|
Search the dblp DataBase
Vidyasagar Potdar:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Vidyasagar Potdar, Chen Wu, Elizabeth Chang
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:273-278 [Conf]
- Vidyasagar Potdar, Elizabeth Chang
Open Source vs. Closed Source. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2004, pp:609-613 [Conf]
- Dengya Zhu, Vidyasagar Potdar, Elizabeth Chang
Open Source Software Development (OSSD) Based On Software Engineering. [Citation Graph (0, 0)][DBLP] OSS, 2006, pp:345-346 [Conf]
- Vidyasagar Potdar, Muhammad A. Khan, Elizabeth Chang, Mihaela Ulieru, Paul R. Worthington
e-Forensics steganography system for secret information retrieval. [Citation Graph (0, 0)][DBLP] Advanced Engineering Informatics, 2005, v:19, n:3, pp:235-241 [Journal]
- Vidyasagar Potdar, Song Han, Elizabeth Chang, Chen Wu
Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:576-586 [Conf]
- Song Han, Vidyasagar Potdar, Elizabeth Chang
Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2007, pp:227-238 [Conf]
- Kevin Chai, Vidyasagar Potdar, Elizabeth Chang
A Survey of Revenue Models for Current Generation Social Software's Systems. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2007, pp:724-738 [Conf]
A Survey of RFID Authentication Protocols. [Citation Graph (, )][DBLP]
A Critical Analysis of RFID Security Protocols. [Citation Graph (, )][DBLP]
Wireless Sensor Networks: A Survey. [Citation Graph (, )][DBLP]
Applications of Wireless Sensor Networks in Pharmaceutical Industry. [Citation Graph (, )][DBLP]
Key Parameters in Identifying Cost of Spam 2.0. [Citation Graph (, )][DBLP]
Prioritizing Information for Achieving QoS Control in WSN. [Citation Graph (, )][DBLP]
Web Spambot Detection Based on Web Navigation Behaviour. [Citation Graph (, )][DBLP]
Modeling Input Validation in UML. [Citation Graph (, )][DBLP]
Content Quality Assessment Related Frameworks for Social Media. [Citation Graph (, )][DBLP]
Behaviour-Based Web Spambot Detection by Utilising Action Time and Action Frequency. [Citation Graph (, )][DBLP]
Semi-automatic Information Extraction from Discussion Boards with Applications for Anti-Spam Technology. [Citation Graph (, )][DBLP]
Factors Involved in Estimating Cost of Email Spam. [Citation Graph (, )][DBLP]
Spam 2.0: The Problem Ahead. [Citation Graph (, )][DBLP]
Evaluation of spam detection and prevention frameworks for email and image spam: a state of art. [Citation Graph (, )][DBLP]
HoneySpam 2.0: Profiling Web Spambot Behaviour. [Citation Graph (, )][DBLP]
Web of Things as a Framework for Ubiquitous Intelligence and Computing. [Citation Graph (, )][DBLP]
Real-Time Public Group Collaboration using IP Multicast Label Filters. [Citation Graph (, )][DBLP]
Performance evaluation of different transport layer protocols on the IEEE 802.11 and IEEE 802.15.4 MAC/PHY layers for WSN. [Citation Graph (, )][DBLP]
A framework of authentication and authorization for e-health services. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|