Technique for preventing DoS attacks on RFID systems D Tagra, M Rahman, S Sampalli Software, Telecommunications and Computer Networks (SoftCOM), 2010 …, 2010 | 55 | 2010 |
Multi-layered defense architecture against ransomware M PATYAL, S SAMPALLI, Q YE, M RAHMAN | 31* | |
A robust pair-wise and group key management protocol for wireless sensor network M Rahman, S Sampalli, S Hussain GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 1528-1532, 2010 | 29 | 2010 |
An efficient pairwise and group key management protocol for wireless sensor network M Rahman, S Sampalli Wireless Personal Communications 84 (3), 2035-2053, 2015 | 27 | 2015 |
VAP code: A secure graphical password for smart devices S Azad, M Rahman, MSAN Ranak, BMFK Ruhee, NN Nisa, N Kabir, ... Computers & Electrical Engineering 59, 99-109, 2017 | 26 | 2017 |
Lightweight protocol for anonymity and mutual authentication in RFID systems M Rahman, RV Sampangi, S Sampalli Consumer Communications and Networking Conference (CCNC), 2015 12th Annual …, 2015 | 17 | 2015 |
A Hybrid Key Management Protocol for Wireless Sensor Networks M Rahman, S Sampalli Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012 | 17 | 2012 |
Low-cost, high-resolution stemflow sensing B Turner, DJ Hill, DE Carlyle-Moses, M Rahman Journal of Hydrology 570, 62-68, 2019 | 13 | 2019 |
Secure location validation with wi-fi geo-fencing and nfc M Avdyushkin, M Rahman Trustcom/BigDataSE/ISPA, 2015 IEEE 1, 890-896, 2015 | 11 | 2015 |
Structuring proactive secret sharing in mobile ad-hoc networks H Asaeda, M Rahma, Y Toyama Wireless Pervasive Computing, 2006 1st International Symposium on, 6 pp.-6, 2006 | 11 | 2006 |
Implementation of group member authentication protocol in mobile ad-hoc networks H Asaeda, M Rahman, MH Manshaei, Y Fukuzawa Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE 4 …, 2006 | 8 | 2006 |
Network security evaluation scheme for wsn in cyber-physical systems M Sharma, F Gebali, H Elmiligi, M Rahman 2018 IEEE 9th Annual Information Technology, Electronics and Mobile …, 2018 | 7 | 2018 |
Classification and analysis of security attacks in near field communication M Rahman, H Elmiligi International Journal of Business & Cyber Security (IJBCS) 1 (2), 2017 | 6 | 2017 |
GPU-acceleration of blowfish cryptographic algorithm K Earanky, H Elmiligi, M Rahman Communications, Computers and Signal Processing (PACRIM), 2015 IEEE Pacific …, 2015 | 6 | 2015 |
A Hybrid Key Management Protocol forWireless Sensor Networks M Rahman, S Sampalli Computer Science, Dalhousie University, Halifax, Canada. 2012 IEEE 11th …, 2012 | 5 | 2012 |
Quality of Service Support in Wireless Ad Hoc Networks M Rahman, A Rahman Guide to Wireless Ad Hoc Networks, 281-310, 2009 | 5 | 2009 |
A novel scalable key management protocol for wireless sensor networks M Rahman | 4 | 2013 |
Improving response time prediction for stack overflow questions D Wu, S Johnson, C Foster, E Li, H Elmiligi, M Rahman 2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019 | 3 | 2019 |
A Flexible Learning Framework for Kids G Petersen, S Lyall, M Rahman Proceedings of the 21st Western Canadian Conference on Computing Education, 15, 2016 | 3 | 2016 |
Impact of Software Usage on Fundamental Engineering Courses E Ahmed, M Rahman Proceedings of the 21st Western Canadian Conference on Computing Education, 23, 2016 | 2 | 2016 |