Search dblp for Publications

export results for "Razvi Doomun"

 download as .bib file

@article{DBLP:journals/scn/HayajnehDAM20,
  author       = {Thaier Hayajneh and
                  Razvi Doomun and
                  Ghada Almashaqbeh and
                  Bassam Jamil Mohd},
  title        = {Erratum to "An Energy-Efficient and Security Aware Route Selection
                  Protocol for Wireless Sensor Networks"},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {4093210:1--4093210:1},
  year         = {2020}
}
@article{DBLP:journals/scn/HayajnehDAM14,
  author       = {Thaier Hayajneh and
                  Razvi Doomun and
                  Ghada A. Al{-}Mashaqbeh and
                  Bassam Jamil Mohd},
  title        = {An energy-efficient and security aware route selection protocol for
                  wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {2015--2038},
  year         = {2014}
}
@article{DBLP:journals/corr/JungumDGP14,
  author       = {Nevin Vunka Jungum and
                  Razvi Doomun and
                  Soulakshmee D. Ghurbhurrun and
                  Sameerchand Pudaruth},
  title        = {Collaborative Driving Support System in Mobile Pervasive Environments},
  journal      = {CoRR},
  volume       = {abs/1405.6218},
  year         = {2014}
}
@article{DBLP:journals/corr/abs-1208-1574,
  author       = {Zaafir Barahim and
                  M. Razvi Doomun and
                  Nazrana Joomun},
  title        = {Low-Cost Bluetooth Mobile Positioning for Location-based Application},
  journal      = {CoRR},
  volume       = {abs/1208.1574},
  year         = {2012}
}
@article{DBLP:journals/corr/abs-1208-2305,
  author       = {M. Razvi Doomun and
                  K. M. Sunjiv Soyjaudah},
  title        = {{LOTKIP:} Low Overhead {TKIP} Optimization for Ad Hoc Wireless Network},
  journal      = {CoRR},
  volume       = {abs/1208.2305},
  year         = {2012}
}
@article{DBLP:journals/corr/abs-1208-3227,
  author       = {Razvi Doomun and
                  Jayramsingh Doma and
                  Sundeep Tengur},
  title        = {{AES-CBC} Software Execution Optimization},
  journal      = {CoRR},
  volume       = {abs/1208.3227},
  year         = {2012}
}
@article{DBLP:journals/corr/abs-1208-3576,
  author       = {Zadia Codabux{-}Rossan and
                  M. Razvi Doomun},
  title        = {{AES} {CCMP} Algorithm with N-Way Interleaved Cipher Block Chaining},
  journal      = {CoRR},
  volume       = {abs/1208.3576},
  year         = {2012}
}
@article{DBLP:journals/corr/abs-1208-5569,
  author       = {M. Razvi Doomun and
                  K. M. Sunjiv Soyjaudah},
  title        = {Route Extrapolation for Source and Destination Camouflage in Wireless
                  Ad Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/1208.5569},
  year         = {2012}
}
@article{DBLP:journals/corr/abs-1208-5571,
  author       = {M. Razvi Doomun and
                  K. M. Sunjiv Soyjaudah},
  title        = {Modified Temporal Key Integrity Protocol For Efficient Wireless Network
                  Security},
  journal      = {CoRR},
  volume       = {abs/1208.5571},
  year         = {2012}
}
@article{DBLP:journals/corr/abs-1212-1284,
  author       = {M. N. Hulkury and
                  M. Razvi Doomun},
  title        = {Integrated Green Cloud Computing Architecture},
  journal      = {CoRR},
  volume       = {abs/1212.1284},
  year         = {2012}
}
@article{DBLP:journals/scn/HayajnehDKT11,
  author       = {Thaier Hayajneh and
                  Razvi Doomun and
                  Prashant Krishnamurthy and
                  David Tipper},
  title        = {Source - destination obfuscation in wireless \emph{ad hoc}networks},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {8},
  pages        = {888--901},
  year         = {2011}
}
@inproceedings{DBLP:conf/icccn/DoomunS10,
  author       = {M. Razvi Doomun and
                  K. M. Sunjiv Soyjaudah},
  title        = {Route Extrapolation for Source and Destination Camouflage in Wireless
                  Ad Hoc Networks},
  booktitle    = {{ICCCN}},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010}
}
@article{DBLP:journals/corr/abs-1003-2677,
  author       = {Razvi Doomun and
                  Lollmahamod N. and
                  Auleear Nadeem and
                  Mozafar Aukin},
  title        = {Classified Ads Harvesting Agent and Notification System},
  journal      = {CoRR},
  volume       = {abs/1003.2677},
  year         = {2010}
}
@article{DBLP:journals/ijnsec/DoomunS09,
  author       = {M. Razvi Doomun and
                  K. M. S. Soyjaudah},
  title        = {Analytical Comparison of Cryptographic Techniques for Resource-constrained
                  Wireless Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {82--94},
  year         = {2009}
}
@inproceedings{DBLP:conf/iscc/DoomunHKT09,
  author       = {Razvi Doomun and
                  Thaier Hayajneh and
                  Prashant Krishnamurthy and
                  David Tipper},
  title        = {{SECLOUD:} Source and Destination Seclusion Using Clouds for wireless
                  ad hoc networks},
  booktitle    = {{ISCC}},
  pages        = {361--367},
  publisher    = {{IEEE} Computer Society},
  year         = {2009}
}
@article{DBLP:journals/bpmj/Doomun08,
  author       = {M. Razvi Doomun},
  title        = {Multi-level information system security in outsourcing domain},
  journal      = {Bus. Process. Manag. J.},
  volume       = {14},
  number       = {6},
  pages        = {849--857},
  year         = {2008}
}
@article{DBLP:journals/bpmj/DoomunJ08,
  author       = {Razvi Doomun and
                  Nevin Vunka Jungum},
  title        = {Business process modelling, simulation and reengineering: call centres},
  journal      = {Bus. Process. Manag. J.},
  volume       = {14},
  number       = {6},
  pages        = {838--848},
  year         = {2008}
}
@inproceedings{DBLP:conf/cisse/BeeputhDD08,
  author       = {Amit K. Beeputh and
                  M. Razvi Doomun and
                  Padaruth Dookee},
  title        = {Energy-Security Adaptation Scheme of Block Cipher Mode of Operations},
  booktitle    = {{SCSS} {(1)}},
  pages        = {73--78},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/cisse/Codabux-RossanD08,
  author       = {Zadia Codabux{-}Rossan and
                  M. Razvi Doomun},
  title        = {Perfromance of Interleaved Cipher Block Chaining in {CCMP}},
  booktitle    = {TeNe},
  pages        = {53--58},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/aict/DoomunS07,
  author       = {M. Razvi Doomun and
                  K. M. S. Soyjaudah},
  title        = {Adaptive {IEEE} 802.11i Security for Energy-Security Optimization},
  booktitle    = {{AICT}},
  pages        = {38},
  publisher    = {{IEEE} Computer Society},
  year         = {2007}
}
@inproceedings{DBLP:conf/secrypt/DoomunS07,
  author       = {M. Razvi Doomun and
                  K. M. Sunjiv Soyjaudah},
  title        = {Modified Temporal Key Integrity Protocol for Efficient Wireless Network
                  Security},
  booktitle    = {{SECRYPT}},
  pages        = {151--156},
  publisher    = {{INSTICC} Press},
  year         = {2007}
}