Ruhul Amin

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling.
CoRR, 2024

2023
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems.
Comput. Commun., May, 2023

2022
Technology and COVID-19: How Reliant is Society on Technology?
CoRR, 2022

PortSec: Securing Port Knocking System using Sequence Mechanism in SDN Environment.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

2021
An e-healthcare authentication protocol employing cloud computing.
Int. J. Ad Hoc Ubiquitous Comput., 2021

Brain Tumor Classification from MRI Images Using Convolutional Neural Network.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence in Engineering and Technology, 2021

Reduction of Packet Duplication in Broadcasting Inter Vehicular Information Using 5G Network.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS.
Inf. Sci., 2020

Algorithm for Multi Keyword Search Over Encrypted Data in Cloud Environment.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
Design of routing protocol for multi-sink based wireless sensor networks.
Wirel. Networks, 2019

2018
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment.
Future Gener. Comput. Syst., 2018

2017
Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

Preventing from Cross-VM Side-Channel Attack Using New Replacement Method.
Wirel. Pers. Commun., 2017

Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card.
Wirel. Pers. Commun., 2017

Design of authentication protocol for wireless sensor network-based smart vehicular system.
Veh. Commun., 2017

The Modular Optical Underwater Survey System.
Sensors, 2017

Design of Secure and Efficient Electronic Payment System for Mobile Users.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities".
Proceedings of the Mathematics and Computing - Third International Conference, 2017

2016
An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card.
Int. J. Netw. Secur., 2016

Cryptanalysis and Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-server Environment Using Smart Card.
Int. J. Netw. Secur., 2016

A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks.
Ad Hoc Networks, 2016

Bangladeshi dialect recognition using Mel Frequency Cepstral Coefficient, Delta, Delta-delta and Gaussian Mixture Model.
Proceedings of the Eighth International Conference on Advanced Computational Intelligence, 2016

2015
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment.
Wirel. Pers. Commun., 2015

Efficient biometric and password based mutual authentication for consumer USB mass storage devices.
IEEE Trans. Consumer Electron., 2015

Comparative Analysis of GOCI Ocean Color Products.
Sensors, 2015

Inter-Comparison between VIIRS and MODIS Radiances and Ocean Color Data Products over the Chesapeake Bay.
Remote. Sens., 2015

Occurrence and Spatial Extent of HABs on the West Florida Shelf 2002-Present.
IEEE Geosci. Remote. Sens. Lett., 2015

An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems.
J. Medical Syst., 2015

An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.
J. Medical Syst., 2015

A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
J. Medical Syst., 2015

A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS.
J. Medical Syst., 2015

Cryptanalysis of a Markov Chain Based User Authentication Scheme.
IACR Cryptol. ePrint Arch., 2015

2014
Assessing the Application of Cloud-Shadow Atmospheric Correction Algorithm on HICO.
IEEE Trans. Geosci. Remote. Sens., 2014

2013
Optical Algorithm for Cloud Shadow Detection Over Water.
IEEE Trans. Geosci. Remote. Sens., 2013


  Loading...