Shahid Raza

Orcid: 0000-0001-8192-0893

According to our database1, Shahid Raza authored at least 63 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems.
IEEE Internet Things J., September, 2023

FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning.
ACM Trans. Internet Things, August, 2023

SparSFA: Towards robust and communication-efficient peer-to-peer federated learning.
Comput. Secur., June, 2023

Lightweight certificate revocation for low-power IoT with end-to-end security.
J. Inf. Secur. Appl., March, 2023

ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack.
IEEE Trans. Dependable Secur. Comput., 2023

AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance.
Comput. Secur., 2023

On the Resilience of Machine Learning-Based IDS for Automotive Networks.
Proceedings of the IEEE Vehicular Networking Conference, 2023

Modeling Roadblocks of Digital Transformation Practices for Net Zero in Indian MSMEs.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

Key Update for the IoT Security Standard OSCORE.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol.
RFC, April, 2022

Experimental Analysis of Trustworthy In-Vehicle Intrusion Detection System Using eXplainable Artificial Intelligence (XAI).
IEEE Access, 2022

EU Cybersecurity Act and IoT Certification: Landscape, Perspective and a Proposed Template Scheme.
IEEE Access, 2022

Being Hacked: Understanding Victims' Experiences of IoT Hacking.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Broadband Jamming Suppression at Subarray Level for Frequency Diverse Array Antenna.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022

Towards Automated PKI Trust Transfer for IoT.
Proceedings of the IEEE International Conference on Public Key Infrastructure and its Applications, 2022

ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT.
Proceedings of the Internet of Things, 2022

Attestation Mechanisms for Trusted Execution Environments Demystified.
Proceedings of the Distributed Applications and Interoperable Systems: 22nd IFIP WG 6.1 International Conference, 2022

A Look-ahead Towards 6G Security (Abstract).
Proceedings of the International Conference on Cyberworlds, 2022

Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

BLEND: Efficient and blended IoT data storage and communication with application layer security.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Security and trust preserving inter- and intra-cloud VM migrations.
Int. J. Netw. Manag., 2021

Quantitative System-Level Security Verification of the IoV Infrastructure.
CoRR, 2021

Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Establishing End-to-End Secure Channel for IoT Devices through an Untrusted C-ITS Network.
Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems, 2021

LICE: Lightweight certificate enrollment for IoT using application layer security.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
Application Layer Key Establishment for End-to-End Security in IoT.
IEEE Internet Things J., 2020

Group rekeying based on member join history.
Int. J. Inf. Sec., 2020

PKI4IoT: Towards public key infrastructure for the Internet of Things.
Comput. Secur., 2020

FoNAC - An automated Fog Node Audit and Certification scheme.
Comput. Secur., 2020

2019
TinyIKE: Lightweight IKEv2 for Internet of Things.
IEEE Internet Things J., 2019

Group-IKEv2 for multicast IPsec in the internet of things.
Int. J. Secur. Networks, 2019

Indraj: digital certificate enrollment for battery-powered wireless devices.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Towards Supporting IoT Device Storage and Network Security Using DTLS.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Machine Learning for Security at the IoT Edge - A Feasibility Study.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

FDTLS: Supporting DTLS-Based Combined Storage and Communication Security for IoT Devices.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

2018
Towards Formal Verification of Contiki: Analysis of the AES-CCM* Modules with Frama-C.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

POSTER: On Compressing PKI Certificates for Resource Limited Internet of Things Devices.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Axiom: DTLS-Based Secure IoT Group Communication.
ACM Trans. Embed. Comput. Syst., 2017

SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things.
Future Gener. Comput. Syst., 2017

Building the Internet of Things with bluetooth smart.
Ad Hoc Networks, 2017

Protecting Glossy-Based Wireless Networks from Packet Injection Attacks.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Blockchain and IoT: Mind the Gap.
Proceedings of the Interoperability, Safety and Security in IoT, 2017

Lightweight X.509 Digital Certificates for the Internet of Things.
Proceedings of the Interoperability, Safety and Security in IoT, 2017

Intrusion Detection in the RPL-connected 6LoWPAN Networks.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017

2016
S3K: Scalable Security With Symmetric Keys - DTLS Key Establishment for the Internet of Things.
IEEE Trans Autom. Sci. Eng., 2016

Fusion: coalesced confidential storage and communication framework for the IoT.
Secur. Commun. Networks, 2016

2015
An experimental study of attacks on the availability of Glossy.
Comput. Electr. Eng., 2015

Bluetooth smart: An enabling technology for the Internet of Things.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

BSD-based elliptic curve cryptography for the open Internet of Things.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

2014
Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN.
Secur. Commun. Networks, 2014

Delegation-based authentication and authorization for the IP-based Internet of Things.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

2013
Lightweight Security Solutions for the Internet of Things.
PhD thesis, 2013

Routing Attacks and Countermeasures in the RPL-Based Internet of Things.
Int. J. Distributed Sens. Networks, 2013

SVELTE: Real-time intrusion detection in the Internet of Things.
Ad Hoc Networks, 2013

Combined secure storage and communication for the Internet of Things.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

2012
Codo: confidential data storage for wireless sensor networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

6LoWPAN Compressed DTLS for CoAP.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

2011
Demo abstract: Securing communication in 6LoWPAN with compressed IPsec.
Proceedings of the Distributed Computing in Sensor Systems, 2011

Securing communication in 6LoWPAN with compressed IPsec.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2009
Design and Implementation of a Security Manager for WirelessHART Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Accurate Power Profiling of Sensornets with the COOJA/MSPSim Simulator.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Security Considerations for the WirelessHART Protocol.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009


  Loading...