Seguir
Musfiq Rahman
Título
Citado por
Citado por
Año
Technique for preventing DoS attacks on RFID systems
D Tagra, M Rahman, S Sampalli
Software, Telecommunications and Computer Networks (SoftCOM), 2010 …, 2010
552010
A robust pair-wise and group key management protocol for wireless sensor network
M Rahman, S Sampalli, S Hussain
GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 1528-1532, 2010
302010
Multi-layered defense architecture against ransomware
M PATYAL, S SAMPALLI, Q YE, M RAHMAN
30*
An efficient pairwise and group key management protocol for wireless sensor network
M Rahman, S Sampalli
Wireless Personal Communications 84 (3), 2035-2053, 2015
272015
VAP code: A secure graphical password for smart devices
S Azad, M Rahman, MSAN Ranak, BMFK Ruhee, NN Nisa, N Kabir, ...
Computers & Electrical Engineering 59, 99-109, 2017
252017
Lightweight protocol for anonymity and mutual authentication in RFID systems
M Rahman, RV Sampangi, S Sampalli
Consumer Communications and Networking Conference (CCNC), 2015 12th Annual …, 2015
172015
A Hybrid Key Management Protocol for Wireless Sensor Networks
M Rahman, S Sampalli
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012
172012
Low-cost, high-resolution stemflow sensing
B Turner, DJ Hill, DE Carlyle-Moses, M Rahman
Journal of Hydrology 570, 62-68, 2019
132019
Secure location validation with wi-fi geo-fencing and nfc
M Avdyushkin, M Rahman
Trustcom/BigDataSE/ISPA, 2015 IEEE 1, 890-896, 2015
112015
Structuring proactive secret sharing in mobile ad-hoc networks
H Asaeda, M Rahma, Y Toyama
Wireless Pervasive Computing, 2006 1st International Symposium on, 6 pp.-6, 2006
112006
Implementation of group member authentication protocol in mobile ad-hoc networks
H Asaeda, M Rahman, MH Manshaei, Y Fukuzawa
Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE 4 …, 2006
92006
Network security evaluation scheme for wsn in cyber-physical systems
M Sharma, F Gebali, H Elmiligi, M Rahman
2018 IEEE 9th Annual Information Technology, Electronics and Mobile …, 2018
72018
Classification and analysis of security attacks in near field communication
M Rahman, H Elmiligi
International Journal of Business & Cyber Security (IJBCS) 1 (2), 2017
62017
GPU-acceleration of blowfish cryptographic algorithm
K Earanky, H Elmiligi, M Rahman
Communications, Computers and Signal Processing (PACRIM), 2015 IEEE Pacific …, 2015
62015
A Hybrid Key Management Protocol forWireless Sensor Networks
M Rahman, S Sampalli
Computer Science, Dalhousie University, Halifax, Canada. 2012 IEEE 11th …, 2012
52012
Quality of Service Support in Wireless Ad Hoc Networks
M Rahman, A Rahman
Guide to Wireless Ad Hoc Networks, 281-310, 2009
52009
A novel scalable key management protocol for wireless sensor networks
M Rahman
42013
Improving response time prediction for stack overflow questions
D Wu, S Johnson, C Foster, E Li, H Elmiligi, M Rahman
2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019
32019
A Flexible Learning Framework for Kids
G Petersen, S Lyall, M Rahman
Proceedings of the 21st Western Canadian Conference on Computing Education, 15, 2016
32016
Impact of Software Usage on Fundamental Engineering Courses
E Ahmed, M Rahman
Proceedings of the 21st Western Canadian Conference on Computing Education, 23, 2016
22016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20