A dynamic hybrid cryptosystem using chaos and diffie–hellman protocol: An image encryption application

R Flores-Carapia, VM Silva-García… - Applied Sciences, 2023 - mdpi.com
Images with sensitive content require encryption for storage and transmission. Symmetric
schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key …

QEdu: A Quantum-Safe Blockchain Framework to Secure and Verify Educational Credentials

ATM Shifat, MA Habib, S Hasan… - 2023 26th International …, 2023 - ieeexplore.ieee.org
Distributed Ledger Technologies (DLT), notably blockchain, have advanced significantly,
finding applications in various domains, including education, for enhanced transparency …

Enhancing E-Voting Security with Blockchain-Backed Decentralized Authorization

MN Razzaque, KMR Alam, MA Habib… - 2023 6th International …, 2023 - ieeexplore.ieee.org
Electronic (e-) voting enables the voters to cast their vote electronically, resolving the
challenges associated with paper ballots. E-voting system must uphold unbiasedness …

CredSec: A Blockchain-based Secure Credential Management System for University Adoption

MA Habib, MM Rahman, NH Neom - arXiv preprint arXiv:2406.05151, 2024 - arxiv.org
University education play a critical role in shaping intellectual and professional development
of the individuals and contribute significantly to the advancement of knowledge and society …

Data Trading System Using Blockchain with Oracle Network

MT Hasan, KMR Alam, MA Habib… - 2023 6th International …, 2023 - ieeexplore.ieee.org
Data is a crucial asset for Industry 4.0 serving to enhance operational processes,
understand customer requirements, assist market decision-making, etc. Data trading …

A Scalable Cross-Border Payment System based on Consortium Blockchain Ensuring Auditability

A Roy, MA Habib, S Hasan… - 2023 6th International …, 2023 - ieeexplore.ieee.org
Usually, a payment system contains multiple verification layers, settlement techniques, and
intermediary mediums leading to delayed transactions, especially in cross-border scenarios …

A technique to avoid Blockchain Denial of Service (BDoS) and Selfish Mining Attack

MA Habib, MMH Manik - 2023 Fifth International Conference on …, 2023 - ieeexplore.ieee.org
Blockchain denial of service (BDoS) and selfish mining are the two most crucial attacks on
blockchain technology. A classical DoS attack targets the computer network to limit, restrict …

Sociala: An incentivized decentralized social media for writers based on Blockchain using modified Delegated Proof of Stake

S Hasan, MA Habib, A Roy, ATM Shifat - Proceedings of the 10th …, 2023 - dl.acm.org
Over the past few years, there has been a profound evolution in decentralization
methodologies, owing largely to the emergence of novel decentralized technologies like …

Shaer: A Blockchain-Based Framework for Secure Medical Data Sharing and Monetization

MA Habib, MMH Manik - Available at SSRN 4565912 - papers.ssrn.com
In the rapidly evolving landscape of healthcare research, the demand for medical data has
become indispensably vital. Additionally, incentivizing owners for sharing their health data …

Security Analysis of Heart Disease Data Based Privacy Preservation Using Enhanced Elgamal and Resnet Classifie

C Liu, SCI Chen - Available at SSRN 4693562 - papers.ssrn.com
Abstract Charles, Surendran, and SureshKumar proposed" Heart disease data based
privacy preservation using enhanced ElGamal and ResNet classifier" in 2022. However …