Follow
Endadul Hoque
Endadul Hoque
Verified email at syr.edu - Homepage
Title
Cited by
Cited by
Year
Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments
ME Hoque, F Rahman, SI Ahamed, JH Park
Wireless personal communications 55, 65-79, 2010
772010
Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations
SY Chau, O Chowdhury, E Hoque, H Ge, A Kate, C Nita-Rotaru, N Li
2017 IEEE Symposium on Security and Privacy (SP), 503-520, 2017
692017
ERAP: ECC based RFID authentication protocol
SI Ahamed, F Rahman, E Hoque
2008 12th IEEE International Workshop on Future Trends of Distributed …, 2008
662008
Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments
SI Ahamed, MM Haque, ME Hoque, F Rahman, N Talukder
Journal of Systems and Software 83 (2), 253-270, 2010
642010
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
S Jero, ME Hoque, DR Choffnes, A Mislove, C Nita-Rotaru
NDSS, 2018
522018
S3PR: Secure serverless search protocols for RFID
SI Ahamed, F Rahman, E Hoque, F Kawsar, T Nakajima
2008 International Conference on Information Security and Assurance (isa …, 2008
442008
Expat: Expectation-based policy analysis and enforcement for appified smart-home platforms
M Yahyazadeh, P Podder, E Hoque, O Chowdhury
Proceedings of the 24th ACM symposium on access control models and …, 2019
402019
Analyzing operational behavior of stateful protocol implementations for detecting semantic bugs
E Hoque, O Chowdhury, SY Chau, C Nita-Rotaru, N Li
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
262017
Turret: A platform for automated attack finding in unmodified distributed system implementations
H Lee, J Seibert, E Hoque, C Killian, C Nita-Rotaru
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
262014
AnonPri: An efficient anonymous private authentication protocol
ME Hoque, F Rahman, SI Ahamed
2011 IEEE International Conference on Pervasive Computing and Communications …, 2011
262011
Anonpri: A secure anonymous private authentication protocol for RFID systems
F Rahman, ME Hoque, SI Ahamed
Information Sciences 379, 195-210, 2017
252017
Secure and efficient tag searching in RFID systems using serverless search protocol
SI Ahamed, F Rahman, E Hoque, F Kawsar, T Nakajima
International Journal of Security and Its Applications 2 (4), 57-66, 2008
242008
Preserve your privacy with pco: A privacy sensitive architecture for context obfuscation for pervasive e-community based applications
F Rahman, ME Hoque, FA Kawsar, SI Ahamed
2010 IEEE Second International Conference on Social Computing, 41-48, 2010
212010
Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks.
A Rahman, ME Hoque, F Rahman, SK Kundu, P Gburzynski
J. Networks 4 (9), 895-904, 2009
192009
YA-SRAP: Yet another serverless RFID authentication protocol
SI Ahamed, MDE Hoque, F Rahman, F Kawsar, T Nakajima
2008 IET 4th International Conference on Intelligent Environments, 1-8, 2008
152008
PatrIoT: Policy Assisted Resilient Programmable IoT System
M Yahyazadeh, SR Hussain, E Hoque, O Chowdhury
Runtime Verification: 20th International Conference, RV 2020, Los Angeles …, 2020
122020
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol
ME Hoque, F Rahman, SI Ahamed
Proceedings of the 2009 ACM symposium on Applied Computing, 1062-1066, 2009
122009
Adversarial testing of wireless routing implementations
ME Hoque, H Lee, R Potharaju, CE Killian, C Nita-Rotaru
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
112013
Preserving privacy in wireless sensor networks using reliable data aggregation
F Rahman, E Hoque, SI Ahamed
ACM SIGAPP Applied Computing Review 11 (3), 52-62, 2011
102011
A formal security analysis of ZigBee (1.0 and 3.0)
L Li, P Podder, E Hoque
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-11, 2020
92020
The system can't perform the operation now. Try again later.
Articles 1–20