Md. Sadek Ferdous

Orcid: 0000-0002-8361-4870

According to our database1, Md. Sadek Ferdous authored at least 53 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Taxonomy of Challenges for Self-Sovereign Identity Systems.
IEEE Access, 2024

2023
A systematic literature review of blockchain-based e-KYC systems.
Computing, October, 2023

BlockMeter: An Application Agnostic Performance Measurement Framework for Private Blockchain Platforms.
IEEE Trans. Serv. Comput., 2023

Managing health insurance using blockchain technology.
CoRR, 2023

Decentralised Identity Federations using Blockchain.
CoRR, 2023

2022
A Cross-Layer Trust-Based Consensus Protocol for Peer-to-Peer Energy Trading Using Fuzzy Logic.
IEEE Internet Things J., 2022

A systematic literature review on wearable health data publishing under differential privacy.
Int. J. Inf. Sec., 2022

A Blockchain Based System for Healthcare Digital Twin.
IEEE Access, 2022

SSI4Web: A Self-sovereign Identity (SSI) Framework for the Web.
Proceedings of the Blockchain and Applications, 4th International Congress, 2022

2021
A survey of consensus algorithms in public blockchain systems for crypto-currencies.
J. Netw. Comput. Appl., 2021

Blockchain-based Covid Vaccination Registration and Monitoring.
CoRR, 2021

Real, Forged or Deep Fake? Enabling the Ground Truth on the Internet.
IEEE Access, 2021

Dynamic Management of Identity Federations using Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

2020
Immutable autobiography of smart cars leveraging blockchain technology.
Knowl. Eng. Rev., 2020

A survey on blockchain-based platforms for IoT use-cases.
Knowl. Eng. Rev., 2020

A Systematic Literature Review of Graphical Password Schemes.
J. Comput. Sci. Eng., 2020

A Survey on Blockchain & Cloud Integration.
CoRR, 2020

A Study of Password Security Factors among Bangladeshi Government Websites.
CoRR, 2020

Blockchain Consensuses Algorithms: A Survey.
CoRR, 2020

Social Anchor: Privacy-Friendly Attribute Aggregation From Social Networks.
IEEE Access, 2020

COVID-19 Contact Tracing: Challenges and Future Directions.
IEEE Access, 2020

Modelling Attacks in Blockchain Systems using Petri Nets.
Proceedings of the 19th IEEE International Conference on Trust, 2020

BONIK: A Blockchain Empowered Chatbot for Financial Transactions.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
In Search of Self-Sovereign Identity Leveraging Blockchain Technology.
IEEE Access, 2019

A Comparative Analysis of Distributed Ledger Technology Platforms.
IEEE Access, 2019

Chapter Two - Integrated platforms for blockchain enablement.
Adv. Comput., 2019

Trust Modeling for Blockchain-Based Wearable Data Market.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
Immutable Autobiography of Smart Cars.
CoRR, 2018

2017
Analysing privacy in visual lifelogging.
Pervasive Mob. Comput., 2017

Geo-Tagging News Stories Using Contextual Modelling.
Int. J. Inf. Retr. Res., 2017

Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A Distributed Infrastructure for Democratic Cloud Federations.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Formalising Identity Management protocols.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Understanding lifelog sharing preferences of lifeloggers.
Proceedings of the 28th Australian Conference on Computer-Human Interaction, 2016

Privacy threat model in lifelogging.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

Exploring lifelog sharing and privacy.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

A user-study examining visualization of lifelogs.
Proceedings of the 14th International Workshop on Content-Based Multimedia Indexing, 2016

Lifelogging User Study: Bystander Privacy.
Proceedings of the HCI 2016, 2016

Bystander Privacy in Lifelogging.
Proceedings of the HCI 2016, 2016

2015
User-controlled Identity Management Systems using mobile devices.
PhD thesis, 2015

Managing Dynamic Identity Federations using Security Assertion Markup Language.
J. Theor. Appl. Electron. Commer. Res., 2015

"My Day in Review": Visually Summarising Noisy Lifelog Data.
Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, 2015

Mathematical Modelling of Trust Issues in Federated Identity Management.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

A Hybrid Model of Attribute Aggregation in Federated Identity Management.
Proceedings of the Enterprise Security - Second International Workshop, 2015

2014
CAFS: A Framework for Context-Aware Federated Services.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Mathematical Modelling of Identity, Identity Management and Other Related Topics.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
Portable Personal Identity Provider in Mobile Phones.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Analysing attribute aggregation models in federated identity management.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Dynamic Identity Federation Using Security Assertion Markup Language (SAML).
Proceedings of the Policies and Research in Identity Management, 2013

2012
A comparative analysis of Identity Management Systems.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

2011
Leveraging social networks to gain access to organisational resources.
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011

2009
Spam filter optimality based on signal detection theory.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Security Usability of Petname Systems.
Proceedings of the Identity and Privacy in the Internet Age, 2009


  Loading...