Follow
Musfiq Rahman
Title
Cited by
Cited by
Year
Technique for preventing DoS attacks on RFID systems
D Tagra, M Rahman, S Sampalli
Software, Telecommunications and Computer Networks (SoftCOM), 2010 …, 2010
552010
Multi-layered defense architecture against ransomware
M PATYAL, S SAMPALLI, Q YE, M RAHMAN
30*
A robust pair-wise and group key management protocol for wireless sensor network
M Rahman, S Sampalli, S Hussain
GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 1528-1532, 2010
292010
An efficient pairwise and group key management protocol for wireless sensor network
M Rahman, S Sampalli
Wireless Personal Communications 84 (3), 2035-2053, 2015
272015
VAP code: A secure graphical password for smart devices
S Azad, M Rahman, MSAN Ranak, BMFK Ruhee, NN Nisa, N Kabir, ...
Computers & Electrical Engineering 59, 99-109, 2017
252017
Lightweight protocol for anonymity and mutual authentication in RFID systems
M Rahman, RV Sampangi, S Sampalli
Consumer Communications and Networking Conference (CCNC), 2015 12th Annual …, 2015
172015
A Hybrid Key Management Protocol for Wireless Sensor Networks
M Rahman, S Sampalli
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012
172012
Low-cost, high-resolution stemflow sensing
B Turner, DJ Hill, DE Carlyle-Moses, M Rahman
Journal of Hydrology 570, 62-68, 2019
122019
Secure location validation with wi-fi geo-fencing and nfc
M Avdyushkin, M Rahman
Trustcom/BigDataSE/ISPA, 2015 IEEE 1, 890-896, 2015
112015
Structuring proactive secret sharing in mobile ad-hoc networks
H Asaeda, M Rahma, Y Toyama
Wireless Pervasive Computing, 2006 1st International Symposium on, 6 pp.-6, 2006
112006
Implementation of group member authentication protocol in mobile ad-hoc networks
H Asaeda, M Rahman, MH Manshaei, Y Fukuzawa
Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE 4 …, 2006
92006
Network security evaluation scheme for wsn in cyber-physical systems
M Sharma, F Gebali, H Elmiligi, M Rahman
2018 IEEE 9th Annual Information Technology, Electronics and Mobile …, 2018
72018
Classification and analysis of security attacks in near field communication
M Rahman, H Elmiligi
International Journal of Business & Cyber Security (IJBCS) 1 (2), 2017
62017
GPU-acceleration of blowfish cryptographic algorithm
K Earanky, H Elmiligi, M Rahman
Communications, Computers and Signal Processing (PACRIM), 2015 IEEE Pacific …, 2015
62015
A Hybrid Key Management Protocol forWireless Sensor Networks
M Rahman, S Sampalli
Computer Science, Dalhousie University, Halifax, Canada. 2012 IEEE 11th …, 2012
52012
Quality of Service Support in Wireless Ad Hoc Networks
M Rahman, A Rahman
Guide to Wireless Ad Hoc Networks, 281-310, 2009
52009
A novel scalable key management protocol for wireless sensor networks
M Rahman
42013
Improving response time prediction for stack overflow questions
D Wu, S Johnson, C Foster, E Li, H Elmiligi, M Rahman
2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019
32019
A Flexible Learning Framework for Kids
G Petersen, S Lyall, M Rahman
Proceedings of the 21st Western Canadian Conference on Computing Education, 15, 2016
32016
Impact of Software Usage on Fundamental Engineering Courses
E Ahmed, M Rahman
Proceedings of the 21st Western Canadian Conference on Computing Education, 23, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20