Folgen
Endadul Hoque
Endadul Hoque
Bestätigte E-Mail-Adresse bei syr.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments
M Hoque, F Rahman, SI Ahamed, JH Park
Wireless personal communications 55 (1), 65-79, 2010
712010
Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments
SI Ahamed, MM Haque, ME Hoque, F Rahman, N Talukder
Journal of Systems and Software 83 (2), 253-270, 2010
612010
ERAP: ECC based RFID authentication protocol
SI Ahamed, F Rahman, E Hoque
2008 12th IEEE International Workshop on Future Trends of Distributed …, 2008
612008
Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations
SY Chau, O Chowdhury, E Hoque, H Ge, A Kate, C Nita-Rotaru, N Li
2017 IEEE Symposium on Security and Privacy (SP), 503-520, 2017
472017
S3PR: Secure serverless search protocols for RFID
SI Ahamed, F Rahman, E Hoque, F Kawsar, T Nakajima
2008 International Conference on Information Security and Assurance (isa …, 2008
432008
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
S Jero, ME Hoque, DR Choffnes, A Mislove, C Nita-Rotaru
NDSS, 2018
352018
AnonPri: An efficient anonymous private authentication protocol
ME Hoque, F Rahman, SI Ahamed
2011 IEEE International Conference on Pervasive Computing and Communications …, 2011
262011
Turret: A platform for automated attack finding in unmodified distributed system implementations
H Lee, J Seibert, E Hoque, C Killian, C Nita-Rotaru
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
232014
Secure and efficient tag searching in RFID systems using serverless search protocol
SI Ahamed, F Rahman, E Hoque, F Kawsar, T Nakajima
International Journal of Security and Its Applications 2 (4), 57-66, 2008
232008
Anonpri: A secure anonymous private authentication protocol for RFID systems
F Rahman, ME Hoque, SI Ahamed
Information Sciences 379, 195-210, 2017
202017
Preserve your privacy with pco: A privacy sensitive architecture for context obfuscation for pervasive e-community based applications
F Rahman, ME Hoque, FA Kawsar, SI Ahamed
2010 IEEE Second International Conference on Social Computing, 41-48, 2010
202010
Expat: Expectation-based policy analysis and enforcement for appified smart-home platforms
M Yahyazadeh, P Podder, E Hoque, O Chowdhury
Proceedings of the 24th ACM symposium on access control models and …, 2019
182019
Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks.
A Rahman, ME Hoque, F Rahman, SK Kundu, P Gburzynski
J. Networks 4 (9), 895-904, 2009
182009
YA-SRAP: Yet another serverless RFID authentication protocol
SI Ahamed, MDE Hoque, F Rahman, F Kawsar, T Nakajima
2008 IET 4th International Conference on Intelligent Environments, 1-8, 2008
152008
Adversarial testing of wireless routing implementations
ME Hoque, H Lee, R Potharaju, CE Killian, C Nita-Rotaru
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
122013
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol
ME Hoque, F Rahman, SI Ahamed
Proceedings of the 2009 ACM symposium on Applied Computing, 1062-1066, 2009
122009
Analyzing operational behavior of stateful protocol implementations for detecting semantic bugs
E Hoque, O Chowdhury, SY Chau, C Nita-Rotaru, N Li
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
112017
Preserving privacy in wireless sensor networks using reliable data aggregation
F Rahman, E Hoque, SI Ahamed
ACM SIGAPP Applied Computing Review 11 (3), 52-62, 2011
102011
UCFC-Ubiquitous personal carbon footprint calculation platform
F Rahman, SI Ahamed, E Hoque, C O'Brien, H Zhang, L Liu
International Conference on Green Computing, 425-432, 2010
92010
Taming epidemic outbreaks in mobile adhoc networks
E Hoque, R Potharaju, C Nita-Rotaru, S Sarkar, SS Venkatesh
Ad Hoc Networks 24, 57-72, 2015
82015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20