Search dblp for Publications

export results for "Razvi Doomun"

 download as .bib file

@article{DBLP:journals/scn/HayajnehDAM20,
  author       = {Thaier Hayajneh and
                  Razvi Doomun and
                  Ghada Almashaqbeh and
                  Bassam Jamil Mohd},
  title        = {Erratum to "An Energy-Efficient and Security Aware Route Selection
                  Protocol for Wireless Sensor Networks"},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {4093210:1--4093210:1},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/4093210},
  doi          = {10.1155/2020/4093210},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HayajnehDAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HayajnehDAM14,
  author       = {Thaier Hayajneh and
                  Razvi Doomun and
                  Ghada A. Al{-}Mashaqbeh and
                  Bassam Jamil Mohd},
  title        = {An energy-efficient and security aware route selection protocol for
                  wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {2015--2038},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.915},
  doi          = {10.1002/SEC.915},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HayajnehDAM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JungumDGP14,
  author       = {Nevin Vunka Jungum and
                  Razvi Doomun and
                  Soulakshmee D. Ghurbhurrun and
                  Sameerchand Pudaruth},
  title        = {Collaborative Driving Support System in Mobile Pervasive Environments},
  journal      = {CoRR},
  volume       = {abs/1405.6218},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.6218},
  eprinttype    = {arXiv},
  eprint       = {1405.6218},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JungumDGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-1574,
  author       = {Zaafir Barahim and
                  M. Razvi Doomun and
                  Nazrana Joomun},
  title        = {Low-Cost Bluetooth Mobile Positioning for Location-based Application},
  journal      = {CoRR},
  volume       = {abs/1208.1574},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.1574},
  eprinttype    = {arXiv},
  eprint       = {1208.1574},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-1574.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-2305,
  author       = {M. Razvi Doomun and
                  K. M. Sunjiv Soyjaudah},
  title        = {{LOTKIP:} Low Overhead {TKIP} Optimization for Ad Hoc Wireless Network},
  journal      = {CoRR},
  volume       = {abs/1208.2305},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.2305},
  eprinttype    = {arXiv},
  eprint       = {1208.2305},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-2305.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-3227,
  author       = {Razvi Doomun and
                  Jayramsingh Doma and
                  Sundeep Tengur},
  title        = {{AES-CBC} Software Execution Optimization},
  journal      = {CoRR},
  volume       = {abs/1208.3227},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.3227},
  eprinttype    = {arXiv},
  eprint       = {1208.3227},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-3227.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-3576,
  author       = {Zadia Codabux{-}Rossan and
                  M. Razvi Doomun},
  title        = {{AES} {CCMP} Algorithm with N-Way Interleaved Cipher Block Chaining},
  journal      = {CoRR},
  volume       = {abs/1208.3576},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.3576},
  eprinttype    = {arXiv},
  eprint       = {1208.3576},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-3576.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-5569,
  author       = {M. Razvi Doomun and
                  K. M. Sunjiv Soyjaudah},
  title        = {Route Extrapolation for Source and Destination Camouflage in Wireless
                  Ad Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/1208.5569},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.5569},
  eprinttype    = {arXiv},
  eprint       = {1208.5569},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-5569.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-5571,
  author       = {M. Razvi Doomun and
                  K. M. Sunjiv Soyjaudah},
  title        = {Modified Temporal Key Integrity Protocol For Efficient Wireless Network
                  Security},
  journal      = {CoRR},
  volume       = {abs/1208.5571},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.5571},
  eprinttype    = {arXiv},
  eprint       = {1208.5571},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-5571.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1212-1284,
  author       = {M. N. Hulkury and
                  M. Razvi Doomun},
  title        = {Integrated Green Cloud Computing Architecture},
  journal      = {CoRR},
  volume       = {abs/1212.1284},
  year         = {2012},
  url          = {http://arxiv.org/abs/1212.1284},
  eprinttype    = {arXiv},
  eprint       = {1212.1284},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1212-1284.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HayajnehDKT11,
  author       = {Thaier Hayajneh and
                  Razvi Doomun and
                  Prashant Krishnamurthy and
                  David Tipper},
  title        = {Source - destination obfuscation in wireless \emph{ad hoc}networks},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {8},
  pages        = {888--901},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.220},
  doi          = {10.1002/SEC.220},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HayajnehDKT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/DoomunS10,
  author       = {M. Razvi Doomun and
                  K. M. Sunjiv Soyjaudah},
  title        = {Route Extrapolation for Source and Destination Camouflage in Wireless
                  Ad Hoc Networks},
  booktitle    = {Proceedings of the 19th International Conference on Computer Communications
