Comments on \"Improved efficient remote user authentication schemes\"
International Journal of Network Security vol. 6, no. 3, pp. 282-284, May. 1, 2008.
Dynamic program update in wireless sensor networks using orthogonality principles
IEEE Communications Letters vol. 12, no. 6, pp. 471-473 Jun. 6, 2008.
A practical approach for simultaneous estimation of light source position, scene structure, and blin...
EURASIP Journal on Advances in Signal Processing vol. 2008, pp. 1-12, 2008.
A new probabilistic approach for fractal image compression
Fundamenta Informaticae vol. 87, no. 3-4, pp. 417-433, Nov. 2008.
Securing wireless sensor networks with public key techniques
Ad-hoc and Sensor Wireless Networks vol. 5, no. 3-4, pp. 189-201, 2008.
Programmable Logic Devices for Motion Control—A Review
IEEE Transactions on Industrial Electronics, vol. 54, no. 1 pp. 559-566 Feb. 2007.
Test conditions for fault classes in Boolean specifications
ACM Transactions on Software Engineering and Methodology, vol. 16, no. 03 Article 10 Jul. 2007.
Performance analysis of information services in computational grids
International Journal of Information Processing (IJIP) vol. 1, No. 2, Aug. 2007.
Proxy signature scheme with effective revocation using bilinear pairings
International Journal of Network Security vol. 4, no.03, pp.312-317, May. 2007.