Technique for preventing DoS attacks on RFID systems D Tagra, M Rahman, S Sampalli Software, Telecommunications and Computer Networks (SoftCOM), 2010 …, 2010 | 54 | 2010 |
A robust pair-wise and group key management protocol for wireless sensor network M Rahman, S Sampalli, S Hussain GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 1528-1532, 2010 | 27 | 2010 |
Multi-layered defense architecture against ransomware M PATYAL, S SAMPALLI, Q YE, M RAHMAN | 24* | |
An efficient pairwise and group key management protocol for wireless sensor network M Rahman, S Sampalli Wireless Personal Communications 84 (3), 2035-2053, 2015 | 23 | 2015 |
VAP code: A secure graphical password for smart devices S Azad, M Rahman, MSAN Ranak, BMFK Ruhee, NN Nisa, N Kabir, ... Computers & Electrical Engineering 59, 99-109, 2017 | 22 | 2017 |
A Hybrid Key Management Protocol for Wireless Sensor Networks M Rahman, S Sampalli Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012 | 17 | 2012 |
Lightweight protocol for anonymity and mutual authentication in RFID systems M Rahman, RV Sampangi, S Sampalli Consumer Communications and Networking Conference (CCNC), 2015 12th Annual …, 2015 | 16 | 2015 |
Low-cost, high-resolution stemflow sensing B Turner, DJ Hill, DE Carlyle-Moses, M Rahman Journal of Hydrology 570, 62-68, 2019 | 11 | 2019 |
Structuring proactive secret sharing in mobile ad-hoc networks H Asaeda, M Rahma, Y Toyama Wireless Pervasive Computing, 2006 1st International Symposium on, 6 pp.-6, 2006 | 11 | 2006 |
Secure location validation with wi-fi geo-fencing and nfc M Avdyushkin, M Rahman Trustcom/BigDataSE/ISPA, 2015 IEEE 1, 890-896, 2015 | 10 | 2015 |
Implementation of group member authentication protocol in mobile ad-hoc networks H Asaeda, M Rahman, MH Manshaei, Y Fukuzawa Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE 4 …, 2006 | 8 | 2006 |
Network security evaluation scheme for wsn in cyber-physical systems M Sharma, F Gebali, H Elmiligi, M Rahman 2018 IEEE 9th Annual Information Technology, Electronics and Mobile …, 2018 | 7 | 2018 |
Classification and analysis of security attacks in near field communication M Rahman, H Elmiligi International Journal of Business & Cyber Security (IJBCS) 1 (2), 2017 | 6 | 2017 |
A Hybrid Key Management Protocol forWireless Sensor Networks M Rahman, S Sampalli Computer Science, Dalhousie University, Halifax, Canada. 2012 IEEE 11th …, 2012 | 5 | 2012 |
Quality of Service Support in Wireless Ad Hoc Networks M Rahman, A Rahman Guide to Wireless Ad Hoc Networks, 281-310, 2009 | 5 | 2009 |
GPU-acceleration of blowfish cryptographic algorithm K Earanky, H Elmiligi, M Rahman Communications, Computers and Signal Processing (PACRIM), 2015 IEEE Pacific …, 2015 | 4 | 2015 |
A novel scalable key management protocol for wireless sensor networks M Rahman | 4 | 2013 |
A Flexible Learning Framework for Kids G Petersen, S Lyall, M Rahman Proceedings of the 21st Western Canadian Conference on Computing Education, 15, 2016 | 2 | 2016 |
Lightweight matrix-based authentication protocol for RFID V Ramachandra, M Rahman, S Sampalli Software, Telecommunications and Computer Networks (SoftCOM), 2011 19th …, 2011 | 2 | 2011 |
Test Suite for Vulnerability Analysis of RFID Systems S Sampalli International Conference of Wireless Networks ICWN 2010, 2010 | 2 | 2010 |