Follow
Rasib Khan, Ph.D.
Rasib Khan, Ph.D.
Associate Professor, School of Computing and Analytics, Northern Kentucky University
Verified email at nku.edu
Title
Cited by
Cited by
Year
OpenID authentication as a service in OpenStack
RH Khan, J Ylitalo, AS Ahmed
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
1052011
Aura: An iot based cloud infrastructure for localized mobile computation outsourcing
R Hasan, MM Hossain, R Khan
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015
772015
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading
R Hasan, M Hossain, R Khan
Future Generation Computer Systems 86, 821-835, 2018
582018
SEPIA: Secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices
R Khan, R Hasan, J Xu
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015
432015
OTIT: Towards secure provenance modeling for location proofs
R Khan, S Zawoad, MM Haque, R Hasan
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
332014
Secure networking for virtual machines in the cloud
M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma
2012 IEEE international conference on cluster computing workshops, 88-96, 2012
332012
WORAL: A witness oriented secure location provenance framework for mobile devices
R Hasan, R Khan, S Zawoad, MM Haque
IEEE Transactions on Emerging Topics in Computing 4 (1), 128-141, 2015
302015
‘who, when, and where?’location proof assertion for mobile devices
R Khan, S Zawoad, MM Haque, R Hasan
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014
242014
Modeling a secure supply chain integrity preservation system
R Khan, MM Haque, R Hasan
Technologies for Homeland Security (HST), 2013 IEEE International Conference …, 2013
21*2013
A cloud you can wear: Towards a mobile and wearable personal cloud
R Hasan, R Khan
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
182016
Fuzzy authentication using interaction provenance in service oriented computing
R Khan, R Hasan
2015 IEEE International Conference on Services Computing, 170-177, 2015
172015
Jugo: A generic architecture for composite cloud as a service
M Hossain, R Khan, S Al Noor, R Hasan
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 806-809, 2016
152016
Hot zone identification: Analyzing effects of data sampling on spam clustering
R Khan, M Mizan, R Hasan, A Sprague
152014
Secure cloud connectivity for scientific applications
L Osmani, S Toor, M Komu, MJ Kortelainen, T Lindén, J White, R Khan, ...
IEEE Transactions on Services Computing 11 (4), 658-670, 2015
102015
Interaction provenance model for unified authentication factors in service oriented computing
R Hasan, R Khan
Proceedings of the 4th ACM conference on Data and application security and …, 2014
102014
Fanconi anaemia-a rare case report
MA Aziz, MU Chowdhury, R Khan, MS Shah, S Islam
Bangladesh Med Res Counc Bull 42 (3), 147-149, 2017
82017
Midep: Multiparty identity establishment protocol for decentralized collaborative services
R Khan, R Hasan
2015 IEEE International Conference on Services Computing, 546-553, 2015
72015
Towards non-intrusive continuous healthcare monitoring with the Smart Hospital Gown
M Guru, R Hasan, R Khan
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017
62017
Accountable proof of ownership for data using timing element in cloud services
M Mizan, ML Rahman, R Khan, M Haque, R Hasan
High Performance Computing and Simulation (HPCS), 2013 International …, 2013
62013
A security adaptive protocol suite: Ranked Neighbor Discovery (RND) and Security Adaptive AODV (SA-AODV)
RH Khan, KM Imtiaz-ud-Din, AA Faruq, ARM Kamal, A Mottalib
2008 International Conference on Electrical and Computer Engineering, 588-593, 2008
62008
The system can't perform the operation now. Try again later.
Articles 1–20