displayNone
banner

Publications

Conference Papers

  • Das, Manik Lal Authentication techniques: An overview presented at the National Workshop on Cryptology
  • Ghodgaonkar, Deepak Kumar and Lenin, R. B. Adaptive singlevariate rational data fitting with applications in electromagneticsin Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications,
  • Aris, Mohd Aziz Bin; Ghodgaonkar, Deepak Kumar and Khadri, Norasimah Comparison of nondestructive and noncontact dielectric measurement methods for liquids using free sp... Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications,
  • Jotwani, Naresh Hierarchical online mining for associative rulesin Proceedings of the Twelfth International Conference on Management of Data: COMAD2005b,
  • Modi, Bhavesh; Jotwani, Naresh and Maitra, Anutosh Refinements to minimum interference routing for traffic engineeringin Proceedings of IEEE Indicon 2005,
  • Kapoor, Hemangee K Controllable delay-insensitive processes and their reflection, interaction and factorisationin Proceedings of the 5th International Conference on Application of Concurrency to System Design (ACSD)
  • Trivedi, Jigish; Maitra, Anutosh and Mitra, Suman K. A hybrid approach to speaker recognition in multi-speaker environmentin Proceedings of First International Conference on Pattern Recognition and Machine Intelligence, (PReMI'05),
  • Mathuria, Anish; Choo, K. and Boyd, C Secure key agreement protocols efficient in messages and roundsin Proceedings of INDOCRYPT 2005-6th International Conference on Cryptology,
  • Mathuria, Anish and Jain Vipul. On efficient key agreement protocols Cryptology ePrint archive
  • Bhandari, Kunal; Mitra, Suman K. and Jadhav, Ashish. A hybrid approach to digital image watermarking using SVD and spread spectrumin Proceedings of First International Conference on Pattern Recognition and Machine Intelligence, (PReMI'05),
Back to Top