Das Manik Lal Comments on \"Improved efficient remote user authentication schemes\"
International Journal of Network Security vol. 6, no. 3, pp. 282-284, May. 1, 2008.
Das Manik Lal, Joshi Dynamic program update in wireless sensor networks using orthogonality principles
IEEE Communications Letters vol. 12, no. 6, pp. 471-473 Jun. 6, 2008.
Vidhani Kumar and Das Securing wireless sensor networks with public key techniques
Ad-hoc and Sensor Wireless Networks vol. 5, no. 3-4, pp. 189-201, 2008.
sharma, Swati and Joshi A practical approach for simultaneous estimation of light source position, scene structure, and blin...
EURASIP Journal on Advances in Signal Processing vol. 2008, pp. 1-12, 2008.
Kundu M. K., Mitra Suman K., Murthy C. A. A new probabilistic approach for fractal image compression
Fundamenta Informaticae vol. 87, no. 3-4, pp. 417-433, Nov. 2008.
Dubey, M. K, Pramod and Vasantha, Rahul Agarwal Programmable Logic Devices for Motion Control—A Review
IEEE Transactions on Industrial Electronics, vol. 54, no. 1 pp. 559-566 Feb. 2007.
Jonathan P, Kalpesh and Bowen, Kapoor Test conditions for fault classes in Boolean specifications
ACM Transactions on Software Engineering and Methodology, vol. 16, no. 03 Article 10 Jul. 2007.
Chaudhary Sanjay, Purohit Performance analysis of information services in computational grids
International Journal of Information Processing (IJIP) vol. 1, No. 2, Aug. 2007.
Ashutosh and Phatak, Das Manik Lal, Saxena Proxy signature scheme with effective revocation using bilinear pairings
International Journal of Network Security vol. 4, no.03, pp.312-317, May. 2007.
Gangishetti Raju, Gorantla M. Choudary Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces vol. 29, no.02, pp. 260-264, Feb. 2007.