Quazi Mamun

Orcid: 0000-0003-2196-7651

According to our database1, Quazi Mamun authored at least 24 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers.
Sensors, September, 2023

2022
Lightweight cryptography in IoT networks: A survey.
Future Gener. Comput. Syst., 2022

Proof-of-Enough-Work Consensus Algorithm for Enhanced Transaction Processing in Blockchain.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

2021
A Generalised Logical Layered Architecture for Blockchain Technology.
CoRR, 2021

An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

2020
Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey.
CoRR, 2020

A Group Mutual Exclusion protocol for the Use Case of IoT-Blockchain Integration In Work-Safe Scenario.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
A Key Management Scheme for Establishing an Encryption-Based Trusted IoT System.
Proceedings of the 4th IEEE/ACM International Conference on Connected Health: Applications, 2019

2018
A Robust and Lightweight Key Management Protocol for WSNs in Distributed IoT Applications.
Int. J. Syst. Softw. Secur. Prot., 2018

2015
Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks.
Int. J. Wirel. Networks Broadband Technol., 2015

An Effective t-way Test Data Generation Strategy.
Proceedings of the Security and Privacy in Communication Networks, 2015

2014
A Robust Data Gathering Technique for Large Scaled Wireless Sensor Networks.
J. Networks, 2014

Anomaly Detection in Wireless Sensor Network.
J. Networks, 2014

A Coverage-Based Scheduling Algorithm for WSNs.
Int. J. Wirel. Inf. Networks, 2014

Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Defence Against Code Injection Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

What is the first step in designing an application protocol for wireless sensor networks (WSNs)?
Proceedings of the IEEE Sensors Applications Symposium, 2014

Data Cleansing during Data Collection fromWireless Sensor Networks.
Proceedings of the Twelfth Australasian Data Mining Conference, AusDM 2014, Brisbane, 2014

2013
Design Issues in Constructing Chain Oriented Logical Topology for Wireless Sensor Networks and a Solution.
J. Sens. Actuator Networks, 2013

Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs.
Proceedings of the Security and Privacy in Communication Networks, 2013

(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Establishing secured communications in cluster based wireless sensor networks.
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013

2012
A Qualitative Comparison of Different Logical Topologies for Wireless Sensor Networks.
Sensors, 2012


  Loading...