default search action
Sk. Md. Mizanur Rahman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j40]Rehman Ullah Khan, Hizbullah Khattak, Woei Sheng Wong, Hussain AlSalman, Mogeeb A. A. Mosleh, Sk. Md. Mizanur Rahman:
Intelligent Malaysian Sign Language Translation System Using Convolutional-Based Attention Module with Residual Network. Comput. Intell. Neurosci. 2021: 9023010:1-9023010:12 (2021) - [j39]Hakeem Ullah, Imran Khan, Hussain AlSalman, Saeed Islam, Muhammad Asif Zahoor Raja, Muhammad Shoaib, Abdu Gumaei, Mehreen Fiza, Kashif Ullah, Sk. Md. Mizanur Rahman, Muhammad Ayaz:
Levenberg-Marquardt Backpropagation for Numerical Treatment of Micropolar Flow in a Porous Channel with Mass Injection. Complex. 2021: 5337589:1-5337589:12 (2021) - 2020
- [j38]Raylin Tso, Kaibin Huang, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Tsu-Yang Wu:
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing. IEEE Access 8: 152551-152564 (2020) - 2019
- [j37]Shaheena Khatoon, Sk. Md. Mizanur Rahman, Majed A. AlRubaian, Atif Alamri:
Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment. IEEE Access 7: 47962-47971 (2019) - 2018
- [j36]Mohammed G. H. al Zamil, Majdi Rawashdeh, Samer Samarah, M. Shamim Hossain, Awny Alnusair, Sk. Md. Mizanur Rahman:
An Annotation Technique for In-Home Smart Monitoring Environments. IEEE Access 6: 1471-1479 (2018) - [j35]Mada Alhaidary, Sk. Md. Mizanur Rahman, Mohammed Zakariah, M. Shamim Hossain, Atif Alamri, Md Sarwar Morshedul Haque, Brij B. Gupta:
Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol. IEEE Access 6: 6071-6081 (2018) - [j34]Muhammad Al-Qurishi, Sk. Md. Mizanur Rahman, Atif Alamri, Mohamed A. Mostafa, Majed A. AlRubaian, M. Shamim Hossain, Brij B. Gupta:
SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j33]Muhammad Al-Qurishi, Sk. Md. Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, Majed A. AlRubaian, Atif Alamri, Mabrook Al-Rakhami, Brij B. Gupta:
An efficient key agreement protocol for Sybil-precaution in online social networks. Future Gener. Comput. Syst. 84: 139-148 (2018) - [j32]Muhammad Al-Qurishi, Majed A. AlRubaian, Sk. Md. Mizanur Rahman, Atif Alamri, Mohammad Mehedi Hassan:
A prediction system of Sybil attack in social network using deep-regression model. Future Gener. Comput. Syst. 87: 743-753 (2018) - [j31]Ying Hu, Kui Duan, Yin Zhang, M. Shamim Hossain, Sk. Md. Mizanur Rahman, Abdulhameed Alelaiwi:
Simultaneously aided diagnosis model for outpatient departments via healthcare big data analytics. Multim. Tools Appl. 77(3): 3729-3743 (2018) - [j30]Muhammad Al-Qurishi, M. Shamim Hossain, Majed A. AlRubaian, Sk. Md. Mizanur Rahman, Atif Alamri:
Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks. IEEE Trans. Ind. Informatics 14(2): 799-813 (2018) - 2017
- [j29]Muhammad Al-Qurishi, Mabrook Al-Rakhami, Atif Alamri, Majed A. AlRubaian, Sk. Md. Mizanur Rahman, M. Shamim Hossain:
Sybil Defense Techniques in Online Social Networks: A Survey. IEEE Access 5: 1200-1219 (2017) - [j28]Mashail N. Alkhomsan, M. Anwar Hossain, Sk. Md. Mizanur Rahman, Mehedi Masud:
Situation Awareness in Ambient Assisted Living for Smart Healthcare. IEEE Access 5: 20716-20725 (2017) - [j27]Hadeal Abdulaziz Al Hamid, Sk. Md. Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, Atif Alamri:
