Musfiq Rahman
Title
Cited by
Cited by
Year
Technique for preventing DoS attacks on RFID systems
D Tagra, M Rahman, S Sampalli
Software, Telecommunications and Computer Networks (SoftCOM), 2010 …, 2010
462010
A robust pair-wise and group key management protocol for wireless sensor network
M Rahman, S Sampalli, S Hussain
GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 1528-1532, 2010
242010
A Hybrid Key Management Protocol for Wireless Sensor Networks
M Rahman, S Sampalli
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012
182012
An efficient pairwise and group key management protocol for wireless sensor network
M Rahman, S Sampalli
Wireless Personal Communications 84 (3), 2035-2053, 2015
162015
Lightweight protocol for anonymity and mutual authentication in RFID systems
M Rahman, RV Sampangi, S Sampalli
Consumer Communications and Networking Conference (CCNC), 2015 12th Annual …, 2015
112015
VAP code: A secure graphical password for smart devices
S Azad, M Rahman, MSAN Ranak, BMFK Ruhee, NN Nisa, N Kabir, ...
Computers & Electrical Engineering 59, 99-109, 2017
102017
Multi-layered defense architecture against ransomware
M PATYAL, S SAMPALLI, Q YE, M RAHMAN
9*
Structuring proactive secret sharing in mobile ad-hoc networks
H Asaeda, M Rahma, Y Toyama
Wireless Pervasive Computing, 2006 1st International Symposium on, 6 pp.-6, 2006
82006
Secure location validation with wi-fi geo-fencing and nfc
M Avdyushkin, M Rahman
Trustcom/BigDataSE/ISPA, 2015 IEEE 1, 890-896, 2015
62015
Quality of Service Support in Wireless Ad Hoc Networks
M Rahman, A Rahman
Guide to Wireless Ad Hoc Networks, 281-310, 2009
52009
Implementation of group member authentication protocol in mobile ad-hoc networks
H Asaeda, M Rahman, MH Manshaei, Y Fukuzawa
Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE 4 …, 2006
52006
A novel scalable key management protocol for wireless sensor networks
M Rahman
42013
Classification and analysis of security attacks in near field communication
M Rahman, H Elmiligi
International Journal of Business & Cyber Security (IJBCS) 1 (2), 2017
32017
GPU-acceleration of blowfish cryptographic algorithm
K Earanky, H Elmiligi, M Rahman
Communications, Computers and Signal Processing (PACRIM), 2015 IEEE Pacific …, 2015
32015
Lightweight matrix-based authentication protocol for RFID
V Ramachandra, M Rahman, S Sampalli
Software, Telecommunications and Computer Networks (SoftCOM), 2011 19th …, 2011
22011
Test Suite for Vulnerability Analysis of RFID Systems
S Sampalli
International Conference of Wireless Networks ICWN 2010, 2010
22010
CONTINUOUS ONLINE MEMORY DIAGNOSTIC
MN Rahman
University of Pittsburgh, 2017
2017
A Flexible Learning Framework for Kids
G Petersen, S Lyall, M Rahman
Proceedings of the 21st Western Canadian Conference on Computing Education, 15, 2016
2016
Impact of Software Usage on Fundamental Engineering Courses
E Ahmed, M Rahman
Proceedings of the 21st Western Canadian Conference on Computing Education, 23, 2016
2016
A mobile role-based access control system using identity-based encryption with zero knowledge proof
AP Khandavilli, M Rahman, S Sampalli
Computational Intelligence for Security and Defence Applications (CISDA …, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20