displayNone
Banner

Publications

Conference Papers

  • Jadhav Ashish, Thacker Grishma Enhancements to CA\'s revocation services in PKIin Proceedings of Technical Symposium at Governmenr Engineering College, Aurangabad, Jan., 2006.
  • Amit Gopal M. Purohit, Sanjeev Gupta A New Linearity Enhancing Technique for 802.11 b/g Low Noise Amplifiers 49th IEEE International Midwest Symposium on Circuits and Systems, 2006 San Juan, PR, USA, 06-09 Aug. 2006, pp.651-654 10.1109/MWSCAS.2006.382147
  • Banerjee Asim, Gajjar Prakash, M V Joshi, Mitra Suman K. Decimation estimation and super-resolution using zoomed observationsin Proceedings 5th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 2006), [LNCS, vol. 4338], Madurai, Dec. 13-16, 2006, pp. 45-57.
  • Banda Kishore, Naresh jotwani Efficient algorithm for hierarchical online mining of associative rulesin Proceedings of the Thirteenth International Conference on Management of Data, New Delhi, Dec. 2006.
  • Bombale U.L., Gupta Sanjeev Design of Ultra Wideband Microstrip Antenna 2006 IEEE Antennas and Propagation Society International Symposium Albuquerque, NM, USA, 09-14 Jul. 2006, pp.3705-3708 10.1109/APS.2006.1711426
  • Kapoor Hemangee K Formal modeling and verification of an asynchronous DLX pipelinein Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods, 2006, (SEFM 2006), pp. 118-127.
  • Lenin R.B., Patel Komal, Srivastava Sanjay MAC Layer aware Stable Link Routing (MACSLR) in Mobile Adhoc Networks International Symposium on Ad Hoc and Ubiquitous Computing Mangalore, India, IEEE, 20-23 Dec. 2006, pp. 19-26 10.1109/ISAHUC.2006.4290642
  • Anish Mathuria, Vadnala Praveen Kumar An efficient key assignment scheme for access control in a hierarchyin Proceedings of Second International Conference on Information Systems Security (ICISS 2006), [LNCS, vol. 4332], Dec. 17-21, 2006, pp. 205-219.
  • Boyd, Choo Kim-Kwang Raymond, Colin and Mathuria, Anish Mathuria An extension to Bellare and Rogaway (1993) Model: Resetting compromised long-term keysin Proceedings of 11th Australasian Conference on Information Security and Privacy (ACISP 2006), [LNCS, vol. 4058], Melbourne, Australia, Jul. 3-5, 2006, pp. 371-382.
  • Madhumita Mazumdar From improving icons to swadeshi heroes-scientists as moral exemplars in colonial Bengalin Proceedings of the 19th European Conference on Modern South Asian Studies, Netherlands, June, 2006.
Back to Top