displayNone
banner

Publications

Journal Article

  • Algorithms and approaches in proxy signatures - a survey International Journal of Network Security vol. 9, no.3, pp. 264-284, 2009.
  • Evaluation of a suite of metrics for component based software engineering\", Issues in Informing Science and Information Technology vol. 6, pp. 731-740, Apr. 2009.
  • Two-factor user authentication in wireless sensor networks IEEE Transactions on Wireless Communications vol. 08, no. 03, pp. 1086-1090, Mar. 2009.
  • An improved bilinear pairing based remote user authentication scheme Computer Standards and Interfaces vol. 31, no. 1, pp. 181-185, Jan. 2009.
  • Indigenous languages Seminar no. 601, pp. 49-53, Sep. 2009.
  • Approximation algorithms for constrained generalized tree alignment problem Discrete Applied Mathematics vol. 157, no. 07, pp. 1407-1422, Apr. 2009.
  • New learning based super-resolution : use of DWT and IGMRF prior IEEE Transactions on Image Processing vol. 18, no. 12, Dec. 2009.
  • Through lens and text: constructions of a \'Stone Age\' tribe in the Andaman islands History Workshop Journal vol. 67, no. 01, pp. 173-193, Spring. 2009.
  • Development of speech corpora for speaker recognition research and evaluation in Indian languages International Journal of Speech Technology (IJST) vol. 11, no. 1, pp. 17-32, May. 2009.
  • LP spectra vs. mel spectra for identification of professional mimics in Indian languages International Journal of Speech Technology (IJST) vol. 11, no. 1, pp. 1-16, May. 2009.
Back to Top