Syed Taha Ali

Orcid: 0000-0002-0397-4332

According to our database1, Syed Taha Ali authored at least 31 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cerberus: A Blockchain-Based Accreditation and Degree Verification System.
IEEE Trans. Comput. Soc. Syst., August, 2023

Merging engine implementation for intra-frame sharing in multi-tenant virtual passive optical networks.
JOCN, 2023

Hyper Metamorphism: Hyper Secure and Trustworthy 5G Networks using Blockchain with IoT.
Proceedings of the International Conference on Frontiers of Information Technology, 2023

2022
End-to-end verifiable voting for developing countries - what's hard in Lausanne is harder still in Lahore.
CoRR, 2022

2021
Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing Devices.
IEEE Trans. Dependable Secur. Comput., 2021

A First Look at Private Communications in Video Games using Visual Features.
Proc. Priv. Enhancing Technol., 2021

2020
Forensic Verification of Health Data From Wearable Devices Using Anonymous Witnesses.
IEEE Internet Things J., 2020

2019
Pakistan's Internet Voting Experiment.
CoRR, 2019

2018
ZombieCoin 2.0: managing next-generation botnets using Bitcoin.
Int. J. Inf. Sec., 2018

Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough.
Proceedings of the Security Protocols XXVI, 2018

2017
The Nuts and Bolts of Micropayments: A Survey.
CoRR, 2017

End to End Security is Not Enough.
Proceedings of the Security Protocols XXV, 2017

2016
An Overview of End-to-End Verifiable Voting Systems.
CoRR, 2016

2015
A Survey of Securing Networks Using Software Defined Networking.
IEEE Trans. Reliab., 2015

Greening Residential Wi-Fi Networks under Centralized Control.
IEEE Trans. Mob. Comput., 2015

Bitcoin: Perils of an Unregulated Global P2P Currency.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

ZombieCoin: Powering Next-Generation Botnets with Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices.
IEEE Trans. Mob. Comput., 2014

Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints.
IEEE Trans. Inf. Forensics Secur., 2014

Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring.
Future Gener. Comput. Syst., 2014

2013
Securing data provenance in body area networks using lightweight wireless link fingerprints.
Proceedings of the TrustED'13, 2013

2012
Zero reconciliation secret key generation for body-worn health monitoring devices.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Authentication of lossy data in body-sensor networks for healthcare monitoring.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Decorrelating secret bit extraction via channel hopping in body area networks.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

2011
Security mechanisms for body sensor networks.
PhD thesis, 2011

Improving secret key generation performance for on-body devices.
Proceedings of the 6th International Conference on Body Area Networks, 2011

2010
Secure key loss recovery for network broadcast in single-hop wireless sensor networks.
Ad Hoc Networks, 2010

Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
A Per-Hop Security Scheme for Highly Dynamic Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2008
A key loss recovery scheme for secure broadcasts in wireless sensor networks.
Proceedings of the IEEE 19th International Symposium on Personal, 2008


  Loading...