displayNone
banner

Publications

Journal Article

  • Securing wireless sensor networks with public key techniques Ad-hoc and Sensor Wireless Networks vol. 5, no. 3-4, pp. 189-201, 2008.
  • A practical approach for simultaneous estimation of light source position, scene structure, and blin... EURASIP Journal on Advances in Signal Processing vol. 2008, pp. 1-12, 2008.
  • A new probabilistic approach for fractal image compression Fundamenta Informaticae vol. 87, no. 3-4, pp. 417-433, Nov. 2008.
  • Motion estimation based color transfer and its application to color video compression Pattern Analysis and Application vol. 11, no. 2, pp. 131-139, Jun. 2008.
  • Identifying perceptually similar languages using teager energy based cepstrum Engineering Letters vol. 16, no. 01, pp. 151-159, 2008.
  • Performance analysis of information services in computational grids International Journal of Information Processing (IJIP) vol. 1, No. 2, Aug. 2007.
  • Proxy signature scheme with effective revocation using bilinear pairings International Journal of Network Security vol. 4, no.03, pp.312-317, May. 2007.
  • Threshold key issuing in identity-based cryptosystems Computer Standards & Interfaces vol. 29, no.02, pp. 260-264, Feb. 2007.
  • Microwave non-destructive testing technique for characterization of HPMC-PEG 3000 films International Journal of Pharmaceutics vol. 343, no. 01-02, pp. 122-130, Oct. 1, 2007.
  • Characterization of hydroxypropylmethylcellulose films using microwave non-destructive testing techn... Journal of Pharmaceutical and Biomedical Analysis vol. 43, no. 02, pp. 549-557, 2007.
Back to Top