Author of the publication

An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion.

, , , , , and . Int. J. Imaging Systems and Technology, 27 (2): 118-132 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kumari, Saru
add a person with the name Kumari, Saru
 

Other publications of authors with the same name

An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks., , and . I. J. Network Security, 13 (3): 167-177 (2011)Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'., and . Int. J. Communication Systems, 27 (12): 3939-3955 (2014)An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement., , , and . Security and Communication Networks, 7 (11): 1921-1932 (2014)Further cryptanalysis of 'A remote authentication scheme using mobile device'., , and . CASoN, page 234-237. IEEE, (2012)Cryptanalysis of a robust smart card authentication scheme for multi-server architecture., , , , and . ISBAST, page 120-123. IEEE, (2014)A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion., , , , and . Computers & Electrical Engineering, (2018)An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion., , , , , and . Int. J. Imaging Systems and Technology, 27 (2): 118-132 (2017)Optimality criteria for fuzzy-valued fractional multi-objective optimization problem., , , and . Soft Comput., 23 (19): 9049-9067 (2019)An elliptic curve cryptography based lightweight authentication scheme for smart grid communication., , , , , and . Future Generation Comp. Syst., (2018)Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems., , , , and . J. Medical Systems, 38 (6): 24 (2014)