|
Search the dblp DataBase
Chandan Mazumdar:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shyamal Mazumdar, Chandan Mazumdar
Authoring Software for Higher Educational Environment. [Citation Graph (0, 0)][DBLP] Applied Informatics, 1994, pp:171-173 [Conf]
- Debajyoti Konar, Chandan Mazumdar
An Improved E-Commerce Protocol for Fair Exchange. [Citation Graph (0, 0)][DBLP] ICDCIT, 2006, pp:305-313 [Conf]
- Anirban Sengupta, Aniruddha Mukhopadhyay, Koel Ray, Aveek Guha Roy, Dipankar Aich, Mridul Sankar Barik, Chandan Mazumdar
A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security . [Citation Graph (0, 0)][DBLP] ICISS, 2005, pp:328-331 [Conf]
- Surajit Dutta, Sudip Dutta, Riddhi Burman, Mridul Sankar Barik, Chandan Mazumdar
Design and Implementation of a Soft Real Time Fault Tolerant System. [Citation Graph (0, 0)][DBLP] IWDC, 2002, pp:319-328 [Conf]
- Gaurav Gupta, Sanjoy Kumar Saha, Shayok Chakraborty, Chandan Mazumdar
Document Frauds: Identification and Linking Fake Document to Scanners and Printers. [Citation Graph (0, 0)][DBLP] ICCTA, 2007, pp:497-501 [Conf]
- Gaurav Gupta, Chandan Mazumdar, M. S. Rao, R. B. Bhosale
Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents. [Citation Graph (0, 0)][DBLP] Digital Investigation, 2006, v:3, n:1, pp:43-55 [Journal]
- Sukumar Ghosh, Somprakash Bandyopadhyay, Chandan Mazumdar
Study of a Simulated Stream Machine for Dataflow Computation. [Citation Graph (0, 0)][DBLP] Perform. Eval., 1986, v:6, n:4, pp:269-291 [Journal]
Handling of recursion in dataflow model. [Citation Graph (, )][DBLP]
A formal methodology for detection of vulnerabilities in an enterprise information system. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|