Hassan Jameel Asghar
Hassan Jameel Asghar
Macquarie University & Data61, CSIRO
Adresse e-mail validée de data61.csiro.au
Titre
Citée par
Citée par
Année
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008
3522008
A trust model for ubiquitous systems based on vectors of trust values
H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee
Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005
1092005
Trust management problem in distributed wireless sensor networks
RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song
12th IEEE International Conference on Embedded and Real-Time Computing …, 2006
862006
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
492010
Towards seamless tracking-free web: Improved detection of trackers via one-class learning
M Ikram, HJ Asghar, MA Kaafar, A Mahanti, B Krishnamurthy
Proceedings on Privacy Enhancing Technologies 2017 (1), 79-99, 2017
412017
Cryptanalysis of the convex hull click human identification protocol
HJ Asghar, S Li, J Pieprzyk, H Wang
International Journal of Information Security 12 (2), 83-96, 2013
382013
Human identification through image evaluation using secret predicates
H Jameel, RA Shaikh, H Lee, S Lee
Cryptographers’ Track at the RSA Conference, 67-84, 2007
372007
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
H Jameel, U Kalim, A Sajjad, S Lee, T Jeon
European Grid Conference, 932-941, 2005
372005
Private processing of outsourced network functions: Feasibility and constructions
L Melis, HJ Asghar, E De Cristofaro, MA Kaafar
Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016
312016
Splitbox: Toward efficient private network function virtualization
HJ Asghar, L Melis, C Soldani, E De Cristofaro, MA Kaafar, L Mathy
Proceedings of the 2016 workshop on Hot topics in Middleboxes and Network …, 2016
302016
Mobility independent secret key generation for wearable health-care devices
G Revadigar, C Javali, HJ Asghar, KB Rasmussen, S Jha
Proceedings of the 10th EAI International Conference on Body Area Networks …, 2015
302015
Gesture-based continuous authentication for wearable devices: The smart glasses use case
J Chauhan, HJ Asghar, A Mahanti, MA Kaafar
International Conference on Applied Cryptography and Network Security, 648-665, 2016
27*2016
A new human identification protocol and coppersmith’s baby-step giant-step algorithm
HJ Asghar, J Pieprzyk, H Wang
International Conference on Applied Cryptography and Network Security, 349-366, 2010
272010
On the security of PAS (predicate-based authentication service)
S Li, HJ Asghar, J Pieprzyk, AR Sadeghi, R Schmitz, H Wang
2009 Annual Computer Security Applications Conference, 209-218, 2009
262009
Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks
HJ Asghar, S Li, R Steinfeld, J Pieprzyk
Proceedings of the 20th Annual Network and Distributed System Security …, 2013
152013
Network level privacy for wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, S Lee, YJ Song, H Lee
2008 The Fourth International Conference on Information Assurance and …, 2008
152008
Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 9 (8), 5989-6007, 2009
132009
Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, S Lee, YJ Song, H Lee
2008 The 9th International Conference for Young Computer Scientists, 2038-2043, 2008
132008
Mobile-to-grid middleware: An approach for breaching the divide between mobile and grid environments
U Kalim, H Jameel, A Sajjad, S Lee
International Conference on Networking, 1-8, 2005
122005
iARC: Secret key generation for resource constrained devices by inducing artificial randomness in the channel
G Revadigar, C Javali, HJ Asghar, KB Rasmussen, S Jha
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
102015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20