Boyd, Colin; Choo, Kim-Kwang Raymond and Mathuria, Anish. An extension to Bellare and Rogaway (1993) Model: Resetting compromised long-term keysin
Proceedings of 11th Australasian Conference on Information Security and Privacy (ACISP 2006),
Laliwala, Zakir; Khosla, Rahul; Majumdar, Pritha and Chaudhary, Sanjay. Semantic and rules based event-driven dynamic web services composition for automation of business pr...
IEEE Services Computing Workshop,(SCW 06),
Mazumdar, Madhumita From improving icons to swadeshi heroes-scientists as moral exemplars in colonial Bengalin
Proceedings of the 19th European Conference on Modern South Asian Studies,
Laliwala, Zakir; Sorathia, Vikaram and Chaudhary, Sanjay. Semantic and rule based event-driven services-oriented agricultural recommendation systemin
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems Workshops,
Patel, Hima M.; Bhavsar, Arnav. V. and Mitra, Suman K. Face recognition using modular principal component analysis and support vector machinein
Proceedings 3rd IET International Conference on Visual Information Engineering, (VIE2006),
Laliwala, Zakir; Sorathia, Vikram and Chaudhary, Sanjay Semantics based event-driven Publish/Subscribe service-oriented architecturein
First International Conference on Communication System Software and Middleware, 2006,
Jain, Shalabh; Mitra, Suman K. Banerjee, Asim and Roy, Anil K. A graphical approach for fingerprint verificationin
Proceedings 3rd IET International Conference on Visual Information Engineering (VIE2006),
Patel, Dhawal and Chaudhary, Sanjay. Non-uniform information dissemination for performance discovery in computational gridsin
Proceedings of the First International Conference on Communication Systems Software and Middleware,
Bhatt, Krutarth; Mitra, Suman K. and Roy, Ashim A hybrid approach to noise resilient digital image watermarkingin
Proceedings of WCVGIP 2006,
A New Linearity Enhancing Technique for 802.11 b/g Low Noise Amplifiers
10.1109/MWSCAS.2006.382147