Ferdous A. Barbhuiya

According to our database1, Ferdous A. Barbhuiya authored at least 20 papers between 2010 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


ICAuth: A secure and scalable owner delegated inter-cloud authorization.
Future Generation Comp. Syst., 2018

Convolutional neural networks for ocular smartphone-based biometrics.
Pattern Recognition Letters, 2017

A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

EyamKayo: Interactive Gaze and Facial Expression Captcha.
Proceedings of the Companion Publication of the 22nd International Conference on Intelligent User Interfaces, 2017

A Secure Re-encryption Scheme for Data Sharing in Unreliable Cloud Environment.
Proceedings of the IEEE World Congress on Services, 2016

A preliminary study of CNNs for iris and periocular verification in the visible spectrum.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Eye center localization and detection using radial mapping.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

ISURE: User authentication in mobile devices using ocular biometrics in visible spectrum.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

PairVoting: A secure online voting scheme using Pairing-Based Cryptography and Fuzzy Extractor.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

An Active Detection Mechanism for Detecting ICMP Based Attacks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Obfuscated malware detection using API call dependency.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Security in Mobile agent systems with Locator mechanism.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

An active DES based IDS for ARP spoofing.
Proceedings of the IEEE International Conference on Systems, 2011

Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks.
Proceedings of the Information Systems Security - 7th International Conference, 2011

A host based DES approach for detecting ARP spoofing.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

An Active Intrusion Detection System for LAN Specific Attacks.
Proceedings of the Advances in Computer Science and Information Technology, 2010