default search action
Search dblp for Publications
export results for "Razvi Doomun"
@article{DBLP:journals/scn/HayajnehDAM20, author = {Thaier Hayajneh and Razvi Doomun and Ghada Almashaqbeh and Bassam Jamil Mohd}, title = {Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks"}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {4093210:1--4093210:1}, year = {2020} }
@article{DBLP:journals/scn/HayajnehDAM14, author = {Thaier Hayajneh and Razvi Doomun and Ghada A. Al{-}Mashaqbeh and Bassam Jamil Mohd}, title = {An energy-efficient and security aware route selection protocol for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {2015--2038}, year = {2014} }
@article{DBLP:journals/corr/JungumDGP14, author = {Nevin Vunka Jungum and Razvi Doomun and Soulakshmee D. Ghurbhurrun and Sameerchand Pudaruth}, title = {Collaborative Driving Support System in Mobile Pervasive Environments}, journal = {CoRR}, volume = {abs/1405.6218}, year = {2014} }
@article{DBLP:journals/corr/abs-1208-1574, author = {Zaafir Barahim and M. Razvi Doomun and Nazrana Joomun}, title = {Low-Cost Bluetooth Mobile Positioning for Location-based Application}, journal = {CoRR}, volume = {abs/1208.1574}, year = {2012} }
@article{DBLP:journals/corr/abs-1208-2305, author = {M. Razvi Doomun and K. M. Sunjiv Soyjaudah}, title = {{LOTKIP:} Low Overhead {TKIP} Optimization for Ad Hoc Wireless Network}, journal = {CoRR}, volume = {abs/1208.2305}, year = {2012} }
@article{DBLP:journals/corr/abs-1208-3227, author = {Razvi Doomun and Jayramsingh Doma and Sundeep Tengur}, title = {{AES-CBC} Software Execution Optimization}, journal = {CoRR}, volume = {abs/1208.3227}, year = {2012} }
@article{DBLP:journals/corr/abs-1208-3576, author = {Zadia Codabux{-}Rossan and M. Razvi Doomun}, title = {{AES} {CCMP} Algorithm with N-Way Interleaved Cipher Block Chaining}, journal = {CoRR}, volume = {abs/1208.3576}, year = {2012} }
@article{DBLP:journals/corr/abs-1208-5569, author = {M. Razvi Doomun and K. M. Sunjiv Soyjaudah}, title = {Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks}, journal = {CoRR}, volume = {abs/1208.5569}, year = {2012} }
@article{DBLP:journals/corr/abs-1208-5571, author = {M. Razvi Doomun and K. M. Sunjiv Soyjaudah}, title = {Modified Temporal Key Integrity Protocol For Efficient Wireless Network Security}, journal = {CoRR}, volume = {abs/1208.5571}, year = {2012} }
@article{DBLP:journals/corr/abs-1212-1284, author = {M. N. Hulkury and M. Razvi Doomun}, title = {Integrated Green Cloud Computing Architecture}, journal = {CoRR}, volume = {abs/1212.1284}, year = {2012} }
@article{DBLP:journals/scn/HayajnehDKT11, author = {Thaier Hayajneh and Razvi Doomun and Prashant Krishnamurthy and David Tipper}, title = {Source - destination obfuscation in wireless \emph{ad hoc}networks}, journal = {Secur. Commun. Networks}, volume = {4}, number = {8}, pages = {888--901}, year = {2011} }
@inproceedings{DBLP:conf/icccn/DoomunS10, author = {M. Razvi Doomun and K. M. Sunjiv Soyjaudah}, title = {Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks}, booktitle = {{ICCCN}}, pages = {1--7}, publisher = {{IEEE}}, year = {2010} }
@article{DBLP:journals/corr/abs-1003-2677, author = {Razvi Doomun and Lollmahamod N. and Auleear Nadeem and Mozafar Aukin}, title = {Classified Ads Harvesting Agent and Notification System}, journal = {CoRR}, volume = {abs/1003.2677}, year = {2010} }
@article{DBLP:journals/ijnsec/DoomunS09, author = {M. Razvi Doomun and K. M. S. Soyjaudah}, title = {Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security}, journal = {Int. J. Netw. Secur.}, volume = {9}, number = {1}, pages = {82--94}, year = {2009} }
@inproceedings{DBLP:conf/iscc/DoomunHKT09, author = {Razvi Doomun and Thaier Hayajneh and Prashant Krishnamurthy and David Tipper}, title = {{SECLOUD:} Source and Destination Seclusion Using Clouds for wireless ad hoc networks}, booktitle = {{ISCC}}, pages = {361--367}, publisher = {{IEEE} Computer Society}, year = {2009} }
@article{DBLP:journals/bpmj/Doomun08, author = {M. Razvi Doomun}, title = {Multi-level information system security in outsourcing domain}, journal = {Bus. Process. Manag. J.}, volume = {14}, number = {6}, pages = {849--857}, year = {2008} }
@article{DBLP:journals/bpmj/DoomunJ08, author = {Razvi Doomun and Nevin Vunka Jungum}, title = {Business process modelling, simulation and reengineering: call centres}, journal = {Bus. Process. Manag. J.}, volume = {14}, number = {6}, pages = {838--848}, year = {2008} }
@inproceedings{DBLP:conf/cisse/BeeputhDD08, author = {Amit K. Beeputh and M. Razvi Doomun and Padaruth Dookee}, title = {Energy-Security Adaptation Scheme of Block Cipher Mode of Operations}, booktitle = {{SCSS} {(1)}}, pages = {73--78}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/cisse/Codabux-RossanD08, author = {Zadia Codabux{-}Rossan and M. Razvi Doomun}, title = {Perfromance of Interleaved Cipher Block Chaining in {CCMP}}, booktitle = {TeNe}, pages = {53--58}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/aict/DoomunS07, author = {M. Razvi Doomun and K. M. S. Soyjaudah}, title = {Adaptive {IEEE} 802.11i Security for Energy-Security Optimization}, booktitle = {{AICT}}, pages = {38}, publisher = {{IEEE} Computer Society}, year = {2007} }
@inproceedings{DBLP:conf/secrypt/DoomunS07, author = {M. Razvi Doomun and K. M. Sunjiv Soyjaudah}, title = {Modified Temporal Key Integrity Protocol for Efficient Wireless Network Security}, booktitle = {{SECRYPT}}, pages = {151--156}, publisher = {{INSTICC} Press}, year = {2007} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.