Comments on \"Improved efficient remote user authentication schemes\"
International Journal of Network Security vol. 6, no. 3, pp. 282-284, May. 1, 2008.
Automorphisms of augmented cubes
International Journal of Computer Mathematics vol. 85, no. 11, pp. 1621- 1627, Nov. 2008.
Dynamic program update in wireless sensor networks using orthogonality principles
IEEE Communications Letters vol. 12, no. 6, pp. 471-473 Jun. 6, 2008.
Cluster-based design for two-hop cellular networks
International Journal of Communications and Network Systems (IJCNS) vol. 1, no. 4, pp. 370-385, Nov. 2008.
Securing wireless sensor networks with public key techniques
Ad-hoc and Sensor Wireless Networks vol. 5, no. 3-4, pp. 189-201, 2008.
Programmable Logic Devices for Motion Control—A Review
IEEE Transactions on Industrial Electronics, vol. 54, no. 1 pp. 559-566 Feb. 2007.
Test conditions for fault classes in Boolean specifications
ACM Transactions on Software Engineering and Methodology, vol. 16, no. 03 Article 10 Jul. 2007.
Performance analysis of information services in computational grids
International Journal of Information Processing (IJIP) vol. 1, No. 2, Aug. 2007.
Proxy signature scheme with effective revocation using bilinear pairings
International Journal of Network Security vol. 4, no.03, pp.312-317, May. 2007.
Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces vol. 29, no.02, pp. 260-264, Feb. 2007.