default search action
Tony Thomas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]S. P. Ragendhu, Tony Thomas, Sabu Emmanuel:
Cancelable Biometric Template Generation Using Random Feature Vector Transformations. IEEE Access 12: 32064-32079 (2024) - [j19]Teenu S. John, Tony Thomas, Sabu Emmanuel:
Detection of Evasive Android Malware Using EigenGCN. J. Inf. Secur. Appl. 86: 103880 (2024) - 2023
- [j18]Arya Krishnan, Tony Thomas:
Finger Vein Recognition Based on Anatomical Features of Vein Patterns. IEEE Access 11: 39373-39384 (2023) - [j17]Gayathri R. Nayar, Tony Thomas:
Partial palm vein based biometric authentication. J. Inf. Secur. Appl. 72: 103390 (2023) - [j16]S. P. Ragendhu, Tony Thomas:
Cancelable biometric scheme based on dynamic salting of random patches. Multim. Tools Appl. 82(10): 14337-14366 (2023) - 2022
- [j15]Roopak Surendran, Tony Thomas:
Detection of malware applications from centrality measures of syscall graph. Concurr. Comput. Pract. Exp. 34(10) (2022) - 2021
- [j14]Gayathri R. Nayar, Tony Thomas, Sabu Emmanuel:
Graph based secure cancelable palm vein biometrics. J. Inf. Secur. Appl. 62: 102991 (2021) - [j13]Arya Krishnan, Tony Thomas, Deepak Mishra:
Finger Vein Pulsation-Based Biometric Recognition. IEEE Trans. Inf. Forensics Secur. 16: 5034-5044 (2021) - [j12]Roopak Surendran, Tony Thomas, Sabu Emmanuel:
On Existence of Common Malicious System Call Codes in Android Malware Families. IEEE Trans. Reliab. 70(1): 248-260 (2021) - 2020
- [j11]Roopak Surendran, Tony Thomas, Sabu Emmanuel:
GSDroid: Graph Signal Based Compact Feature Representation for Android Malware Detection. Expert Syst. Appl. 159: 113581 (2020) - [j10]Roopak Surendran, Tony Thomas, Sabu Emmanuel:
A TAN based hybrid model for android malware detection. J. Inf. Secur. Appl. 54: 102483 (2020) - [c10]Devyani Vij, Vivek Balachandran, Tony Thomas, Roopak Surendran:
GRAMAC: A Graph Based Android Malware Classification Mechanism. CODASPY 2020: 156-158 - [c9]Arya Krishnan, Gayathri R. Nayar, Tony Thomas, N. Ake Nystrom:
FEBA - An Anatomy Based Finger Vein Classification. IJCB 2020: 1-9 - [c8]Teenu S. John, Tony Thomas:
Evading Static and Dynamic Android Malware Detection Mechanisms. SSCC 2020: 33-48
2010 – 2019
- 2018
- [c7]Arya Krishnan, Tony Thomas, Gayathri R. Nayar, Sarath Sasilekha Mohan:
Liveness Detection in Finger Vein Imaging Device Using Plethysmographic Signals. IHCI 2018: 251-260 - 2017
- [j9]Peng Zhang, Tony Thomas, Tao Zhuo, Wei Huang, Hanqiao Huang:
Object coding based video authentication for privacy protection in immersive communication. J. Ambient Intell. Humaniz. Comput. 8(6): 871-884 (2017) - 2014
- [j8]Peng Zhang, Yanning Zhang, Tony Thomas, Sabu Emmanuel:
Moving people tracking with detection by latent semantic analysis for visual surveillance applications. Multim. Tools Appl. 68(3): 991-1021 (2014) - 2012
- [j7]Peng Zhang, Tony Thomas, Sabu Emmanuel:
Privacy enabled video surveillance using a two state Markov tracking algorithm. Multim. Syst. 18(2): 175-199 (2012) - [j6]Lei Lei Win, Tony Thomas, Sabu Emmanuel:
Secure interoperable digital content distribution mechanisms in a multi-domain architecture. Multim. Tools Appl. 60(1): 97-128 (2012) - [j5]Lei Lei Win, Tony Thomas, Sabu Emmanuel:
Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption. IEEE Trans. Multim. 14(3-1): 546-554 (2012) - [e1]Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, José M. Alcaraz Calero, Tony Thomas:
Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings. Communications in Computer and Information Science 335, Springer 2012, ISBN 978-3-642-34134-2 [contents] - 2011
- [c6]Lei Lei Win, Tony Thomas, Sabu Emmanuel:
A privacy preserving content distribution mechanism for drm without trusted third parties. ICME 2011: 1-6 - 2010
- [c5]Tony Thomas, Sabu Emmanuel, Peng Zhang, Mohan S. Kankanhalli:
An Authentication Mechanism Using Chinese Remainder Theorem for Efficient Surveillance Video Transmission. AVSS 2010: 567-573 - [c4]Peng Zhang, Tony Thomas, Sabu Emmanuel, Mohan S. Kankanhalli:
Privacy preserving video surveillance using pedestrian tracking mechanism. MiFor@MM 2010: 31-36
2000 – 2009
- 2009
- [j4]Tony Thomas:
Secure Two-party Protocols for Point Inclusion Problem. Int. J. Netw. Secur. 9(1): 1-7 (2009) - [j3]Tony Thomas, Sabu Emmanuel, A. Venkata Subramanyam, Mohan S. Kankanhalli:
Joint watermarking scheme for multiparty multilevel DRM architecture. IEEE Trans. Inf. Forensics Secur. 4(4): 758-767 (2009) - [c3]Tony Thomas, Sabu Emmanuel, Amitabha Das, Mohan S. Kankanhalli:
A CRT based watermark for multiparty multilevel DRM architecture. ICME 2009: 1010-1013 - [c2]Tony Thomas, Sabu Emmanuel, Amitabha Das, Mohan S. Kankanhalli:
Secure multimedia content delivery with multiparty multilevel DRM architecture. NOSSDAV 2009: 85-90 - [c1]Lei Lei Win, Tony Thomas, Sabu Emmanuel, Mohan S. Kankanhalli:
Secure Domain Architecture for Interoperable Content Distribution. PCM 2009: 1313-1318 - 2008
- [j2]Tony Thomas, Arbind K. Lal:
A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting. Int. J. Netw. Secur. 6(3): 265-269 (2008) - 2007
- [j1]Ki Hyoung Ko, Jang-Won Lee, Tony Thomas:
Towards generating secure keys for braid cryptography. Des. Codes Cryptogr. 45(3): 317-333 (2007) - [i4]Tony Thomas:
Secure Two-party Protocols for Point Inclusion Problem. CoRR abs/0705.4185 (2007) - [i3]Ki Hyoung Ko, Jang-Won Lee, Tony Thomas:
Towards Generating Secure Keys for Braid Cryptography. IACR Cryptol. ePrint Arch. 2007: 149 (2007) - 2006
- [i2]Tony Thomas, Arbind K. Lal:
Undeniable Signature Schemes Using Braid Groups. CoRR abs/cs/0601049 (2006) - [i1]Tony Thomas, Arbind K. Lal:
Group Signature Schemes Using Braid Groups. CoRR abs/cs/0602063 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint