Musfiq Rahman

Orcid: 0000-0002-2774-9076

According to our database1, Musfiq Rahman authored at least 18 papers between 2006 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
VAP code: A secure graphical password for smart devices.
Comput. Electr. Eng., 2017

2016
Asteroid: Scalable Online Memory Diagnostics for Multi-core, Multi-socket Servers.
Int. J. Parallel Program., 2016

A Flexible Learning Framework for Kids.
Proceedings of the 21st Western Canadian Conference on Computing Education, 2016

Impact of Software Usage on Fundamental Engineering Courses.
Proceedings of the 21st Western Canadian Conference on Computing Education, 2016

2015
An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network.
Wirel. Pers. Commun., 2015

Secure Location Validation with Wi-Fi Geo-fencing and NFC.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

GPU-acceleration of blowfish cryptographic algorithm.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2015

Asteroid: scalable online memory diagnostics.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

Lightweight protocol for anonymity and mutual authentication in RFID systems.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
COMeT+: Continuous Online Memory Testing with Multi-Threading Extension.
IEEE Trans. Computers, 2014

2012
A Hybrid Key Management Protocol for Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A mobile role-based access control system using identity-based encryption with zero knowledge proof.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012

2011
Lightweight matrix-based authentication protocol for RFID.
Proceedings of the 19th International Conference on Software, 2011

COMeT: Continuous Online Memory Test.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

2010
StealthWorks: Emulating Memory Errors.
Proceedings of the Runtime Verification - First International Conference, 2010

Test Suite for Vulnerability Analysis of RFID Systems.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

2009
Quality of Service Support in Wireless Ad Hoc Networks.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009

2006
Implementation of group member authentication protocol in mobile ad-hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006


  Loading...