Das Manik Lal Authentication techniques: An overview
presented at the National Workshop on Cryptology Pune, Sept., 2006.
Ghodgaonkar Deepak K., Lenin, R. B Adaptive singlevariate rational data fitting with applications in electromagneticsin
Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications, Jaipur, Oct., 2006, pp. 160-163.
Aris Mohd Aziz Bin, Ghodgaonkar Deepak K., Khadri Norasimah Comparison of nondestructive and noncontact dielectric measurement methods for liquids using free sp...
Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications, Jaipur, Oct., 2006, pp. 311-313.
Naresh jotwani Hierarchical online mining for associative rulesin
Proceedings of the Twelfth International Conference on Management of Data: COMAD2005b, Hyderabad, 2005.
Naresh jotwani, Maitra Anutosh, Modi Bhavesh Refinements to minimum interference routing for traffic engineeringin
Proceedings of IEEE Indicon 2005, Chennai.
Kapoor Hemangee K Controllable delay-insensitive processes and their reflection, interaction and factorisationin
Proceedings of the 5th International Conference on Application of Concurrency to System Design (ACSD) 2005, pp. 58-67.
Desai Bhumi, Gupta, Sanjeev Dual-band microstrip patch antenna
presented at IEEE International Symposium on Microwave Propagation and EMC Technologies for Wireless Communications, Vol. 1
AntennaBeijing, China, 8-12 Aug. 2005, pp. 180-184.
Maitra Anutosh, Mitra Suman K., Trivedi Jigish A hybrid approach to speaker recognition in multi-speaker environmentin
Proceedings of First International Conference on Pattern Recognition and Machine Intelligence, (PReMI'05), [LNCS, vol. 3776], Kolkata, Dec., 18-22, 2005, pp. 272-275.
Boyd, Anish Mathuria Secure key agreement protocols efficient in messages and roundsin
Proceedings of INDOCRYPT 2005-6th International Conference on Cryptology, Bangalore, 2005.