displayNone
Banner

Publications

Conference Papers

  • Jadhav Ashish, Thacker Grishma Enhancements to CA\'s revocation services in PKIin Proceedings of Technical Symposium at Governmenr Engineering College, Aurangabad, Jan., 2006.
  • Banerjee Asim, Gajjar Prakash, M V Joshi, Mitra Suman K. Decimation estimation and super-resolution using zoomed observationsin Proceedings 5th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 2006), [LNCS, vol. 4338], Madurai, Dec. 13-16, 2006, pp. 45-57.
  • Amit Gopal M. Purohit, Sanjeev Gupta A New Linearity Enhancing Technique for 802.11 b/g Low Noise Amplifiers 49th IEEE International Midwest Symposium on Circuits and Systems, 2006 San Juan, PR, USA, 06-09 Aug. 2006, pp.651-654 10.1109/MWSCAS.2006.382147
  • Banda Kishore, Naresh jotwani Efficient algorithm for hierarchical online mining of associative rulesin Proceedings of the Thirteenth International Conference on Management of Data, New Delhi, Dec. 2006.
  • Bombale U.L., Gupta Sanjeev Design of Ultra Wideband Microstrip Antenna 2006 IEEE Antennas and Propagation Society International Symposium Albuquerque, NM, USA, 09-14 Jul. 2006, pp.3705-3708 10.1109/APS.2006.1711426
  • Kapoor Hemangee K Formal modeling and verification of an asynchronous DLX pipelinein Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods, 2006, (SEFM 2006), pp. 118-127.
  • Lenin R.B., Patel Komal, Srivastava Sanjay MAC Layer aware Stable Link Routing (MACSLR) in Mobile Adhoc Networks International Symposium on Ad Hoc and Ubiquitous Computing Mangalore, India, IEEE, 20-23 Dec. 2006, pp. 19-26 10.1109/ISAHUC.2006.4290642
  • Anish Mathuria, Vadnala Praveen Kumar An efficient key assignment scheme for access control in a hierarchyin Proceedings of Second International Conference on Information Systems Security (ICISS 2006), [LNCS, vol. 4332], Dec. 17-21, 2006, pp. 205-219.
  • Abbasi Teher, Bhatt Amit, Ramunajan Novel architecture of EBC for JPEG2000in Proceedings of the 19th International Conference on VLSI Design, 2006, held jointly with 5th International Conference on Embedded Systems and Design, Hyderabad, Jan. 2006.
  • Boyd, Choo Kim-Kwang Raymond, Colin and Mathuria, Anish Mathuria An extension to Bellare and Rogaway (1993) Model: Resetting compromised long-term keysin Proceedings of 11th Australasian Conference on Information Security and Privacy (ACISP 2006), [LNCS, vol. 4058], Melbourne, Australia, Jul. 3-5, 2006, pp. 371-382.
Back to Top