A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography. IEEE Access 5: 22313-22328 (2017) - [j26]Ghulam Muhammad, Sk. Md. Mizanur Rahman, Abdulhameed Alelaiwi, Atif Alamri:
Smart Health Solution Integrating IoT and Cloud: A Case Study of Voice Pathology Monitoring. IEEE Commun. Mag. 55(1): 69-73 (2017) - [j25]Selina Sharmin, Fernaz Narin Nur, Md. Abdur Razzaque, Md. Mustafizur Rahman, Abdulhameed Alelaiwi, Mohammad Mehedi Hassan, Sk. Md. Mizanur Rahman:
α-Overlapping area coverage for clustered directional sensor networks. Comput. Commun. 109: 89-103 (2017) - [j24]Abdullah Al-Tariq, Abu Raihan Mostofa Kamal, Md. Abdul Hamid, Mohammad Abdullah-Al-Wadud, Mohammad Mehedi Hassan, Sk. Md. Mizanur Rahman:
A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filter. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j23]Jeungeun Song, Yin Zhang, Kui Duan, M. Shamim Hossain, Sk. Md. Mizanur Rahman:
TOLA: Topic-oriented learning assistance based on cyber-physical system and big data. Future Gener. Comput. Syst. 75: 200-205 (2017) - [j22]Junfeng Wang, Yiming Miao, Ping Zhou, M. Shamim Hossain, Sk. Md. Mizanur Rahman:
A software defined network routing in wireless multihop network. J. Netw. Comput. Appl. 85: 76-83 (2017) - [j21]Yuyang Peng, Limei Peng, Ping Zhou, Jun Yang, Sk. Md. Mizanur Rahman, Ahmad Almogren:
Exploiting Energy Efficient Emotion-Aware Mobile Computing. Mob. Networks Appl. 22(6): 1192-1203 (2017) - [j20]Raylin Tso, Abdulhameed Alelaiwi, Sk. Md. Mizanur Rahman, Mu-En Wu, M. Shamim Hossain:
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud. J. Signal Process. Syst. 89(1): 51-59 (2017) - 2016
- [j19]Xiaobo Shi, Ying Hu, Yin Zhang, Wei Li, Yixue Hao, Abdulhameed Alelaiwi, Sk. Md. Mizanur Rahman, M. Shamim Hossain:
Multiple Disease Risk Assessment With Uniform Model Based on Medical Clinical Notes. IEEE Access 4: 7074-7083 (2016) - [j18]Mohammad Mehedi Hassan, Mohammad Abdullah-Al-Wadud, Ahmad Almogren, Sk. Md. Mizanur Rahman, Abdulhameed Alelaiwi, Atif Alamri, Md. Abdul Hamid:
QoS and trust-aware coalition formation game in data-intensive cloud federations. Concurr. Comput. Pract. Exp. 28(10): 2889-2905 (2016) - [j17]Iffat Anjum, Md. Abdur Razzaque, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Sk. Md. Mizanur Rahman:
Quality-of-service-aware weighted-fair medium access control protocol for coexisting cognitive radio networks. EURASIP J. Wirel. Commun. Netw. 2016: 77 (2016) - [j16]Sk. Md. Mizanur Rahman, M. Anwar Hossain, Mohammad Mehedi Hassan, Atif Alamri, Abdullah S. Alghamdi, Mukaddim Pathan:
Secure privacy vault design for distributed multimedia surveillance system. Future Gener. Comput. Syst. 55: 344-352 (2016) - [j15]Xiaobo Shi, Wei Li, Jeungeun Song, M. Shamim Hossain, Sk. Md. Mizanur Rahman, Abdulhameed Alelaiwi:
Towards Interactive Medical Content Delivery Between Simulated Body Sensor Networks and Practical Data Center. J. Medical Syst. 40(10): 214:1-214:11 (2016) - [j14]Xiaobo Shi, Yixue Hao, Delu Zeng, Lu Wang, M. Shamim Hossain, Sk. Md. Mizanur Rahman, Abdulhameed Alelaiwi:
Cloud-Assisted Mood Fatigue Detection System. Mob. Networks Appl. 21(5): 744-752 (2016) - [j13]Sk. Md. Mizanur Rahman, Md. Mehedi Masud, M. Anwar Hossain, Abdulhameed Alelaiwi, Mohammad Mehedi Hassan, Atif Alamri:
