The SCEAS System
Navigation Menu

Search the dblp DataBase


Vidyasagar Potdar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Vidyasagar Potdar, Chen Wu, Elizabeth Chang
    Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:273-278 [Conf]
  2. Vidyasagar Potdar, Elizabeth Chang
    Open Source vs. Closed Source. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2004, pp:609-613 [Conf]
  3. Dengya Zhu, Vidyasagar Potdar, Elizabeth Chang
    Open Source Software Development (OSSD) Based On Software Engineering. [Citation Graph (0, 0)][DBLP]
    OSS, 2006, pp:345-346 [Conf]
  4. Vidyasagar Potdar, Muhammad A. Khan, Elizabeth Chang, Mihaela Ulieru, Paul R. Worthington
    e-Forensics steganography system for secret information retrieval. [Citation Graph (0, 0)][DBLP]
    Advanced Engineering Informatics, 2005, v:19, n:3, pp:235-241 [Journal]
  5. Vidyasagar Potdar, Song Han, Elizabeth Chang, Chen Wu
    Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:576-586 [Conf]
  6. Song Han, Vidyasagar Potdar, Elizabeth Chang
    Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:227-238 [Conf]
  7. Kevin Chai, Vidyasagar Potdar, Elizabeth Chang
    A Survey of Revenue Models for Current Generation Social Software's Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:724-738 [Conf]

  8. A Survey of RFID Authentication Protocols. [Citation Graph (, )][DBLP]

  9. A Critical Analysis of RFID Security Protocols. [Citation Graph (, )][DBLP]

  10. Wireless Sensor Networks: A Survey. [Citation Graph (, )][DBLP]

  11. Applications of Wireless Sensor Networks in Pharmaceutical Industry. [Citation Graph (, )][DBLP]

  12. Key Parameters in Identifying Cost of Spam 2.0. [Citation Graph (, )][DBLP]

  13. Prioritizing Information for Achieving QoS Control in WSN. [Citation Graph (, )][DBLP]

  14. Web Spambot Detection Based on Web Navigation Behaviour. [Citation Graph (, )][DBLP]

  15. Modeling Input Validation in UML. [Citation Graph (, )][DBLP]

  16. Content Quality Assessment Related Frameworks for Social Media. [Citation Graph (, )][DBLP]

  17. Behaviour-Based Web Spambot Detection by Utilising Action Time and Action Frequency. [Citation Graph (, )][DBLP]

  18. Semi-automatic Information Extraction from Discussion Boards with Applications for Anti-Spam Technology. [Citation Graph (, )][DBLP]

  19. Factors Involved in Estimating Cost of Email Spam. [Citation Graph (, )][DBLP]

  20. Spam 2.0: The Problem Ahead. [Citation Graph (, )][DBLP]

  21. Evaluation of spam detection and prevention frameworks for email and image spam: a state of art. [Citation Graph (, )][DBLP]

  22. HoneySpam 2.0: Profiling Web Spambot Behaviour. [Citation Graph (, )][DBLP]

  23. Web of Things as a Framework for Ubiquitous Intelligence and Computing. [Citation Graph (, )][DBLP]

  24. Real-Time Public Group Collaboration using IP Multicast Label Filters. [Citation Graph (, )][DBLP]

  25. Performance evaluation of different transport layer protocols on the IEEE 802.11 and IEEE 802.15.4 MAC/PHY layers for WSN. [Citation Graph (, )][DBLP]

  26. A framework of authentication and authorization for e-health services. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002