- Cryptography and Data Security
- Cryptographic Implementations and Security
- Complexity and Algorithms in Graphs
- Coding theory and cryptography
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- User Authentication and Security Systems
- Kidney Stones and Urolithiasis Treatments
- Distributed systems and fault tolerance
- Chaos-based Image/Signal Encryption
- Urological Disorders and Treatments
- Advanced Authentication Protocols Security
- Pediatric Urology and Nephrology Studies
- Cooperative Communication and Network Coding
- Viral-associated cancers and disorders
- Renal Transplantation Outcomes and Treatments
- Renal and Vascular Pathologies
- Ureteral procedures and complications
- Bladder and Urothelial Cancer Treatments
- Biometric Identification and Security
- Spam and Phishing Detection
- Urinary and Genital Oncology Studies
- Security and Verification in Computing
- AI in cancer detection
- Prostate Cancer Diagnosis and Treatment
Amrita Institute of Medical Sciences and Research Centre
2023-2025
Icahn School of Medicine at Mount Sinai
2025
Muljibhai Patel Urological Hospital
2020-2024
Jawaharlal Nehru Medical College
2023-2024
Datta Meghe Institute of Medical Sciences
2024
Government Medical College
2021-2022
Government Medical College and Hospital
2022
Indian Institute of Technology Indore
2021-2022
Christie's
2021
Western Digital (United States)
2020-2021
Time and again, attribute-based encryption has been shown to be the natural cryptographic tool for building various types of conditional access systems with far-reaching applications, but deployment such very slow. A central issue is lack an scheme that can operate on sensitive data efficiently and, at same time, provides features are important in practice.
Recently, the Prostate Imaging Reporting and Data System - 3 lesions (PI-RADS 3) have been sub classified into "3a" with a volume of <0.5 mL "3b" exceeding 0.5 mL, whereas prostate-specific antigen density (PSAD) is an established adjunct tool for predicting clinically significant prostate cancer (csPCa). The objective this study was to evaluate association between PI-RADS PSAD in diagnosing csPCa assess sensitivity, specificity, negative predictive value (NPV), positive (PPV) when combined...
Despite level 1 evidence supporting neoadjuvant chemotherapy (NACT) followed by radical cystectomy (RC) for muscle-invasive bladder cancer (MIBC), its adoption is hindered concerns about toxicity and detrimental impact on post-RC complications. We retrospectively reviewed complications at a tertiary care hospital, particularly assessing of NACT. Data from the institutional database were retrieved patients aged ≥18 with MIBC (≥American Joint Committee Cancer Clinical Stage T2), treated RC...
ABSTRACT We report our experience with nephron-sparing surgery for a completely endophytic small renal mass in an allograft kidney. A 37-year-old female, 14 years post live-related transplant end-stage disease due to crescentic glomerulonephritis, presented 3.6 cm mass. She underwent open partial nephrectomy and was discharged on the 5 th postoperative day. Six months postsurgery, she showed excellent graft function no tumor recurrence. Nephron-sparing of kidney presents challenges regarding...
Motivated by privacy and usability requirements in various scenarios where existing cryptographic tools (like secure multi-party computation functional encryption) are not adequate, we introduce a new tool called Controlled Functional Encryption (C-FE). As encryption, C-FE allows user (client) to learn only certain functions of encrypted data, using keys obtained from an authority. However, allow (and require) the client send fresh key request authority every time it wants evaluate function...
Token-based authentication is commonly used to enable a single-sign-on experience on the web, in mobile applications and enterprise networks using wide range of open standards network protocols: clients sign an identity provider their username/password obtain cryptographic token generated with master secret key, store for future accesses various services applications. The server(s) are single point failures that if breached, attackers forge arbitrary tokens or mount offline dictionary...
Abstract In the last decade, public health problem is primary consciousness worldwide, and cancer especially central issue. Further, skin comes in top‐3 of world's most common cancer. We have proposed an efficient convolutional neural network (CNN) model that identifies problems accurately. Although dataset HAM10K used for classification problem, its samples each class are highly imbalanced therefore accountable lower training accuracy. The AlexNet customized data to address this problem....
Background: There is a need to reliably render urolithiasis patients completely stone free with minimal morbidity. We report on the initial safety and feasibility steerable ureteroscopic renal evacuation (SURE) in prospective study using basket extraction as comparison. Materials Methods: A pilot randomized controlled was conducted comparing SURE postlaser lithotripsy. performed CVAC™ Aspiration System, catheter (with introducer). The of steering CVAC throughout collecting system under...
Abstract Chondrosarcomas are the second-most common bone tumors and known to occur in pelvis. However, invasion into urinary bladder is rare. We report a rare case of primary chondrosarcoma invading prostate requiring wide excision with cystoprostatectomy reconstruction. On initial evaluation, 48-year-old male patient presented obstructive lower tract symptoms was suspected have mass. He underwent transurethral resection biopsy mass at an outside hospital which showed features...
Threshold cryptography provides a mechanism for protecting secret keys by sharing them among multiple parties, who then jointly perform cryptographic operations. An attacker corrupts up to threshold number of parties cannot recover the secrets or violate security. Prior works in this space have mostly focused on definitions and constructions public-key digital signatures, thus do not capture security concerns efficiency challenges symmetric-key based applications which commonly use long-term...
This paper presents Internet of Things in a wider context. Main enabling factor this concept is the integration various technologies. In paper, we describe key technologies involved implementation and major application domain where will play vital role. Later discuss about open issues which are to be addressed before worldwide acceptance these There lots address. Here address most relevant among them detail.