Mohammad Shahriar Rahman

Orcid: 0000-0001-9385-4053

According to our database1, Mohammad Shahriar Rahman authored at least 55 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis.
CoRR, 2024

2023
A systematic literature review of blockchain-based e-KYC systems.
Computing, October, 2023

Cloud Forensic: Issues, Challenges and Solution Models.
CoRR, 2023

On the (in)Security of the Control Plane of SDN Architecture: A Survey.
IEEE Access, 2023

2021
Integrating Blockchain With Artificial Intelligence for Privacy-Preserving Recommender Systems.
IEEE Trans. Netw. Sci. Eng., 2021

Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data.
IEEE Trans. Big Data, 2021

A Transparent and Privacy-Preserving Healthcare Platform With Novel Smart Contract for Smart Cities.
IEEE Access, 2021

Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media.
Proceedings of the Ubiquitous Security - First International Conference, 2021


Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

2020
Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption.
IEEE Trans. Engineering Management, 2020

An Efficient Routing Protocol for Secured Communication in Cognitive Radio Sensor Networks.
CoRR, 2020

Digital Surveillance Systems for Tracing COVID-19: Privacy and Security Challenges with Recommendations.
CoRR, 2020

Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities.
Proceedings of the 19th IEEE International Conference on Trust, 2020

HIDEchain: A User-Centric Secure Edge Computing Architecture for Healthcare IoT Devices.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

An IoT based Real-time Data-centric Monitoring System for Vaccine Cold Chain.
Proceedings of the IEEE East-West Design & Test Symposium, 2020

2019
Privacy-friendly platform for healthcare data in cloud based on blockchain environment.
Future Gener. Comput. Syst., 2019

Towards Privacy-preserving Recommender System with Blockchains.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

2018
PPM: Privacy Policy Manager for Home Energy Management System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

CRAB: Blockchain Based Criminal Record Management System.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

BlockStore: A Secure Decentralized Storage Framework on Blockchain.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction.
J. Internet Serv. Inf. Secur., 2017

Privacy-friendly secure bidding for smart grid demand-response.
Inf. Sci., 2017

MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

On blockchain-based anonymized dataset distribution platform.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Robust ORAM: Enhancing Availability, Confidentiality and Integrity.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Towards Outsourced Privacy-Preserving Multiparty DBSCAN.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.
Proceedings of the Advances in Information and Computer Security, 2017

VIGraph - A Framework for Verifiable Information.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

On blockchain-based authorization architecture for beyond-5G mobile services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

2016
On the Leakage Resilient Cryptography in Game-Theoretic Settings.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

User-in-a-context: A blueprint for context-aware identification.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A Model for Personalised Perception of Policies.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Secure Bike Sharing System for Multi-Modal Journey.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
Generic constructions of secure-channel free searchable encryption with adaptive security.
Secur. Commun. Networks, 2015

Privacy-friendly secure bidding scheme for demand response in smart grid.
Proceedings of the IEEE First International Smart Cities Conference, 2015

2013
Private Multiparty Set Intersection Protocol in Rational Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Privacy-Preserving Two-Party k-Means Clustering in Malicious Model.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Private Two-Party Set Intersection Protocol in Rational Model.
J. Internet Serv. Inf. Secur., 2012

Privacy-preserving Two-party Rational Set Intersection Protocol.
Informatica (Slovenia), 2012

Dynamic attribute-based signcryption without random oracles.
Int. J. Appl. Cryptogr., 2012

KIMAP: Key-Insulated Mutual Authentication Protocol for RFID
CoRR, 2012

APRAP: Another Privacy Preserving RFID Authentication Protocol
CoRR, 2012

Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure.
Proceedings of the SECRYPT 2012, 2012

A Secure and Private RFID Authentication Protocol under SLPN Problem.
Proceedings of the Network and System Security - 6th International Conference, 2012

Privacy-Preserving Set Operations in the Presence of Rational Parties.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Efficient and Low-Cost RFID Authentication Schemes.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Ideal Secret Sharing Schemes with Share Selectability.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Privacy-Preserving Data Mining: A Game-Theoretic Approach.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Toward Dynamic Attribute-Based Signcryption (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Hidden Credential Retrieval without Random Oracles.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

Privacy-Preserving Data Mining in Presence of Covert Adversaries.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

Efficient Privacy-Preserving Data Mining in Malicious Model.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
A Secure RFID Authentication Protocol with Low Communication Cost.
Proceedings of the 2009 International Conference on Complex, 2009


  Loading...