Privacy design patterns and anti-patterns N Doty, M Gupta Trustbusters Workshop at the Symposium on Usable Privacy and Security, 2013 | 44 | 2013 |
WiFi and GSM landmarks and neighborhoods for location based services M Gupta, P Mohan, LR Sivalingam, S Kumar US Patent 8,073,467, 2011 | 43 | 2011 |
Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit M Gupta, NS Chaudhari Ad Hoc Networks 84, 56-67, 2019 | 28 | 2019 |
Automated task centered collaboration R Anil, M Gupta, JM Joy, KK Mehra, GR Srinivasa US Patent App. 12/143,891, 2009 | 23 | 2009 |
Sonic Grid: an auditory interface for the visually impaired to navigate GUI-based environments D Jagdish, R Sawhney, M Gupta, S Nangia Proceedings of the 13th international conference on Intelligent user …, 2008 | 22 | 2008 |
Privacy patterns M Colesky, JH Hoepman, C Boesch, F Kargl, H Kopp, P Mosby, ... University of California, 119-159, 2022 | 8 | 2022 |
Anonymous roaming authentication protocol for wireless network with backward unlinkability, exculpability and efficient revocation check M Gupta, NS Chaudhari Journal of Ambient Intelligence and Humanized Computing 10, 4491-4501, 2019 | 8 | 2019 |
Privacy Patterns N Doty, M Gupta, JH Hoepman, M Colesky, JC Caiza, JM Del Alamo, ... Retrieved October 10, 2016, 2011 | 5 | 2011 |
Experience management framework for managing innovation in post-harvest resource management M Gupta, R Singh 2006 IEEE international conference on management of innovation and …, 2006 | 4 | 2006 |
Privacy Patterns, 2012 N Doty, M Gupta | 3 | 2018 |
Seafarer Abandonment and Vessel’s Flag State Role Analysis M Gupta, S Shanthakumar Transactions on Maritime Science 11 (01), 260-269, 2022 | 2 | 2022 |
Right of indigenous communities to prior informed consent under Article 7 of the Nagoya Protocol and a comparative analysis of its implementation by India and Bhutan M Gupta international journal on minority and group rights 28 (1), 36-63, 2020 | 2 | 2020 |
Anonymous roaming authentication protocol for wireless network with backward unlinkability and natural revocation M Gupta, NS Chaudhari Annals of Telecommunications 74, 175-184, 2019 | 1 | 2019 |
Enhancing Security through A Three-Level Authentication System: A Comprehensive Approach J Sharma, M Gupta, P Tewari Available at SSRN 4931509, 2024 | | 2024 |
Examining Techniques to Enhance the Security and Privacy of IoT Devices and Networks against Cyber Threats I Qureshi, MA Habeeb, SGM Shadab, B Mohammad, M Irfan, ... Engineering Proceedings 62 (1), 23, 2024 | | 2024 |
Assessment of Role of Admiralty Courts in India in Protecting Abandoned Seafarers Onboard Vessels in Indian Ports M Gupta, S Shanthakumar Transactions on Maritime Science 11 (02), 12-12, 2022 | | 2022 |
Keyuan Zou: Global commons and the law of the sea, Brill Nijhoff, Leiden and Boston, 2018, XXIV+ 349 pp M Gupta Indian Journal of International Law 59 (1), 489-491, 2021 | | 2021 |
Informed Consent under Article 7 of the Nagoya Protocol and a Comparative Analysis of Its Implementation by India and Bhutan M Gupta INTERNATIONAL JOURNAL ON MINORITY AND GROUP RIGHTS 28, 36-63, 2020 | | 2020 |
A Comment on “Efficient Privacy-Preserving Authentication in Wireless Mobile Networks” M Gupta, NS Chaudhari IEEE Letters of the Computer Society 1 (1), 12-12, 2018 | | 2018 |
2018 Index IEEE Letters of the Computer Society Vol. V Atluri, G Bruer, GT Byrd, NS Chaudhari, S Das, ME Dean, A El-Mahdy, ... | | |