Kazi Md. Rokibul Alam

Orcid: 0000-0003-4895-7234

According to our database1, Kazi Md. Rokibul Alam authored at least 27 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Secure Medical Record Sharing Scheme Based on Blockchain and Two-fold Encryption.
CoRR, 2023

2022
A multi-stage chaotic encryption technique for medical image.
Inf. Secur. J. A Glob. Perspect., 2022

A Smartphone Based Real-Time Object Recognition System for Visually Impaired People.
Proceedings of the Machine Intelligence and Emerging Technologies, 2022

Location Data Anonymization Retaining Data Mining Utilization.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022

2021
An Electronic Voting Scheme Based on Revised-SVRM and Confirmation Numbers.
IEEE Trans. Dependable Secur. Comput., 2021

2020
A dynamic ensemble learning algorithm for neural networks.
Neural Comput. Appl., 2020

2019
A Multi-Stage Encryption Technique to Enhance the Secrecy of Image.
KSII Trans. Internet Inf. Syst., 2019

A technique for DNA cryptography based on dynamic mechanisms.
J. Inf. Secur. Appl., 2019

Privacy-Aware MapReduce Based Multi-Party Secure Skyline Computation.
Inf., 2019

Semi-Order Preserving Encryption Technique for Numeric Database.
Int. J. Netw. Comput., 2019

A Framework for Privacy-Preserving Multi-Party Skyline Query Based on Homomorphic Encryption.
IEEE Access, 2019

Multi-factor Based Stock Price Prediction Using Hybrid Neural Networks with Attention Mechanism.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Privacy-preserving Top-k Dominating Queries in Distributed Multi-party Databases.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
An Untraceable Voting Scheme Based on Pairs of Signatures.
Int. J. Netw. Secur., 2018

Emotion Recognition from Speech based on Relevant Feature and Majority Voting.
CoRR, 2018

A Technique to Enrich the Secrecy Level of High Capacity Data Hiding Steganography Technique in JPEG Compressed Image.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

2017
An Offline Electronic Payment System Based on an Untraceable Blind Signature Scheme.
KSII Trans. Internet Inf. Syst., 2017

A new e-voting scheme based on revised simplified verifiable re-encryption mixnet.
Proceedings of the International Conference on Networking, Systems and Security, 2017

A DNA cryptographic technique based on dynamic DNA encoding and asymmetric cryptosystem.
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017

A secure and efficient data transmission technique using quantum key distribution.
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017

Semi-order Preserving Encryption Technique for Numeric Data to Enhance Privacy.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

2016
A comparison between RSA and ElGamal based untraceable blind signature schemes.
Proceedings of the International Conference on Networking Systems and Security, 2016

2015
Commutative Re-encryption Techniques: Significance and Analysis.
Inf. Secur. J. A Glob. Perspect., 2015

An Incoercible E-Voting Scheme Based on Revised Simplified Verifiable Re-encryption Mix-nets.
CoRR, 2015

A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets.
Proceedings of the International Conference on Networking Systems and Security, 2015

2009
Electronic Voting Using Confirmation Numbers.
Proceedings of the IEEE International Conference on Systems, 2009

2008
An Information System Platform for Anonymous Product Recycling.
J. Softw., 2008


  Loading...