Athar Mahboob

According to our database1, Athar Mahboob authored at least 16 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Single-Equipment with Multiple-Application for an Automated Robot-Car Control System.
Sensors, 2019

2018
AirSign: A Gesture-Based Smartwatch User Authentication.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

SnapAuth: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

2017
Practical Implementation and Analytical Evaluation of Ad-hoc Networking Projects to Build a MANET based Collaborative System.
Ad Hoc Sens. Wirel. Networks, 2017

2016
IDHOCNET: A Novel ID Centric Architecture for Ad Hoc Networks.
J. Comput. Networks Commun., 2016

Implementing MANET for Trustworthy Collaboration Using OSS and Android Based COTS Devices.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016

2015
IDHOCNET-A Novel Protocol Stack and Architecture for Ad hoc Networks.
Int. J. Commun. Networks Inf. Secur., 2015

2013
Design and Implementation of ID Based MANET Autoconfiguration Protocol.
Int. J. Commun. Networks Inf. Secur., 2013

2012
Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein.
KSII Trans. Internet Inf. Syst., 2012

Secure geo-sharing in mobile ad-hoc networks.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

Novel Arithmetic Architecture for High Performance Implementation of SHA-3 Finalist Keccak on FPGA Platforms.
Proceedings of the Reconfigurable Computing: Architectures, Tools and Applications, 2012

2011
Optimal utilization of available reconfigurable hardware resources.
Comput. Electr. Eng., 2011

Efficient Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist - Skein.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

High Throughput Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist: BLAKE.
Proceedings of the 2011 Frontiers of Information Technology, 2011

2010
Intrusion avoidance for SCADA security in industrial plants.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

2009
Efficient resource utilization of FPGAs.
Proceedings of the FIT '09, 2009


  Loading...