Muhammad Rizwan Asghar

Orcid: 0000-0002-9607-376X

Affiliations:
  • The University of Auckland, NZ


According to our database1, Muhammad Rizwan Asghar authored at least 88 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Zero-Knowledge Proof-based Practical Federated Learning on Blockchain.
CoRR, 2023

Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

2022
Towards a data-driven framework for optimizing security-efficiency tradeoff in QUIC.
Secur. Priv., 2022

TIM: Secure and usable authentication for smartphones.
J. Inf. Secur. Appl., 2022

Sharing medical data using a blockchain-based secure EHR system for New Zealand.
IET Blockchain, 2022

2021
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage.
ACM Trans. Priv. Secur., 2021

e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy.
IEEE Trans. Dependable Secur. Comput., 2021

Collusion Defender: Preserving Subscribers' Privacy in Publish and Subscribe Systems.
IEEE Trans. Dependable Secur. Comput., 2021

Vulnerability disclosure and cybersecurity awareness campaigns on twitter during COVID-19.
Secur. Priv., 2021

A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations.
J. Comput. Secur., 2021

Blockchain-based public ecosystem for auditing security of software applications.
Computing, 2021

2020
Multi-CDN: Towards Privacy in Content Delivery Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Analysing performance issues of open-source intrusion detection systems in high-speed networks.
J. Inf. Secur. Appl., 2020

Mitigating distributed denial of service attacks in satellite networks.
Trans. Emerg. Telecommun. Technol., 2020

A Business and Legislative Perspective of V2X and Mobility Applications in 5G Networks.
IEEE Access, 2020

Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter.
Proceedings of the 19th IEEE International Conference on Trust, 2020

RevBloc: A Blockchain-based Secure Customer Review System.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Towards a Theory of Special-Purpose Program Obfuscation.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Case Study of a Cybersecurity Programme: Curriculum Design, Resource Management, and Reflections.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Optimizing Energy in WiFi Direct Based Multi-hop D2D Networks.
Proceedings of the IEEE Global Communications Conference, 2020

Energy Efficient Wireless Body Area Networks: Proximity-based Clustering in Medical Implants.
Proceedings of the Eighth IEEE International Conference on Communications and Networking, 2020

2019
Checking certificate revocation efficiently using certificate revocation guard.
J. Inf. Secur. Appl., 2019

Process Mining and User Privacy in D2D and IoT Networks.
Inform. Spektrum, 2019

Privacy-preserving Searchable Databases with Controllable Leakage.
CoRR, 2019

PrivICN: Privacy-preserving content retrieval in information-centric networking.
Comput. Networks, 2019

Cybersecurity in industrial control systems: Issues, technologies, and challenges.
Comput. Networks, 2019

Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

MedBloc: A Blockchain-Based Secure EHR System for Sharing and Accessing Medical Data.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Trust-Based DoS Mitigation Technique for Medical Implants in Wireless Body Area Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Black Box Attacks on Deep Anomaly Detectors.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
A Survey on Routing in Anonymous Communication Protocols.
ACM Comput. Surv., 2018

Security in Wireless Body Area Networks: From In-Body to Off-Body Communications.
IEEE Access, 2018

Technologies and Solutions for Location-Based Services in Smart Cities: Past, Present, and Future.
IEEE Access, 2018

A marketplace for efficient and secure caching for IoT applications in 5G networks.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

AuthStore: Password-Based Authentication and Encrypted Data Storage in Untrusted Environments.
Proceedings of the 17th IEEE International Conference On Trust, 2018

PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Secure publish and subscribe systems with efficient revocation.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Global perspectives on cybersecurity education.
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

Global perspectives on cybersecurity education for 2030: a case for a meta-discipline.
Proceedings of the Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

Integrating smart city applications in 5G networks.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Towards Blockchain-Based Scalable and Trustworthy File Sharing.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Energy Consumption Model for WiFi Direct Based D2D Communications.
Proceedings of the IEEE Global Communications Conference, 2018

Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Security and privacy in vehicular communications: Challenges and opportunities.
Veh. Commun., 2017

Smart Meter Data Privacy: A Survey.
IEEE Commun. Surv. Tutorials, 2017

Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database.
Proceedings of the Information Security Theory and Practice, 2017

Privacy-Preserving Content Delivery Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Evaluating network intrusion detection systems for high-speed networks.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Towards bootstrapping trust in D2D using PGP and reputation mechanism.
Proceedings of the IEEE International Conference on Communications, 2017

Towards Energy Efficient Multi-Hop D2D Networks Using WiFi Direct.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources.
Proceedings of the 13th IEEE International Conference on e-Science, 2017

Secure and Practical Searchable Encryption: A Position Paper.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

P-McDb: Privacy-Preserving Search Using Multi-Cloud Encrypted Databases.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
$2DCrypt$ : Image Scaling and Cropping in Encrypted Domains.
IEEE Trans. Inf. Forensics Secur., 2016

3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

CloudEFS: Efficient and secure file system for cloud storage.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

PROTECTOR: Privacy-preserving information lookup in content-centric networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Towards a Framework for Privacy-Preserving Data Sharing in Portable Clouds.
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016

Privacy-preserving Data Sharing in Portable Clouds.
Proceedings of the CLOSER 2016, 2016

SPARER: Secure Cloud-Proof Storage for e-Health Scenarios.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptol. ePrint Arch., 2015

STRATUS: Towards Returning Data Control to Cloud Users.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Automating Consent Management Lifecycle for Electronic Healthcare Systems.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
PIDGIN: privacy-preserving interest and content sharing in opportunistic networks.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments.
PhD thesis, 2013

ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments.
IACR Cryptol. ePrint Arch., 2013

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments.
IACR Cryptol. ePrint Arch., 2013

Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments.
IACR Cryptol. ePrint Arch., 2013

ESPOON<sub>ERBAC</sub>: Enforcing security policies in outsourced environments.
Comput. Secur., 2013

Tweet4act: Using incident-specific profiles for classifying crisis-related messages.
Proceedings of the 10th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2013

Supporting complex queries and access policies for multi-user encrypted databases.
Proceedings of the CCSW'13, 2013

2012
A Holistic View of Security and Privacy Issues in Smart Grids.
Proceedings of the Smart Grid Security - First International Workshop, 2012

ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

2011
Flexible and Dynamic Consent-Capturing.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Securing Data Provenance in the Cloud.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Poster: ESPOON<sub>ERBAC</sub>: enforcing security policies in outsourced environments with encrypted RBAC.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011


  Loading...