Follow
Musfiq Rahman
Title
Cited by
Cited by
Year
Technique for preventing DoS attacks on RFID systems
D Tagra, M Rahman, S Sampalli
Software, Telecommunications and Computer Networks (SoftCOM), 2010 …, 2010
542010
A robust pair-wise and group key management protocol for wireless sensor network
M Rahman, S Sampalli, S Hussain
GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 1528-1532, 2010
272010
Multi-layered defense architecture against ransomware
M PATYAL, S SAMPALLI, Q YE, M RAHMAN
24*
An efficient pairwise and group key management protocol for wireless sensor network
M Rahman, S Sampalli
Wireless Personal Communications 84 (3), 2035-2053, 2015
232015
VAP code: A secure graphical password for smart devices
S Azad, M Rahman, MSAN Ranak, BMFK Ruhee, NN Nisa, N Kabir, ...
Computers & Electrical Engineering 59, 99-109, 2017
222017
A Hybrid Key Management Protocol for Wireless Sensor Networks
M Rahman, S Sampalli
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012
172012
Lightweight protocol for anonymity and mutual authentication in RFID systems
M Rahman, RV Sampangi, S Sampalli
Consumer Communications and Networking Conference (CCNC), 2015 12th Annual …, 2015
162015
Low-cost, high-resolution stemflow sensing
B Turner, DJ Hill, DE Carlyle-Moses, M Rahman
Journal of Hydrology 570, 62-68, 2019
112019
Structuring proactive secret sharing in mobile ad-hoc networks
H Asaeda, M Rahma, Y Toyama
Wireless Pervasive Computing, 2006 1st International Symposium on, 6 pp.-6, 2006
112006
Secure location validation with wi-fi geo-fencing and nfc
M Avdyushkin, M Rahman
Trustcom/BigDataSE/ISPA, 2015 IEEE 1, 890-896, 2015
102015
Implementation of group member authentication protocol in mobile ad-hoc networks
H Asaeda, M Rahman, MH Manshaei, Y Fukuzawa
Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE 4 …, 2006
82006
Network security evaluation scheme for wsn in cyber-physical systems
M Sharma, F Gebali, H Elmiligi, M Rahman
2018 IEEE 9th Annual Information Technology, Electronics and Mobile …, 2018
72018
Classification and analysis of security attacks in near field communication
M Rahman, H Elmiligi
International Journal of Business & Cyber Security (IJBCS) 1 (2), 2017
62017
A Hybrid Key Management Protocol forWireless Sensor Networks
M Rahman, S Sampalli
Computer Science, Dalhousie University, Halifax, Canada. 2012 IEEE 11th …, 2012
52012
Quality of Service Support in Wireless Ad Hoc Networks
M Rahman, A Rahman
Guide to Wireless Ad Hoc Networks, 281-310, 2009
52009
GPU-acceleration of blowfish cryptographic algorithm
K Earanky, H Elmiligi, M Rahman
Communications, Computers and Signal Processing (PACRIM), 2015 IEEE Pacific …, 2015
42015
A novel scalable key management protocol for wireless sensor networks
M Rahman
42013
A Flexible Learning Framework for Kids
G Petersen, S Lyall, M Rahman
Proceedings of the 21st Western Canadian Conference on Computing Education, 15, 2016
22016
Lightweight matrix-based authentication protocol for RFID
V Ramachandra, M Rahman, S Sampalli
Software, Telecommunications and Computer Networks (SoftCOM), 2011 19th …, 2011
22011
Test Suite for Vulnerability Analysis of RFID Systems
S Sampalli
International Conference of Wireless Networks ICWN 2010, 2010
22010
The system can't perform the operation now. Try again later.
Articles 1–20