                  and Networks, {IEEE} {ICCCN} 2010, Z{\"{u}}rich, Switzerland,
                  August 2-5, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICCCN.2010.5560088},
  doi          = {10.1109/ICCCN.2010.5560088},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/DoomunS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1003-2677,
  author       = {Razvi Doomun and
                  Lollmahamod N. and
                  Auleear Nadeem and
                  Mozafar Aukin},
  title        = {Classified Ads Harvesting Agent and Notification System},
  journal      = {CoRR},
  volume       = {abs/1003.2677},
  year         = {2010},
  url          = {http://arxiv.org/abs/1003.2677},
  eprinttype    = {arXiv},
  eprint       = {1003.2677},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1003-2677.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DoomunS09,
  author       = {M. Razvi Doomun and
                  K. M. S. Soyjaudah},
  title        = {Analytical Comparison of Cryptographic Techniques for Resource-constrained
                  Wireless Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {82--94},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v9-n1/ijns-2009-v9-n1-p82-94.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DoomunS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/DoomunHKT09,
  author       = {Razvi Doomun and
                  Thaier Hayajneh and
                  Prashant Krishnamurthy and
                  David Tipper},
  title        = {{SECLOUD:} Source and Destination Seclusion Using Clouds for wireless
                  ad hoc networks},
  booktitle    = {Proceedings of the 14th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2009), July 5-8, Sousse, Tunisia},
  pages        = {361--367},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISCC.2009.5202367},
  doi          = {10.1109/ISCC.2009.5202367},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/DoomunHKT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bpmj/Doomun08,
  author       = {M. Razvi Doomun},
  title        = {Multi-level information system security in outsourcing domain},
  journal      = {Bus. Process. Manag. J.},
  volume       = {14},
  number       = {6},
  pages        = {849--857},
  year         = {2008},
  url          = {https://doi.org/10.1108/14637150810916026},
  doi          = {10.1108/14637150810916026},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bpmj/Doomun08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bpmj/DoomunJ08,
  author       = {Razvi Doomun and
                  Nevin Vunka Jungum},
  title        = {Business process modelling, simulation and reengineering: call centres},
  journal      = {Bus. Process. Manag. J.},
  volume       = {14},
  number       = {6},
  pages        = {838--848},
  year         = {2008},
  url          = {https://doi.org/10.1108/14637150810916017},
  doi          = {10.1108/14637150810916017},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bpmj/DoomunJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisse/BeeputhDD08,
  author       = {Amit K. Beeputh and
                  M. Razvi Doomun and
                  Padaruth Dookee},
  editor       = {Tarek M. Sobh},
  title        = {Energy-Security Adaptation Scheme of Block Cipher Mode of Operations},
  booktitle    = {Innovations and Advances in Computer Sciences and Engineering, Volume
                  {I} of the proceedings of the 2008 International Conference on Systems,
                  Computing Sciences and Software Engineering (SCSS), part of the International
                  Joint Conferences on Computer, Information, and Systems Sciences,
                  and Engineering, {CISSE} 2008, Bridgeport, Connecticut, {USA}},
  pages        = {73--78},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-90-481-3658-2\_13},
  doi          = {10.1007/978-90-481-3658-2\_13},
  timestamp    = {Fri, 02 Jun 2017 20:48:01 +0200},
  biburl       = {https://dblp.org/rec/conf/cisse/BeeputhDD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisse/Codabux-RossanD08,
  author       = {Zadia Codabux{-}Rossan and
                  M. Razvi Doomun},
  editor       = {Tarek M. Sobh and
                  Khaled M. Elleithy and
                  Ausif Mahmood},
  title        = {Perfromance of Interleaved Cipher Block Chaining in {CCMP}},
  booktitle    = {Novel Algorithms and Techniques in Telecommunications and Networking,
                  proceedings of the 2008 International Conference on Telecommunications
                  and Networking (TeNe), part of the International Joint Conferences
                  on Computer, Information, and Systems Sciences, and Engineering, {CISSE}
                  2008, Bridgeport, Connecticut, {USA}},
  pages        = {53--58},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-90-481-3662-9\_9},
  doi          = {10.1007/978-90-481-3662-9\_9},
  timestamp    = {Tue, 29 Dec 2020 18:38:51 +0100},
  biburl       = {https://dblp.org/rec/conf/cisse/Codabux-RossanD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aict/DoomunS07,
  author       = {M. Razvi Doomun and
                  K. M. S. Soyjaudah},
  title        = {Adaptive {IEEE} 802.11i Security for Energy-Security Optimization},
  booktitle    = {Third Advanced International Conference on Telecommunications {(AICT}
                  2007), May 13-19, 2007, Mauritius},
  pages        = {38},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AICT.2007.3},
  doi          = {10.1109/AICT.2007.3},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aict/DoomunS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DoomunS07,
  author       = {M. Razvi Doomun and
                  K. M. Sunjiv Soyjaudah},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Modified Temporal Key Integrity Protocol for Efficient Wireless Network
                  Security},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {151--156},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DoomunS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics