Följ
Junade Ali
Junade Ali
Okänd anknytning
Verifierad e-postadress på junade.com - Startsida
Titel
Citeras av
Citeras av
År
Protocols for checking compromised credentials
L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
392019
Coverage and mobile sensor placement for vehicles on predetermined routes: A greedy heuristic approach
J Ali, V Dyo
SCITEPRESS–Science and Technology Publications, 2017
92017
Cross hashing: Anonymizing encounters in decentralised contact tracing protocols
J Ali, V Dyo
2021 International Conference on Information Networking (ICOIN), 181-185, 2021
82021
String similarity algorithms for a ticket classification system
M Pikies, J Ali
2019 6th International Conference on Control, Decision and Information …, 2019
72019
Mechanism for the prevention of password reuse through anonymized hashes
J Ali
PeerJ PrePrints 5, e3322v1, 2017
62017
Practical hash-based anonymity for mac addresses
J Ali, V Dyo
arXiv preprint arXiv:2005.06580, 2020
52020
Mastering PHP Design Patterns
J Ali
Packt Publishing Ltd, 2016
42016
Analysis and safety engineering of fuzzy string matching algorithms
M Pikies, J Ali
ISA transactions 113, 1-8, 2021
12021
Battery-assisted Electric Vehicle Charging: Data Driven Performance Analysis
J Ali, V Dyo, S Zhang
2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 429-433, 2020
12020
Novel Keyword Extraction and Language Detection Approaches
M Pikies, A Riyono, J Ali
arXiv preprint arXiv:2009.11832, 2020
2020
Password Authentication Attacks at Scale
J Ali, M Pikies
International Conference on Advanced Engineering Theory and Applications …, 2019
2019
Object Oriented PHP
J Ali
Lulu. com, 2017
2017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–12