Vidhani Kumar and Das Securing wireless sensor networks with public key techniques
Ad-hoc and Sensor Wireless Networks vol. 5, no. 3-4, pp. 189-201, 2008.
sharma, Swati and Joshi A practical approach for simultaneous estimation of light source position, scene structure, and blin...
EURASIP Journal on Advances in Signal Processing vol. 2008, pp. 1-12, 2008.
Kundu M. K., Mitra Suman K., Murthy C. A. A new probabilistic approach for fractal image compression
Fundamenta Informaticae vol. 87, no. 3-4, pp. 417-433, Nov. 2008.
Ritwik Kumar and Mitra, Suman K. Motion estimation based color transfer and its application to color video compression
Pattern Analysis and Application vol. 11, no. 2, pp. 131-139, Jun. 2008.
Chaudhary Sanjay, Purohit Performance analysis of information services in computational grids
International Journal of Information Processing (IJIP) vol. 1, No. 2, Aug. 2007.
Ashutosh and Phatak, Das Manik Lal, Saxena Proxy signature scheme with effective revocation using bilinear pairings
International Journal of Network Security vol. 4, no.03, pp.312-317, May. 2007.
Gangishetti Raju, Gorantla M. Choudary Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces vol. 29, no.02, pp. 260-264, Feb. 2007.
Ghodgaonkar Deepak K., Wui Wong Tin Microwave non-destructive testing technique for characterization of HPMC-PEG 3000 films
International Journal of Pharmaceutics vol. 343, no. 01-02, pp. 122-130, Oct. 1, 2007.
Anuar Nor Khaizan, Wui Wong Tin Characterization of hydroxypropylmethylcellulose films using microwave non-destructive testing techn...
Journal of Pharmaceutical and Biomedical Analysis vol. 43, no. 02, pp. 549-557, 2007.