Vadnala, Praveen Kumar and Mathuria, Anish. An efficient key assignment scheme for access control in a hierarchyin
Proceedings of Second International Conference on Information Systems Security (ICISS 2006),
Boyd, Colin; Choo, Kim-Kwang Raymond and Mathuria, Anish. An extension to Bellare and Rogaway (1993) Model: Resetting compromised long-term keysin
Proceedings of 11th Australasian Conference on Information Security and Privacy (ACISP 2006),
Mazumdar, Madhumita From improving icons to swadeshi heroes-scientists as moral exemplars in colonial Bengalin
Proceedings of the 19th European Conference on Modern South Asian Studies,
Reddy, Gangadhar S. and Vijay Kumar, C. Enhancing data efficiency in IEEE- 802.11a using frequency and time domain equalizationin
Proceedings of IEEE Region 10, TENCON 2005,
Multi-polarization planar array for satellite TV reception
Banerjee, Asim; Mitra, Suman K.; Roy, Anil K. and Pulipati, Suryanarayana Recognition of car license plate using morphologyin
Proceedings of Indian International Conference on Artificial Intelligence,
Banerjee, Asim; Mitra, Suman K.; Roy, Anil K. and Pulipati, Suryanarayana A morphology based method for car license plate detectionin
Proceedings of GSPx 2005: Pervasive Signal Processing,
Dual-band microstrip patch antenna
Shah, Dhaval; Patel, Dhawal and Chaudhary, Sanjay. Grid based vehicle locating systemin
5th International Workshop on Innovative Internet Community System (IICS 2005),
Mishra, Mayank and Chaudhary, Sanjay. Design and implementation of an architecture supporting mobile CORBA servants under intermittent con...
Proceedings of IEEE Wireless Communications and Networking Conference,