Choudum S. A. and V. Sunitha Automorphisms of augmented cubes
International Journal of Computer Mathematics vol. 85, no. 11, pp. 1621- 1627, Nov. 2008.
Harald, Sinan and Haas, Sinanovic, Venkataraman Hrishikesh Cluster-based design for two-hop cellular networks
International Journal of Communications and Network Systems (IJCNS) vol. 1, no. 4, pp. 370-385, Nov. 2008.
Das Manik Lal Comments on \"Improved efficient remote user authentication schemes\"
International Journal of Network Security vol. 6, no. 3, pp. 282-284, May. 1, 2008.
Das Manik Lal, Joshi Dynamic program update in wireless sensor networks using orthogonality principles
IEEE Communications Letters vol. 12, no. 6, pp. 471-473 Jun. 6, 2008.
Vidhani Kumar and Das Securing wireless sensor networks with public key techniques
Ad-hoc and Sensor Wireless Networks vol. 5, no. 3-4, pp. 189-201, 2008.
Hemangee K., Josephs Mark B, Kapoor Controllable Delay-Insensitive Processes
Fundamenta Informaticae vol. 78, no. 01 ISSN: 1875-8681 2007 pp. 101-130
Chaudhary Sanjay, Purohit Performance analysis of information services in computational grids
International Journal of Information Processing (IJIP) vol. 1, No. 2, Aug. 2007.
Ashutosh and Phatak, Das Manik Lal, Saxena Proxy signature scheme with effective revocation using bilinear pairings
International Journal of Network Security vol. 4, no.03, pp.312-317, May. 2007.
Gangishetti Raju, Gorantla M. Choudary Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces vol. 29, no.02, pp. 260-264, Feb. 2007.
Ghodgaonkar Deepak K., Wui Wong Tin Microwave non-destructive testing technique for characterization of HPMC-PEG 3000 films
International Journal of Pharmaceutics vol. 343, no. 01-02, pp. 122-130, Oct. 1, 2007.