Farzana Rahman

According to our database1, Farzana Rahman authored at least 49 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
The ISCB Student Council Internship Program: Expanding computational biology capacity worldwide.
PLoS Computational Biology, 2018

How to Build a Student-Centered Research Culture for the Benefit of Undergraduate Students: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Effective POGIL Implementation Approaches in Computer Science Courses: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Healthy Hankerings: Motivating Adolescents to Combat Obesity with a Mobile Application.
Proceedings of the Human-Computer Interaction. Interaction in Context, 2018

2017
AnonPri: A secure anonymous private authentication protocol for RFID systems.
Inf. Sci., 2017

A privacy preserving framework for RFID based healthcare systems.
Future Generation Comp. Syst., 2017

Can we really do it?: Conducting Significant Computer Science Research in Primarily Undergraduate Institutions (PUIs) (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Bringing Undergraduate Research Experience in Non-R1 Institutions.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

A wireless IoT system towards gait detection in stroke patients.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Roadway feature mapping from point cloud data: A graph-based clustering approach.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017

2016
Privacy Challenges and Goals in mHealth Systems.
Advances in Computers, 2016

Securing app distribution process of iOS exploiting the notion of authentic update.
Proceedings of the International Conference on Networking Systems and Security, 2016

2015
Highlights from the 1st Student Symposium on Computational Biology and Life Sciences, organised by ISCB Regional Student Group, UK.
PeerJ PrePrints, 2015

Highlights from the tenth ISCB Student Council Symposium 2014.
BMC Bioinformatics, 2015

Juggling the Jigsaw: Enabling CS1 Growing Enrollment and Diversity at Undergraduate Institutions (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

CS 4 Everyone: Diversifying the K-12 Pipeline for CS at College and High School Level (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Message from the STPSA 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols.
Personal and Ubiquitous Computing, 2014

A semi-automated technique for labeling and counting of apoptosing retinal cells.
BMC Bioinformatics, 2014

Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

PriSN: a privacy protection framework for healthcare social networking sites.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

PriDaC: Privacy Preserving Data Collection in Sensor Enabled RFID Based Healthcare Services.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

2013
Preserving User Privacy in Pervasive Environments with a Collaborative Model.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

iPrevention: towards a novel real-time smartphone-based fall prevention system.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

PriGen: A Generic Framework to Preserve Privacy of Healthcare Data in the Cloud.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

Towards Improving Reliability of Computational RFID Based Smart Healthcare Monitoring Systems.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

2012
Evolution of Energy Awareness Using an Open Carbon Footprint Calculation Platform.
Proceedings of the Handbook of Energy-Aware and Green Computing - Two Volume Set., 2012

User privacy protection in pervasive social networking applications using PCO.
IJSCCPS, 2012

Let EcoDrive be your guide: development of a mobile tool to reduce carbon footprint and promote green transport.
Proceedings of the ACM Symposium on Applied Computing, 2012

DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks.
Proceedings of the ACM Symposium on Applied Computing, 2012

MonAC: detecting missing tags for improved accuracy in computational RFID based assisted environments.
Proceedings of the Research in Applied Computation Symposium, 2012

Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

I am not a goldfish in a bowl: A privacy preserving framework for RFID based healthcare systems.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

2011
An approach to open carbon footprint calculation platform design.
Proceedings of the 2011 IEEE International Conference on Service-Oriented Computing and Applications, 2011

ProQuPri: towards anonymity protection with privacy quantification for context-aware applications.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

REBIVE: a reliable private data aggregation scheme for wireless sensor networks.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

AnonPri: An efficient anonymous private authentication protocol.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

2010
Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments.
Wireless Personal Communications, 2010

Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments.
Journal of Systems and Software, 2010

Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

S-search: finding RFID tags using scalable and secure search protocol.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

UCFC - Ubiquitous personal Carbon Footprint Calculation Platform.
Proceedings of the International Green Computing Conference 2010, 2010

2009
Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks.
JNW, 2009

Trust based security auto-configuration for smart assisted living environments.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Supporting recovery, privacy and security in RFID systems using a robust authentication protocol.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) Model for Pervasive Environments.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

2008
Secured tag identification using EDSA (enhanced distributed scalable architecture).
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Towards Secure Trust Bootstrapping in Pervasive Computing Environment.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

ERAP: ECC Based RFID Authentication Protocol.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008


  Loading...