Hassan Jameel Asghar
Hassan Jameel Asghar
Macquarie University & Data61, CSIRO
Verified email at data61.csiro.au
Title
Cited by
Cited by
Year
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008
3782008
A trust model for ubiquitous systems based on vectors of trust values
H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee
Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005
1142005
Trust management problem in distributed wireless sensor networks
RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song
12th IEEE International Conference on Embedded and Real-Time Computing …, 2006
882006
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
492010
Towards seamless tracking-free web: Improved detection of trackers via one-class learning
M Ikram, HJ Asghar, MA Kaafar, A Mahanti, B Krishnamurthy
Proceedings on Privacy Enhancing Technologies 2017 (1), 79-99, 2017
472017
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
H Jameel, U Kalim, A Sajjad, S Lee, T Jeon
European Grid Conference, 932-941, 2005
392005
Cryptanalysis of the convex hull click human identification protocol
HJ Asghar, S Li, J Pieprzyk, H Wang
International Journal of Information Security 12 (2), 83-96, 2013
382013
Human identification through image evaluation using secret predicates
H Jameel, RA Shaikh, H Lee, S Lee
Cryptographers’ Track at the RSA Conference, 67-84, 2007
382007
Splitbox: Toward efficient private network function virtualization
HJ Asghar, L Melis, C Soldani, E De Cristofaro, MA Kaafar, L Mathy
Proceedings of the 2016 workshop on Hot topics in Middleboxes and Network …, 2016
372016
Private processing of outsourced network functions: Feasibility and constructions
L Melis, HJ Asghar, E De Cristofaro, MA Kaafar
Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016
332016
Mobility independent secret key generation for wearable health-care devices
G Revadigar, C Javali, HJ Asghar, KB Rasmussen, S Jha
Proceedings of the 10th EAI International Conference on Body Area Networks …, 2015
312015
Gesture-based continuous authentication for wearable devices: The smart glasses use case
J Chauhan, HJ Asghar, A Mahanti, MA Kaafar
International Conference on Applied Cryptography and Network Security, 648-665, 2016
30*2016
A new human identification protocol and coppersmith’s baby-step giant-step algorithm
HJ Asghar, J Pieprzyk, H Wang
International Conference on Applied Cryptography and Network Security, 349-366, 2010
282010
On the security of PAS (predicate-based authentication service)
S Li, HJ Asghar, J Pieprzyk, AR Sadeghi, R Schmitz, H Wang
2009 Annual Computer Security Applications Conference, 209-218, 2009
282009
Network level privacy for wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, S Lee, YJ Song, H Lee
2008 The Fourth International Conference on Information Assurance and …, 2008
172008
Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks
HJ Asghar, S Li, R Steinfeld, J Pieprzyk
Proceedings of the 20th Annual Network and Distributed System Security …, 2013
162013
Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 9 (8), 5989-6007, 2009
142009
Mobile-to-grid middleware: An approach for breaching the divide between mobile and grid environments
U Kalim, H Jameel, A Sajjad, S Lee
International Conference on Networking, 1-8, 2005
142005
Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, S Lee, YJ Song, H Lee
2008 The 9th International Conference for Young Computer Scientists, 2038-2043, 2008
122008
iARC: Secret key generation for resource constrained devices by inducing artificial randomness in the channel
G Revadigar, C Javali, HJ Asghar, KB Rasmussen, S Jha
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
102015
The system can't perform the operation now. Try again later.
Articles 1–20