OpenID authentication as a service in OpenStack RH Khan, J Ylitalo, AS Ahmed 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 106 | 2011 |
Aura: An iot based cloud infrastructure for localized mobile computation outsourcing R Hasan, MM Hossain, R Khan 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015 | 77 | 2015 |
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading R Hasan, M Hossain, R Khan Future Generation Computer Systems 86, 821-835, 2018 | 60 | 2018 |
SEPIA: Secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices R Khan, R Hasan, J Xu 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015 | 46 | 2015 |
OTIT: Towards secure provenance modeling for location proofs R Khan, S Zawoad, MM Haque, R Hasan Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 33 | 2014 |
Secure networking for virtual machines in the cloud M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma 2012 IEEE international conference on cluster computing workshops, 88-96, 2012 | 33 | 2012 |
WORAL: A witness oriented secure location provenance framework for mobile devices R Hasan, R Khan, S Zawoad, MM Haque IEEE Transactions on Emerging Topics in Computing 4 (1), 128-141, 2015 | 31 | 2015 |
‘who, when, and where?’location proof assertion for mobile devices R Khan, S Zawoad, MM Haque, R Hasan Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014 | 24 | 2014 |
Modeling a secure supply chain integrity preservation system R Khan, MM Haque, R Hasan Technologies for Homeland Security (HST), 2013 IEEE International Conference …, 2013 | 21* | 2013 |
A cloud you can wear: Towards a mobile and wearable personal cloud R Hasan, R Khan 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 18 | 2016 |
Fuzzy authentication using interaction provenance in service oriented computing R Khan, R Hasan 2015 IEEE International Conference on Services Computing, 170-177, 2015 | 17 | 2015 |
Jugo: A generic architecture for composite cloud as a service M Hossain, R Khan, S Al Noor, R Hasan 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 806-809, 2016 | 15 | 2016 |
Hot zone identification: Analyzing effects of data sampling on spam clustering R Khan, M Mizan, R Hasan, A Sprague | 15 | 2014 |
Secure cloud connectivity for scientific applications L Osmani, S Toor, M Komu, MJ Kortelainen, T Lindén, J White, R Khan, ... IEEE Transactions on Services Computing 11 (4), 658-670, 2015 | 12 | 2015 |
Interaction provenance model for unified authentication factors in service oriented computing R Hasan, R Khan Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 10 | 2014 |
Towards non-intrusive continuous healthcare monitoring with the Smart Hospital Gown M Guru, R Hasan, R Khan 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017 | 7 | 2017 |
Midep: Multiparty identity establishment protocol for decentralized collaborative services R Khan, R Hasan 2015 IEEE International Conference on Services Computing, 546-553, 2015 | 7 | 2015 |
Accountable proof of ownership for data using timing element in cloud services M Mizan, ML Rahman, R Khan, M Haque, R Hasan High Performance Computing and Simulation (HPCS), 2013 International …, 2013 | 6 | 2013 |
A security adaptive protocol suite: Ranked Neighbor Discovery (RND) and Security Adaptive AODV (SA-AODV) RH Khan, KM Imtiaz-ud-Din, AA Faruq, ARM Kamal, A Mottalib 2008 International Conference on Electrical and Computer Engineering, 588-593, 2008 | 6 | 2008 |
Unified authentication factors and fuzzy service access using interaction provenance R Hasan, R Khan Computers & Security 67, 211-231, 2017 | 5 | 2017 |