displayNone
Banner

Publications

Journal Article

  • Das Manik Lal Comments on \"Improved efficient remote user authentication schemes\" International Journal of Network Security vol. 6, no. 3, pp. 282-284, May. 1, 2008.
  • Das Manik Lal, Joshi Dynamic program update in wireless sensor networks using orthogonality principles IEEE Communications Letters vol. 12, no. 6, pp. 471-473 Jun. 6, 2008.
  • Vidhani Kumar and Das Securing wireless sensor networks with public key techniques Ad-hoc and Sensor Wireless Networks vol. 5, no. 3-4, pp. 189-201, 2008.
  • sharma, Swati and Joshi A practical approach for simultaneous estimation of light source position, scene structure, and blin... EURASIP Journal on Advances in Signal Processing vol. 2008, pp. 1-12, 2008.
  • Kundu M. K., Mitra Suman K., Murthy C. A. A new probabilistic approach for fractal image compression Fundamenta Informaticae vol. 87, no. 3-4, pp. 417-433, Nov. 2008.
  • Dubey, M. K, Pramod and Vasantha, Rahul Agarwal Programmable Logic Devices for Motion Control—A Review IEEE Transactions on Industrial Electronics, vol. 54, no. 1 pp. 559-566 Feb. 2007.
  • Jonathan P, Kalpesh and Bowen, Kapoor Test conditions for fault classes in Boolean specifications ACM Transactions on Software Engineering and Methodology, vol. 16, no. 03 Article 10 Jul. 2007.
  • Chaudhary Sanjay, Purohit Performance analysis of information services in computational grids International Journal of Information Processing (IJIP) vol. 1, No. 2, Aug. 2007.
  • Ashutosh and Phatak, Das Manik Lal, Saxena Proxy signature scheme with effective revocation using bilinear pairings International Journal of Network Security vol. 4, no.03, pp.312-317, May. 2007.
  • Gangishetti Raju, Gorantla M. Choudary Threshold key issuing in identity-based cryptosystems Computer Standards & Interfaces vol. 29, no.02, pp. 260-264, Feb. 2007.
Back to Top