Privacy preserving secure data exchange in mobile P2P cloud healthcare environment. Peer-to-Peer Netw. Appl. 9(5): 894-909 (2016) - [j12]M. Anwar Hossain, Jorge Parra, Sk. Md. Mizanur Rahman, Atif Alamri, Sana Ullah, Hussein T. Mouftah:
From sensing to alerting: a pathway of RESTstful messaging in ambient assisted living. IEEE Wirel. Commun. 23(2): 102-110 (2016) - [j11]M. Shamim Hossain, Ghulam Muhammad, Sk. Md. Mizanur Rahman, Wadood Abdul, Abdulhameed Alelaiwi, Atif Alamri:
Toward end-to-end biomet rics-based security for IoT infrastructure. IEEE Wirel. Commun. 23(5): 44-51 (2016) - 2015
- [j10]Kaibin Huang, Raylin Tso, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Ahmad Almogren, Atif Alamri:
PKE-AET: Public Key Encryption with Authorized Equality Test. Comput. J. 58(10): 2686-2697 (2015) - [j9]Chien-Lung Hsu, Atsuo Inomata, Sk. Md. Mizanur Rahman, Fatos Xhafa, Laurence T. Yang:
Security, Privacy, and Applications in Mobile Healthcare. Int. J. Distributed Sens. Networks 11: 675129:1-675129:2 (2015) - 2014
- [j8]Chien-Lung Hsu, Yu-Hao Chuang, Pei-Ling Tsai, Atif Alamri, Sk. Md. Mizanur Rahman:
Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions. Inf. Technol. Control. 43(4): 381-389 (2014) - 2012
- [j7]Sk. Md. Mizanur Rahman, M. Anwar Hossain, Hussein T. Mouftah, Abdulmotaleb El-Saddik, Eiji Okamoto:
Chaos-cryptography based privacy preservation technique for video surveillance. Multim. Syst. 18(2): 145-155 (2012) - 2010
- [j6]Sk. Md. Mizanur Rahman, Khalil El-Khatib:
Private key agreement and secure communication for heterogeneous sensor networks. J. Parallel Distributed Comput. 70(8): 858-870 (2010) - [j5]Sk. Md. Mizanur Rahman, Khalil El-Khatib:
Corrigendum to "Private key agreement and secure communication for heterogeneous sensor networks" [J. Parallel Distrib. Comput 70 (2010) 858-870]. J. Parallel Distributed Comput. 70(11): 1174 (2010) - [j4]Sk. Md. Mizanur Rahman, Nidal Nasser, Tarik Taleb:
Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve. Wirel. Commun. Mob. Comput. 10(5): 662-671 (2010) - 2009
- [j3]Sk. Md. Mizanur Rahman, Khalil El-Khatib:
Secure Anonymous Communication for Wireless Sensor Networks Based on Pairing over Elliptic Curves. J. Interconnect. Networks 10(4): 459-479 (2009) - 2008
- [j2]Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. Secur. Commun. Networks 1(2): 179-189 (2008) - 2006
- [j1]Sk. Md. Mizanur Rahman, Atsuo Inomata, Masahiro Mambo, Eiji Okamoto:
Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks. Inf. Media Technol. 1(2): 1191-1203 (2006)
Conference and Workshop Papers
- 2017
- [c20]Qi Han, Jun Peng, Sk. Md. Mizanur Rahman, Ahmad Almogran, Atif Alamri, Tengfei Weng, Jin Liu:
A mathematical and simulation model on stability and parameters of multi-equilibrium points in CNNs. IEEE ICCI*CC 2017: 315-318 - [c19]Amjad A. Alghanim, Sk. Md. Mizanur Rahman, M. Anwar Hossain:
Privacy Analysis of Smart City Healthcare Services. ISM 2017: 394-398 - 2015
- [c18]Majed A. AlRubaian, Muhammad Al-Qurishi, Mabrook Al-Rakhami, Sk. Md. Mizanur Rahman, Atif Alamri:
A Multistage Credibility Analysis Model for Microblogs. ASONAM 2015: 1434-1440 - 2014
- [c17]Sk. Md. Mizanur Rahman:
Towards integrity protection of software for e-health data. ICME Workshops 2014: 1-5 - [c16]S. M. Kamruzzaman, Abdullah Sharaf Alghamdi, Sk. Md. Mizanur Rahman:
