Das, Manik Lal Authentication techniques: An overview
presented at the National Workshop on Cryptology
Ghodgaonkar, Deepak Kumar and Lenin, R. B. Adaptive singlevariate rational data fitting with applications in electromagneticsin
Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications,
Aris, Mohd Aziz Bin; Ghodgaonkar, Deepak Kumar and Khadri, Norasimah Comparison of nondestructive and noncontact dielectric measurement methods for liquids using free sp...
Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications,
Jotwani, Naresh Hierarchical online mining for associative rulesin
Proceedings of the Twelfth International Conference on Management of Data: COMAD2005b,
Modi, Bhavesh; Jotwani, Naresh and Maitra, Anutosh Refinements to minimum interference routing for traffic engineeringin
Proceedings of IEEE Indicon 2005,
Kapoor, Hemangee K Controllable delay-insensitive processes and their reflection, interaction and factorisationin
Proceedings of the 5th International Conference on Application of Concurrency to System Design (ACSD)
Trivedi, Jigish; Maitra, Anutosh and Mitra, Suman K. A hybrid approach to speaker recognition in multi-speaker environmentin
Proceedings of First International Conference on Pattern Recognition and Machine Intelligence, (PReMI'05),
Mathuria, Anish; Choo, K. and Boyd, C Secure key agreement protocols efficient in messages and roundsin
Proceedings of INDOCRYPT 2005-6th International Conference on Cryptology,
Bhandari, Kunal; Mitra, Suman K. and Jadhav, Ashish. A hybrid approach to digital image watermarking using SVD and spread spectrumin
Proceedings of First International Conference on Pattern Recognition and Machine Intelligence, (PReMI'05),