Automorphisms of augmented cubes
International Journal of Computer Mathematics vol. 85, no. 11, pp. 1621- 1627, Nov. 2008.
Cluster-based design for two-hop cellular networks
International Journal of Communications and Network Systems (IJCNS) vol. 1, no. 4, pp. 370-385, Nov. 2008.
Comments on \"Improved efficient remote user authentication schemes\"
International Journal of Network Security vol. 6, no. 3, pp. 282-284, May. 1, 2008.
Dynamic program update in wireless sensor networks using orthogonality principles
IEEE Communications Letters vol. 12, no. 6, pp. 471-473 Jun. 6, 2008.
Securing wireless sensor networks with public key techniques
Ad-hoc and Sensor Wireless Networks vol. 5, no. 3-4, pp. 189-201, 2008.
Performance analysis of information services in computational grids
International Journal of Information Processing (IJIP) vol. 1, No. 2, Aug. 2007.
Proxy signature scheme with effective revocation using bilinear pairings
International Journal of Network Security vol. 4, no.03, pp.312-317, May. 2007.
Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces vol. 29, no.02, pp. 260-264, Feb. 2007.
Microwave non-destructive testing technique for characterization of HPMC-PEG 3000 films
International Journal of Pharmaceutics vol. 343, no. 01-02, pp. 122-130, Oct. 1, 2007.
Characterization of hydroxypropylmethylcellulose films using microwave non-destructive testing techn...
Journal of Pharmaceutical and Biomedical Analysis vol. 43, no. 02, pp. 549-557, 2007.