displayNone
banner

Publications

Conference Papers

  • Vadnala, Praveen Kumar and Mathuria, Anish. An efficient key assignment scheme for access control in a hierarchyin Proceedings of Second International Conference on Information Systems Security (ICISS 2006),
  • Boyd, Colin; Choo, Kim-Kwang Raymond and Mathuria, Anish. An extension to Bellare and Rogaway (1993) Model: Resetting compromised long-term keysin Proceedings of 11th Australasian Conference on Information Security and Privacy (ACISP 2006),
  • Mazumdar, Madhumita From improving icons to swadeshi heroes-scientists as moral exemplars in colonial Bengalin Proceedings of the 19th European Conference on Modern South Asian Studies,
  • Reddy, Gangadhar S. and Vijay Kumar, C. Enhancing data efficiency in IEEE- 802.11a using frequency and time domain equalizationin Proceedings of IEEE Region 10, TENCON 2005,
  • Multi-polarization planar array for satellite TV reception
  • Banerjee, Asim; Mitra, Suman K.; Roy, Anil K. and Pulipati, Suryanarayana Recognition of car license plate using morphologyin Proceedings of Indian International Conference on Artificial Intelligence,
  • Banerjee, Asim; Mitra, Suman K.; Roy, Anil K. and Pulipati, Suryanarayana A morphology based method for car license plate detectionin Proceedings of GSPx 2005: Pervasive Signal Processing,
  • Dual-band microstrip patch antenna
  • Shah, Dhaval; Patel, Dhawal and Chaudhary, Sanjay. Grid based vehicle locating systemin 5th International Workshop on Innovative Internet Community System (IICS 2005),
  • Mishra, Mayank and Chaudhary, Sanjay. Design and implementation of an architecture supporting mobile CORBA servants under intermittent con... Proceedings of IEEE Wireless Communications and Networking Conference,
Back to Top