Comments on \"Improved efficient remote user authentication schemes\"
International Journal of Network Security vol. 6, no. 3, pp. 282-284, May. 1, 2008.
Dynamic program update in wireless sensor networks using orthogonality principles
IEEE Communications Letters vol. 12, no. 6, pp. 471-473 Jun. 6, 2008.
Securing wireless sensor networks with public key techniques
Ad-hoc and Sensor Wireless Networks vol. 5, no. 3-4, pp. 189-201, 2008.
A practical approach for simultaneous estimation of light source position, scene structure, and blin...
EURASIP Journal on Advances in Signal Processing vol. 2008, pp. 1-12, 2008.
A new probabilistic approach for fractal image compression
Fundamenta Informaticae vol. 87, no. 3-4, pp. 417-433, Nov. 2008.
Performance analysis of information services in computational grids
International Journal of Information Processing (IJIP) vol. 1, No. 2, Aug. 2007.
Programmable Logic Devices for Motion Control—A Review
IEEE Transactions on Industrial Electronics, vol. 54, no. 1 pp. 559-566 Feb. 2007.
Proxy signature scheme with effective revocation using bilinear pairings
International Journal of Network Security vol. 4, no.03, pp.312-317, May. 2007.
Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces vol. 29, no.02, pp. 260-264, Feb. 2007.
Test conditions for fault classes in Boolean specifications
ACM Transactions on Software Engineering and Methodology, vol. 16, no. 03 Article 10 Jul. 2007.