2008 |
12 | EE | Yawer Yousuf,
Vidyasagar Potdar:
A Survey of RFID Authentication Protocols.
AINA Workshops 2008: 1346-1350 |
11 | EE | Atif Sharif,
Vidyasagar Potdar:
A Critical Analysis of RFID Security Protocols.
AINA Workshops 2008: 1357-1362 |
10 | EE | Pedram Hayati,
Nastaran Jafari,
S. Mohammad Rezaei,
Saeed Sarenche,
Vidyasagar Potdar:
Modeling Input Validation in UML.
Australian Software Engineering Conference 2008: 663-672 |
9 | EE | Pedram Hayati,
Vidyasagar Potdar:
Evaluation of spam detection and prevention frameworks for email and image spam: a state of art.
iiWAS 2008: 520-527 |
2007 |
8 | EE | Song Han,
Vidyasagar Potdar,
Elizabeth Chang:
Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor.
ICCSA (3) 2007: 227-238 |
7 | EE | Kevin Chai,
Vidyasagar Potdar,
Elizabeth Chang:
A Survey of Revenue Models for Current Generation Social Software's Systems.
ICCSA (3) 2007: 724-738 |
2006 |
6 | EE | Vidyasagar Potdar,
Song Han,
Elizabeth Chang,
Chen Wu:
Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking.
CIS 2006: 576-586 |
5 | EE | Dengya Zhu,
Vidyasagar Potdar,
Elizabeth Chang:
Open Source Software Development (OSSD) Based On Software Engineering.
OSS 2006: 345-346 |
4 | EE | Song Han,
Geoff Skinner,
Vidyasagar Potdar,
Elizabeth Chang:
A framework of authentication and authorization for e-health services.
SWS 2006: 105-106 |
2005 |
3 | EE | Vidyasagar Potdar,
Chen Wu,
Elizabeth Chang:
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain.
CIS (2) 2005: 273-278 |
2 | EE | Vidyasagar Potdar,
Muhammad A. Khan,
Elizabeth Chang,
Mihaela Ulieru,
Paul R. Worthington:
e-Forensics steganography system for secret information retrieval.
Advanced Engineering Informatics 19(3): 235-241 (2005) |
2004 |
1 | | Vidyasagar Potdar,
Elizabeth Chang:
Open Source vs. Closed Source.
ICEIS (3) 2004: 609-613 |