Mohammad Saiful Islam

According to our database1, Mohammad Saiful Islam
  • authored at least 14 papers between 2008 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Cloud based framework for Parkinson's disease diagnosis and monitoring system for remote healthcare applications.
Future Generation Comp. Syst., 2017

2015
On selecting a reliable topology in Wireless Sensor Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Distributed Search over Encrypted Big Data.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

A Dynamic Approach to Detect Anomalous Queries on Relational Databases.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
A Distributed Framework for Scalable Search over Encrypted Documents.
CoRR, 2014

Efficient privacy-aware search over encrypted databases.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Inference attack against encrypted range queries on outsourced databases.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2012
Effect of Packet Delay Variation on Video-Voice over DiffServ-MPLS in IPv4-IPv6 Networks
CoRR, 2012

Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Efficient Similarity Search over Encrypted Data.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

2011
Poster: inference attacks against searchable encryption protocols.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Packet distribution based tuning of RTS Threshold in IEEE 802.11.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2008
CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008


  Loading...