displayNone
banner

Publications

Conference Papers

  • Thacker, Grishma and Jadhav, Ashish. Enhancements to CA\'s revocation services in PKIin Proceedings of Technical Symposium at Governmenr Engineering College,
  • Gajjar, Prakash P.; Joshi, M. V.; Banerjee, Asim and Mitra, Suman K. Decimation estimation and super-resolution using zoomed observationsin Proceedings 5th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 2006),
  • Banda, Kishore and Jotwani, Naresh. Efficient algorithm for hierarchical online mining of associative rulesin Proceedings of the Thirteenth International Conference on Management of Data,
  • Kapoor, Hemangee K Formal modeling and verification of an asynchronous DLX pipelinein Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods, 2006, (SEFM 2006),
  • Vadnala, Praveen Kumar and Mathuria, Anish. An efficient key assignment scheme for access control in a hierarchyin Proceedings of Second International Conference on Information Systems Security (ICISS 2006),
  • Boyd, Colin; Choo, Kim-Kwang Raymond and Mathuria, Anish. An extension to Bellare and Rogaway (1993) Model: Resetting compromised long-term keysin Proceedings of 11th Australasian Conference on Information Security and Privacy (ACISP 2006),
  • Mazumdar, Madhumita From improving icons to swadeshi heroes-scientists as moral exemplars in colonial Bengalin Proceedings of the 19th European Conference on Modern South Asian Studies,
  • Patel, Hima M.; Bhavsar, Arnav. V. and Mitra, Suman K. Face recognition using modular principal component analysis and support vector machinein Proceedings 3rd IET International Conference on Visual Information Engineering, (VIE2006),
  • Bhatt, Amit; Abbasi, Taher and Ramanujan Novel architecture of EBC for JPEG2000in Proceedings of the 19th International Conference on VLSI Design, 2006, held jointly with 5th International Conference on Embedded Systems and Design,
  • Jain, Shalabh; Mitra, Suman K. Banerjee, Asim and Roy, Anil K. A graphical approach for fingerprint verificationin Proceedings 3rd IET International Conference on Visual Information Engineering (VIE2006),
Back to Top