Följ
Hassan Jameel Asghar
Hassan Jameel Asghar
Verifierad e-postadress på mq.edu.au - Startsida
Titel
Citeras av
Citeras av
År
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008
4402008
A trust model for ubiquitous systems based on vectors of trust values
H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee
Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005
1212005
Towards seamless tracking-free web: Improved detection of trackers via one-class learning
M Ikram, HJ Asghar, MA Kaafar, B Krishnamurthy, A Mahanti
arXiv preprint arXiv:1603.06289, 2016
1012016
Trust management problem in distributed wireless sensor networks
RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song
12th IEEE International Conference on Embedded and Real-Time Computing …, 2006
962006
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
602010
Splitbox: Toward efficient private network function virtualization
HJ Asghar, L Melis, C Soldani, E De Cristofaro, MA Kaafar, L Mathy
Proceedings of the 2016 workshop on Hot topics in Middleboxes and Network …, 2016
502016
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
H Jameel, U Kalim, A Sajjad, S Lee, T Jeon
Advances in Grid Computing-EGC 2005: European Grid Conference, Amsterdam …, 2005
442005
Cryptanalysis of the convex hull click human identification protocol
HJ Asghar, S Li, J Pieprzyk, H Wang
International Journal of Information Security 12, 83-96, 2013
412013
Private processing of outsourced network functions: Feasibility and constructions
L Melis, HJ Asghar, E De Cristofaro, MA Kaafar
Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016
392016
Gesture-based continuous authentication for wearable devices: The smart glasses use case
J Chauhan, HJ Asghar, A Mahanti, MA Kaafar
Applied Cryptography and Network Security: 14th International Conference …, 2016
39*2016
Mobility independent secret key generation for wearable health-care devices
G Revadigar, C Javali, HJ Asghar, KB Rasmussen, S Jha
Proceedings of the 10th EAI International Conference on Body Area Networks …, 2015
362015
Human identification through image evaluation using secret predicates
H Jameel, RA Shaikh, H Lee, S Lee
Cryptographers’ Track at the RSA Conference, 67-84, 2007
362007
A new human identification protocol and coppersmith’s baby-step giant-step algorithm
HJ Asghar, J Pieprzyk, H Wang
Applied Cryptography and Network Security: 8th International Conference …, 2010
322010
On the security of PAS (predicate-based authentication service)
S Li, HJ Asghar, J Pieprzyk, AR Sadeghi, R Schmitz, H Wang
2009 Annual Computer Security Applications Conference, 209-218, 2009
292009
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists
BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna
14th ACM ASIA Conference on Computer and Communications Security, ASIACCS …, 2019
272019
On the (In) Feasibility of Attribute Inference Attacks on Machine Learning Models
BZH Zhao, A Agrawal, C Coburn, HJ Asghar, R Bhaskar, MA Kaafar, ...
IEEE European Symposium on Security and Privacy, 2021
252021
Private Continual Release of Real-Valued Data Streams
V Perrier, HJ Asghar, D Kaafar
Network and Distributed Systems Security (NDSS) Symposium 2019, 2019
232019
Touch and You're Trapp (ck) ed: Quantifying the Uniqueness of Touch Gestures for Tracking.
R Masood, BZH Zhao, HJ Asghar, MA Kaafar
Proc. Priv. Enhancing Technol. 2018 (2), 122-142, 2018
222018
When air traffic management meets blockchain technology: a blockchain-based concept for securing the sharing of flight data
MD Clementi, N Larrieu, E Lochin, MA Kaafar, H Asghar
2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), 1-10, 2019
212019
Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks
HJ Asghar, S Li, R Steinfeld, J Pierpzyk
Cryptology ePrint Archive, 2012
192012
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20