Rasib Khan, Ph.D.
Rasib Khan, Ph.D.
Assistant Professor, Dept. of Computer Science, Northern Kentucky University
Verified email at nku.edu - Homepage
TitleCited byYear
OpenID authentication as a service in OpenStack
RH Khan, J Ylitalo, AS Ahmed
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
722011
Aura: An iot based cloud infrastructure for localized mobile computation outsourcing
R Hasan, MM Hossain, R Khan
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015
512015
OTIT: Towards secure provenance modeling for location proofs
R Khan, S Zawoad, MM Haque, R Hasan
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
282014
Secure networking for virtual machines in the cloud
M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma
2012 IEEE International Conference on Cluster Computing Workshops, 88-96, 2012
212012
SEPIA: Secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices
R Khan, R Hasan, J Xu
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015
202015
WORAL: A witness oriented secure location provenance framework for mobile devices
R Hasan, R Khan, S Zawoad, MM Haque
IEEE Transactions on Emerging Topics in Computing 4 (1), 128-141, 2015
202015
Cloud computing security: foundations and challenges
JR Vacca
CRC Press, 2016
192016
‘who, when, and where?’location proof assertion for mobile devices
R Khan, S Zawoad, MM Haque, R Hasan
IFIP Annual Conference on Data and Applications Security and Privacy, 146-162, 2014
162014
Modeling a secure supply chain integrity preservation system
R Khan, MM Haque, R Hasan
Technologies for Homeland Security (HST), 2013 IEEE International Conference …, 2013
14*2013
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading
R Hasan, M Hossain, R Khan
Future Generation Computer Systems 86, 821-835, 2018
122018
A cloud you can wear: Towards a mobile and wearable personal cloud
R Hasan, R Khan
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
122016
Hot zone identification: Analyzing effects of data sampling on spam clustering
R Khan, M Mizan, R Hasan, A Sprague
112014
Fuzzy authentication using interaction provenance in service oriented computing
R Khan, R Hasan
2015 IEEE International Conference on Services Computing, 170-177, 2015
102015
Interaction provenance model for unified authentication factors in service oriented computing
R Hasan, R Khan
Proceedings of the 4th ACM conference on Data and application security and …, 2014
92014
A security adaptive protocol suite: Ranked Neighbor Discovery (RND) and Security Adaptive AODV (SA-AODV)
RH Khan, KM Imtiaz-ud-Din, AA Faruq, ARM Kamal, A Mottalib
2008 International Conference on Electrical and Computer Engineering, 588-593, 2008
72008
Secure cloud connectivity for scientific applications
L Osmani, S Toor, M Komu, MJ Kortelainen, T Lindén, J White, R Khan, ...
IEEE Transactions on Services Computing 11 (4), 658-670, 2015
62015
MIDEP: Multiparty identity establishment protocol for decentralized collaborative services
R Khan, R Hasan
2015 IEEE International Conference on Services Computing, 546-553, 2015
52015
Jugo: A generic architecture for composite cloud as a service
M Hossain, R Khan, S Al Noor, R Hasan
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 806-809, 2016
42016
Accountable proof of ownership for data using timing element in cloud services
M Mizan, ML Rahman, R Khan, M Haque, R Hasan
High Performance Computing and Simulation (HPCS), 2013 International …, 2013
42013
Unified authentication factors and fuzzy service access using interaction provenance
R Hasan, R Khan
Computers & Security 67, 211-231, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20