Privacy preserving data access scheme for IoT devices M Jahan, S Seneviratne, B Chu, A Seneviratne, S Jha 2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017 | 14 | 2017 |
A fuzzy logic-based trust estimation in edge-enabled vehicular ad hoc networks MM Hasan, M Jahan, S Kabir, C Wagner 2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-8, 2021 | 9 | 2021 |
Method for providing secure and private fine-grained access to outsourced data M Jahan, M Rezvani, A Seneviratne, S Jha 2015 IEEE 40th Conference on Local Computer Networks (LCN), 406-409, 2015 | 9 | 2015 |
Light weight write mechanism for cloud data M Jahan, M Rezvani, Q Zhao, PS Roy, K Sakurai, A Seneviratne, S Jha IEEE Transactions on Parallel and Distributed Systems 29 (5), 1131-1146, 2017 | 6 | 2017 |
A secure and lightweight user authentication mechanism for wireless body area network K Parvez, FT Zohra, M Jahan Proceedings of the 6th International Conference on Networking, Systems and …, 2019 | 5 | 2019 |
Secure and light weight fine-grained access mechanism for outsourced data M Jahan, PS Roy, K Sakurai, A Seneviratne, S Jha 2017 IEEE Trustcom/BigDataSE/ICESS, 201-209, 2017 | 5 | 2017 |
An end-to-end authentication mechanism for Wireless Body Area Networks M Jahan, FT Zohra, MK Parvez, U Kabir, AM Al Radi, S Kabir Smart Health 29, 100413, 2023 | 4 | 2023 |
An efficient handover mechanism for SDN-based 5G HetNets S Monira, U Kabir, M Jahan, U Paul DUJASE 6 (2), 49-58, 2021 | 4 | 2021 |
Towards blockchain-driven network log management system MH Rakib, S Hossain, M Jahan, U Kabir 2020 IEEE 8th International Conference on Smart City and Informatization …, 2020 | 4 | 2020 |
An Energy-Efficient Data Aggregation Tree Construction Algorithm for Wireless Sensor Networks MS Islam, IB Rahim, M Jahan Int. Journal of Comp Networks and Wireless Comm.(IJCNWC) 4 (5), 264-269, 2014 | 4 | 2014 |
Minimum energy broadcast in duty cycled wireless sensor networks M Jahan, L Narayanan 2013 IEEE Wireless Communications and Networking Conference (WCNC), 980-985, 2013 | 4 | 2013 |
An Efficient and Secure Handover Mechanism for SDN-Enabled 5G HetNet S Monira, U Kabir, M Jahan, U Paul 2021 IEEE International Black Sea Conference on Communications and …, 2021 | 3 | 2021 |
A Trust-Based Malicious RSU Detection Mechanism in Edge-Enabled Vehicular Ad Hoc Networks F Siddiqua, M Jahan arXiv preprint: 2208.05680, 2022 | 2 | 2022 |
A blockchain-enabled scalable network log management system MH Rakib, S Hossain, M Jahan, U Kabir | 2 | 2022 |
A Trust Model for Edge-Driven Vehicular Ad Hoc Networks Using Fuzzy Logic MM Hasan, M Jahan, S Kabir IEEE Transactions on Intelligent Transportation Systems, 2023 | 1 | 2023 |
A multi‐device user authentication mechanism for Internet of Things RD Eman, M Jahan, U Kabir IET Networks 12 (5), 229-249, 2023 | 1 | 2023 |
Precise Estimation of Local Probabilities for Bayesian Attack Graph Analysis AP Joy, M Jahan, U Kabir, SK Mahato 2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021 | 1 | 2021 |
Light weight and fine‐grained access mechanism for secure access to outsourced data M Jahan, S Seneviratne, PS Roy, K Sakurai, A Seneviratne, S Jha Concurrency and Computation: Practice and Experience 31 (23), e4736, 2019 | 1 | 2019 |
Securing smart home against sinkhole attack using weight‐based IDS placement strategy MS Islam, M Tasnim, U Kabir, M Jahan IET Wireless Sensor Systems 13 (6), 216-234, 2023 | | 2023 |
Secure Access to Outsourced Data from Resource-Constrained Devices M Jahan UNSW Sydney, 2018 | | 2018 |