| 2007 |
10 | | Gaurav Gupta,
Sanjoy Kumar Saha,
Shayok Chakraborty,
Chandan Mazumdar:
Document Frauds: Identification and Linking Fake Document to Scanners and Printers.
ICCTA 2007: 497-501 |
| 2006 |
9 | | Debajyoti Konar,
Chandan Mazumdar:
An Improved E-Commerce Protocol for Fair Exchange.
ICDCIT 2006: 305-313 |
8 | | Gaurav Gupta,
Chandan Mazumdar,
M. S. Rao,
R. B. Bhosale:
Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents.
Digital Investigation 3(1): 43-55 (2006) |
| 2005 |
7 | | Sushil Jajodia,
Chandan Mazumdar:
Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
Springer 2005 |
6 | | Anirban Sengupta,
Aniruddha Mukhopadhyay,
Koel Ray,
Aveek Guha Roy,
Dipankar Aich,
Mridul Sankar Barik,
Chandan Mazumdar:
A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security .
ICISS 2005: 328-331 |
| 2004 |
5 | | Gaurav Gupta,
Chandan Mazumdar,
M. S. Rao:
Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol.
IJDE 2(4): (2004) |
| 2002 |
4 | | Surajit Dutta,
Sudip Dutta,
Riddhi Burman,
Mridul Sankar Barik,
Chandan Mazumdar:
Design and Implementation of a Soft Real Time Fault Tolerant System.
IWDC 2002: 319-328 |
| 1994 |
3 | | Shyamal Mazumdar,
Chandan Mazumdar:
Authoring Software for Higher Educational Environment.
Applied Informatics 1994: 171-173 |
| 1986 |
2 | | Sukumar Ghosh,
Somprakash Bandyopadhyay,
Chandan Mazumdar:
Study of a Simulated Stream Machine for Dataflow Computation.
Perform. Eval. 6(4): 269-291 (1986) |
| 1984 |
1 | | Sukumar Ghosh,
Somprakash Bandyopadhyay,
Chandan Mazumdar,
S. Bhattacharya:
Handling of recursion in dataflow model.
ACM Conference on Computer Science 1984: 189-196 |