Hassan Jameel

According to our database1, Hassan Jameel authored at least 22 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Vehicle Intrusion And Theft Control System Using GSM and GPS - An advance and viable approach.
CoRR, 2020

2009
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2009

Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks
CoRR, 2009

Activity-Oriented Access Control for Ubiquitous Environments.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Image-Feature Based Human Identification Protocols on Limited Display Devices.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Activity-based Security Scheme for Ubiquitous Environments.
Proceedings of the 2008 IEEE International Performance, 2008

Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Network Level Privacy for Wireless Sensor Networks.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Using Image Attributes for Human Identification Protocols
CoRR, 2007

An Efficient Re-keying Scheme for Cluster Based Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

Human Identification Through Image Evaluation Using Secret Predicates.
Proceedings of the Topics in Cryptology, 2007


2006
Trust Management Problem in Distributed Wireless Sensor Networks.
Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2006), 2006

A Trust Model for Uncertain Interactions in Ubiquitous Environments.
Proceedings of the Intelligence and Security Informatics, 2006

2005
A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret.
IACR Cryptol. ePrint Arch., 2005

MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing.
Proceedings of the NODe 2005, 2005

Framework of an Application-Aware Adaptation Scheme for Disconnected Operations.
Proceedings of the Active and Programmable Networks, 2005

A Trust Model for Ubiquitous Systems based on Vectors of Trust Values.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

Mobile-to-Grid Middleware: An Approach for Breaching the Divide Between Mobile and Grid Environments.
Proceedings of the Networking, 2005

AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments.
Proceedings of the Advances in Grid Computing, 2005


  Loading...