Sk. Md. Mizanur Rahman

Orcid: 0000-0002-9166-6830

According to our database1, Sk. Md. Mizanur Rahman authored at least 61 papers between 2006 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Decentralized Blockchain-based model for Edge Computing.
CoRR, 2021

Levenberg-Marquardt Backpropagation for Numerical Treatment of Micropolar Flow in a Porous Channel with Mass Injection.
Complex., 2021

Intelligent Malaysian Sign Language Translation System Using Convolutional-Based Attention Module with Residual Network.
Comput. Intell. Neurosci., 2021

2020
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing.
IEEE Access, 2020

2019
Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment.
IEEE Access, 2019

2018
Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks.
IEEE Trans. Ind. Informatics, 2018

Simultaneously aided diagnosis model for outpatient departments via healthcare big data analytics.
Multim. Tools Appl., 2018

An efficient key agreement protocol for Sybil-precaution in online social networks.
Future Gener. Comput. Syst., 2018

A prediction system of Sybil attack in social network using deep-regression model.
Future Gener. Comput. Syst., 2018

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks.
Concurr. Comput. Pract. Exp., 2018

An Annotation Technique for In-Home Smart Monitoring Environments.
IEEE Access, 2018

Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol.
IEEE Access, 2018

2017
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud.
J. Signal Process. Syst., 2017

Exploiting Energy Efficient Emotion-Aware Mobile Computing.
Mob. Networks Appl., 2017

A software defined network routing in wireless multihop network.
J. Netw. Comput. Appl., 2017

TOLA: Topic-oriented learning assistance based on cyber-physical system and big data.
Future Gener. Comput. Syst., 2017

A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filter.
Concurr. Comput. Pract. Exp., 2017

α-Overlapping area coverage for clustered directional sensor networks.
Comput. Commun., 2017

Smart Health Solution Integrating IoT and Cloud: A Case Study of Voice Pathology Monitoring.
IEEE Commun. Mag., 2017

A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography.
IEEE Access, 2017

Situation Awareness in Ambient Assisted Living for Smart Healthcare.
IEEE Access, 2017

Sybil Defense Techniques in Online Social Networks: A Survey.
IEEE Access, 2017

Privacy Analysis of Smart City Healthcare Services.
Proceedings of the 19th IEEE International Symposium on Multimedia, 2017

A mathematical and simulation model on stability and parameters of multi-equilibrium points in CNNs.
Proceedings of the 16th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2017

2016
From sensing to alerting: a pathway of RESTstful messaging in ambient assisted living.
IEEE Wirel. Commun., 2016

Toward end-to-end biomet rics-based security for IoT infrastructure.
IEEE Wirel. Commun., 2016

Privacy preserving secure data exchange in mobile P2P cloud healthcare environment.
Peer-to-Peer Netw. Appl., 2016

Cloud-Assisted Mood Fatigue Detection System.
Mob. Networks Appl., 2016

Towards Interactive Medical Content Delivery Between Simulated Body Sensor Networks and Practical Data Center.
J. Medical Syst., 2016

Secure privacy vault design for distributed multimedia surveillance system.
Future Gener. Comput. Syst., 2016

Quality-of-service-aware weighted-fair medium access control protocol for coexisting cognitive radio networks.
EURASIP J. Wirel. Commun. Netw., 2016

QoS and trust-aware coalition formation game in data-intensive cloud federations.
Concurr. Comput. Pract. Exp., 2016

Multiple Disease Risk Assessment With Uniform Model Based on Medical Clinical Notes.
IEEE Access, 2016

2015
Security, Privacy, and Applications in Mobile Healthcare.
Int. J. Distributed Sens. Networks, 2015

PKE-AET: Public Key Encryption with Authorized Equality Test.
Comput. J., 2015

A Multistage Credibility Analysis Model for Microblogs.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions.
Inf. Technol. Control., 2014

Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks.
Proceedings of the 2014 IEEE International Symposium on Multimedia, 2014

A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network.
Proceedings of the 2014 IEEE International Symposium on Multimedia, 2014

Spectrum and energy aware multipath routing for cognitive radio ad hoc networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Towards integrity protection of software for e-health data.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014

2013
Towards Privacy Preserving Multimedia Surveillance System: A Secure Privacy Vault Design.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

2012
Chaos-cryptography based privacy preservation technique for video surveillance.
Multim. Syst., 2012

2011
Cryptographic security models for eHealth P2P database management systems network.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Improving security and usability of low cost RFID tags.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Proposal and Evaluation of a Dynamic Resource Allocation Method Based on the Load of VMs on IaaS.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Session-wise private data exchange in eHealth peer-to-peer database management systems.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

2010
Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve.
Wirel. Commun. Mob. Comput., 2010

Corrigendum to "Private key agreement and secure communication for heterogeneous sensor networks" [J. Parallel Distrib. Comput 70 (2010) 858-870].
J. Parallel Distributed Comput., 2010

Private key agreement and secure communication for heterogeneous sensor networks.
J. Parallel Distributed Comput., 2010

Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems.
IACR Cryptol. ePrint Arch., 2010

Reliability model for extending cluster lifetime using Backup Cluster Heads in cluster-based Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

A real-time privacy-sensitive data hiding approach based on chaos cryptography.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Credible-BGP: A Hybrid Cryptosystem to Secure BGP.
Proceedings of the Global Communications Conference, 2010

2009
Secure Anonymous Communication for Wireless Sensor Networks Based on Pairing over Elliptic Curves.
J. Interconnect. Networks, 2009

2008
Anonymous authentication and secure communication protocol for wireless mobile <i>ad hoc</i> networks.
Secur. Commun. Networks, 2008

Identity and Pairing-Based Secure Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Private Communication and Authentication Protocol for Wireless Sensor Networks.
Proceedings of the NTMS 2008, 2008

Pairing-Based Secure Timing Synchronization for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2006
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks.
IACR Cryptol. ePrint Arch., 2006

An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks.
Proceedings of the 2006 International Symposium on Applications and the Internet (SAINT 2006), 2006


  Loading...