Spectrum and energy aware multipath routing for cognitive radio ad hoc networks. ICTC 2014: 341-346 - [c15]Sk. Md. Mizanur Rahman, Mohammad Anwar Hossain, Maqsood Mahmud, Muhammad Imran Chaudry, Ahmad Almogren, Mohammed Abdullah Alnuem, Atif Alamri:
A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network. ISM 2014: 387-392 - [c14]Sk. Md. Mizanur Rahman, S. M. Kamruzzaman, Ahmad Almogren, Abdulhameed Alelaiwi, Atif Alamri, Abdullah Sharaf Alghamdi:
Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks. ISM 2014: 393-398 - 2013
- [c13]M. Anwar Hossain, Sk. Md. Mizanur Rahman:
Towards Privacy Preserving Multimedia Surveillance System: A Secure Privacy Vault Design. ISBAST 2013: 280-285 - 2011
- [c12]Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Hussein T. Mouftah, Atsuo Inomata:
Session-wise private data exchange in eHealth peer-to-peer database management systems. ISI 2011: 204-206 - [c11]Atsuo Inomata, Taiki Morikawa, Minoru Ikebe, Yoshihiro Okamoto, Satoru Noguchi, Kazutoshi Fujikawa, Hideki Sunahara, Sk. Md. Mizanur Rahman:
Proposal and Evaluation of a Dynamic Resource Allocation Method Based on the Load of VMs on IaaS. NTMS 2011: 1-6 - [c10]Ali Nur Mohammad Noman, Sk. Md. Mizanur Rahman, Carlisle Adams:
Improving security and usability of low cost RFID tags. PST 2011: 134-141 - [c9]Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto:
Cryptographic security models for eHealth P2P database management systems network. PST 2011: 164-173 - 2010
- [c8]Junaid Israr, Mouhcine Guennoun, Hussein T. Mouftah, Sk. Md. Mizanur Rahman:
Credible-BGP: A Hybrid Cryptosystem to Secure BGP. GLOBECOM 2010: 1-6 - [c7]Sk. Md. Mizanur Rahman, M. Anwar Hossain, Hussein T. Mouftah, Abdulmotaleb El-Saddik, Eiji Okamoto:
A real-time privacy-sensitive data hiding approach based on chaos cryptography. ICME 2010: 72-77 - [c6]Shafiq U. Hashmi, Sk. Md. Mizanur Rahman, Hussein T. Mouftah, Nicolas D. Georganas:
Reliability model for extending cluster lifetime using Backup Cluster Heads in cluster-based Wireless Sensor Networks. WiMob 2010: 479-485 - 2008
- [c5]Sk. Md. Mizanur Rahman, Nidal Nasser, Tarik Taleb:
Pairing-Based Secure Timing Synchronization for Heterogeneous Sensor Networks. GLOBECOM 2008: 148-152 - [c4]Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata:
Private Communication and Authentication Protocol for Wireless Sensor Networks. NTMS 2008: 1-6 - [c3]Sk. Md. Mizanur Rahman, Nidal Nasser, Kassem Saleh:
Identity and Pairing-Based Secure Key Management Scheme for Heterogeneous Sensor Networks. WiMob 2008: 423-428 - 2006
- [c2]Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. ICUCT 2006: 140-149 - [c1]Sk. Md. Mizanur Rahman, Masahiro Mambo, Atsuo Inomata, Eiji Okamoto:
An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks. SAINT 2006: 300-306
Informal and Other Publications
- 2021
- [i3]Mabrook S. Al-Rakhami, Abdu Gumaei, Sk. Md. Mizanur Rahman, Atif Alamri:
Decentralized Blockchain-based model for Edge Computing. CoRR abs/2106.15050 (2021) - 2010
- [i2]Sk. Md. Mizanur Rahman, Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto:
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems. IACR Cryptol. ePrint Arch. 2010: 85 (2010) - 2006
- [i1]Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. IACR Cryptol. ePrint Arch. 2006: 328 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-28 23:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint