Rasib Khan

According to our database1, Rasib Khan authored at least 20 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Security mechanisms and data access protocols in innovative wireless networks.
IJDSN, 2018

Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading.
Future Generation Comp. Syst., 2018

Security-Aware Passwords and Services Usage in Developing Countries: A Case Study of Bangladesh.
Proceedings of the Services Computing - SCC 2018, 2018

2017
Unified authentication factors and fuzzy service access using interaction provenance.
Computers & Security, 2017

DExaS: Delegated experience as a service for mobile and wearable devices.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Towards non-intrusive continuous healthcare monitoring with the Smart Hospital Gown.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices.
IEEE Trans. Emerging Topics Comput., 2016

The Story of Naive Alice: Behavioral Analysis of Susceptible Internet Users.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Litigo: A Cost-Driven Model for Opaque Cloud Services.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Jugo: A Generic Architecture for Composite Cloud as a Service.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
SEPIA: Secure-PIN-Authentication-as-a-Service for ATM Using Mobile and Wearable Devices.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

MIDEP: Multiparty Identity Establishment Protocol for Decentralized Collaborative Services.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Fuzzy Authentication Using Interaction Provenance in Service Oriented Computing.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

2014
Hot Zone Identification: Analyzing Effects of Data Sampling on Spam Clustering.
JDFSL, 2014

'Who, When, and Where?' Location Proof Assertion for Mobile Devices.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Interaction provenance model for unified authentication factors in service oriented computing.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

OTIT: towards secure provenance modeling for location proofs.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Accountable proof of ownership for data using timing element in cloud services.
Proceedings of the International Conference on High Performance Computing & Simulation, 2013


  Loading...