displayNone
Banner

Publications

Conference Papers

  • Das Manik Lal Authentication techniques: An overview presented at the National Workshop on Cryptology Pune, Sept., 2006.
  • Ghodgaonkar Deepak K., Lenin, R. B Adaptive singlevariate rational data fitting with applications in electromagneticsin Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications, Jaipur, Oct., 2006, pp. 160-163.
  • Aris Mohd Aziz Bin, Ghodgaonkar Deepak K., Khadri Norasimah Comparison of nondestructive and noncontact dielectric measurement methods for liquids using free sp... Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications, Jaipur, Oct., 2006, pp. 311-313.
  • Naresh jotwani Hierarchical online mining for associative rulesin Proceedings of the Twelfth International Conference on Management of Data: COMAD2005b, Hyderabad, 2005.
  • Naresh jotwani, Maitra Anutosh, Modi Bhavesh Refinements to minimum interference routing for traffic engineeringin Proceedings of IEEE Indicon 2005, Chennai.
  • Kapoor Hemangee K Controllable delay-insensitive processes and their reflection, interaction and factorisationin Proceedings of the 5th International Conference on Application of Concurrency to System Design (ACSD) 2005, pp. 58-67.
  • Desai Bhumi, Gupta, Sanjeev Dual-band microstrip patch antenna presented at IEEE International Symposium on Microwave Propagation and EMC Technologies for Wireless Communications, Vol. 1
    AntennaBeijing, China, 8-12 Aug. 2005, pp. 180-184.
  • Maitra Anutosh, Mitra Suman K., Trivedi Jigish A hybrid approach to speaker recognition in multi-speaker environmentin Proceedings of First International Conference on Pattern Recognition and Machine Intelligence, (PReMI'05), [LNCS, vol. 3776], Kolkata, Dec., 18-22, 2005, pp. 272-275.
  • Boyd, Anish Mathuria Secure key agreement protocols efficient in messages and roundsin Proceedings of INDOCRYPT 2005-6th International Conference on Cryptology, Bangalore, 2005.
  • Anish Mathuria On efficient key agreement protocols Cryptology ePrint archive [online]. Report 2005/064, pp.1-10. (2005, Mar 28)
Back to Top