya et al. | 2024
- 24
-
An Exploration of Machine Learning Approaches in the Field of CybersecurityKhare, Brajesh Kumar / Khan, Imran et al. | 2024
- 25
-
On Complex Picture Hesitant Fuzzy Set and Its Application in Classification ProblemPoonia, Mahima / Bajaj, Rakesh Kumar / Shukla, Varun et al. | 2024
- 26
-
Enabling Credential Immutability of Academic Documents Using BlockchainPandey, Rajiv / Singh, Guru Dev / Maurya, Pratibha et al. | 2024
- 27
-
Challenges, Attacks, and Countermeasures for Security in MANETs-IoTPriyam, Anuja / Yadav, Anita et al. | 2024
- 28
-
A Review of Blockchain in Internet of Medical ThingsMansouri, Houssem / Hireche, Rachida / Benrebbouh, Chahrazed / Pathan, Al-Sakib Khan et al. | 2024
- 29
-
Demonstration of MITM Attack in Synchrophasor Network Using MAC SpoofingTiwari, Amit / Verma, Shivam / Shukla, Varun et al. | 2024
- 31
-
Blockchain Application in Real Estate in IndiaBose, Malobika / Khalid, Sheeba / Yadav, Aradhana et al. | 2024
- 32
-
A Fast and Secure Image Cryptosystem Based on New Row_Column Index Manipulator and Split_Join AlgorithmPodder, Durgabati / Deb, Subhrajyoti et al. | 2024
- 33
-
Quantum-Safe Encryption Schemes Based on Hadamard CodeRai, Pradeep / Singh, Bhupendra / Gupta, Ashok Ji et al. | 2024
- 34
-
Comparative Analysis of ResNet and DenseNet for Differential Cryptanalysis of SPECK 32/64 Lightweight Block CipherSajwan, Ayan / Mishra, Girish et al. | 2024
- 35
-
Analyzing and Enhancing a User Authentication Scheme for Ad Hoc Wireless Sensor NetworksKumari, Saru / Tyagi, Pooja et al. | 2024
- 36
-
Analysis of Futuristic Currency: Facebook’s LibraSingh, Arun Kumar / Saxena, Sandeep / Shukla, Varun et al. | 2024
- 37
-
Detecting AI-Generated Deep Fakes Using ResNext CNN and LSTM-Based RNN: A Robust Approach for Real-Time Video Manipulation DetectionDhar, Akanksha / Agrawal, Ekansh et al. | 2024
- 38
-
Analysis of Security Aspect in Cloud Implementation: A Case Study of Google Cloud ProviderShrivastava, Somesh / Soni, Manish Kumar / Pratap, Ajay et al. | 2024
- 39
-
Towards Intelligent Attendance Monitoring for Scalable Organization with Hybrid Model Using Deep LearningSrivastava, Akhilesh Kumar / Mishra, Chandrahas / Mishra, Anurag / Srivastava, Atul et al. | 2024
- 40
-
NTPhish: A CNN-RNN Hybrid Deep Learning Model to Detect Phishing WebsitesKunndra, Chetanya / Choudhary, Arjun / Kaur, Jaspreet / Jogia, Aryan / Mathur, Prashant / Shukla, Varun et al. | 2024
- 41
-
Advancing Network Anomaly Detection: Comparative Analysis of Machine Learning ModelsPandey, Rashmikiran / Pandey, Mrinal / Nazarov, Alexey et al. | 2024
- 42
-
A Real-Time IoT-Enabled Biometric Attendance SystemTripathi, Ashish / Choudhary, Arjun / Srivastava, Arun Kumar / Kharbas, Vikash Kumar / Shukla, Varun et al. | 2024
- 43
-
Secure Text Transfer Using Diffie–Hellman Key Exchange Algorithm in Cloud EnvironmentPrakash, Vijay / Goyanka, Tanishka / Sharma, Shivi / Garg, Lalit / Shukla, Varun et al. | 2024
- 44
-
Web Application Authentication Using Google OAuth, Express, and MongoDBPrakash, Vijay / Dua, Kirtan / Garg, Lalit / Shukla, Varun et al. | 2024
- 45
-
Ethical Considerations and Legal Frameworks for Biometric Surveillance Systems: The Intersection of AI, Soft Biometrics, and Human SurveillancePunia, Meenakshi / Choudhary, Arjun / Agarwal, Sonu / Shukla, Varun et al. | 2024
- 46
-
Setting up an OpenVPN Server on the Google Cloud PlatformPrakash, Vijay / Jain, Chirag / Rathi, Raghav / Garg, Lalit / Shukla, Varun et al. | 2024
- 47
-
Secured Identity and Access Management for Cloud Computing Using Zero Trust ArchitectureYadav, Vinay / Soni, Manish Kumar / Pratap, Ajay et al. | 2024
- 48
-
Comments on “A Certificateless Aggregated Signcryption Scheme for Cloud-Fog Centric Industry 4.0”Verma, Girraj Kumar / Mishra, Dheerendra et al. | 2024
- 49
-
Leveraging Innovative Technologies for Ransomware Prevention in Healthcare: A Case Study of AIIMS and BeyondDubey, Ateen / Tiwari, Geetika / Dixit, Anshika / Mishra, Ananya / Pandey, Mohit et al. | 2024
- 50
-
Intuitionistic Fuzzy-Based Trust Computation for Secure Routing in IoTMishra, Renu / Saxena, Sandeep / Singh, Arun Kumar / Shukla, Varun et al. | 2024
- 51
-
LSTM-Based Cryptanalysis of Stream Cipher EspressoAkhilesh / Singh, Himanshu / Mishra, Girish et al. | 2024
- 52
-
Study of Energy-Efficient Virtual Machine Migration with Assurance of Service-Level AgreementsPanwar, Suraj Singh / Rauthan, M. M. S. / Barthwal, Varun / Gaur, Sachin / Mehra, Nidhi et al. | 2024
- 53
-
A Novel Security Model for Healthcare Prediction by Using DLDhoot, Anshita / Deva, Rahul / Shukla, Varun et al. | 2024
- 54
-
Residual Learning and Deep Learning Models for Image Denoising in Medical ApplicationsSrivastava, Atul / Rana, Harshita / Misra, Manoj Kumar / Singh, Youddha Beer et al. | 2024
- 55
-
Legal Status of Crypto-Assets in India Through the Constitutional LensYadav, Aradhana / Yadav, Pooja et al. | 2024
- 56
-
Deep Learning Models for Stock Market Forecasting: GARCH, ARIMA, CNN, LSTM, RNNSrivastava, Atul / Srivastava, Aditya / Singh, Youddha Beer / Misra, Manoj Kumar et al. | 2024
- 57
-
Investigating Optimization Methods in Computer Science Engineering: A Comprehensive StudyKumar, Yash / Dixit, Prashant / Srivastava, Atul / Sahoo, Ramesh et al. | 2024
- 58
-
Privacy and Security of Bio-inspired Computing of Diabetic Retinopathy Detection Using Machine LearningKumar, Manoj / Kumar, Atulya Kashish / Bhargava, Mimansa / Singh, Rudra Pratap / Shukla, Anju / Shukla, Varun et al. | 2024
- 59
-
Key Agreement Using Symmetric GroupBajpai, Prakersh / Misra, Manoj Kumar / Mishra, Prashant Kumar / Singh, Shailendra et al. | 2024