Hassan Jameel Asghar
Hassan Jameel Asghar
Macquarie University & Data61, CSIRO
Verified email at data61.csiro.au
Title
Cited by
Cited by
Year
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008
3822008
A trust model for ubiquitous systems based on vectors of trust values
H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee
Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005
1152005
Trust management problem in distributed wireless sensor networks
RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song
12th IEEE International Conference on Embedded and Real-Time Computing …, 2006
882006
Towards seamless tracking-free web: Improved detection of trackers via one-class learning
M Ikram, HJ Asghar, MA Kaafar, B Krishnamurthy, A Mahanti
arXiv preprint arXiv:1603.06289, 2016
522016
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
492010
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
H Jameel, U Kalim, A Sajjad, S Lee, T Jeon
European Grid Conference, 932-941, 2005
402005
Splitbox: Toward efficient private network function virtualization
HJ Asghar, L Melis, C Soldani, E De Cristofaro, MA Kaafar, L Mathy
Proceedings of the 2016 workshop on Hot topics in Middleboxes and Network …, 2016
392016
Cryptanalysis of the convex hull click human identification protocol
HJ Asghar, S Li, J Pieprzyk, H Wang
International Journal of Information Security 12 (2), 83-96, 2013
392013
Human identification through image evaluation using secret predicates
H Jameel, RA Shaikh, H Lee, S Lee
Cryptographers’ Track at the RSA Conference, 67-84, 2007
382007
Private processing of outsourced network functions: Feasibility and constructions
L Melis, HJ Asghar, E De Cristofaro, MA Kaafar
Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016
342016
Mobility independent secret key generation for wearable health-care devices
G Revadigar, C Javali, HJ Asghar, KB Rasmussen, S Jha
Proceedings of the 10th EAI International Conference on Body Area Networks …, 2015
322015
Gesture-based continuous authentication for wearable devices: The smart glasses use case
J Chauhan, HJ Asghar, A Mahanti, MA Kaafar
International Conference on Applied Cryptography and Network Security, 648-665, 2016
30*2016
A new human identification protocol and coppersmith’s baby-step giant-step algorithm
HJ Asghar, J Pieprzyk, H Wang
International Conference on Applied Cryptography and Network Security, 349-366, 2010
282010
On the security of PAS (predicate-based authentication service)
S Li, HJ Asghar, J Pieprzyk, AR Sadeghi, R Schmitz, H Wang
2009 Annual Computer Security Applications Conference, 209-218, 2009
282009
Network level privacy for wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, S Lee, YJ Song, H Lee
2008 The Fourth International Conference on Information Assurance and …, 2008
172008
Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks
HJ Asghar, S Li, R Steinfeld, J Pieprzyk
Proceedings of the 20th Annual Network and Distributed System Security …, 2013
162013
Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 9 (8), 5989-6007, 2009
152009
Mobile-to-grid middleware: An approach for breaching the divide between mobile and grid environments
U Kalim, H Jameel, A Sajjad, S Lee
International Conference on Networking, 1-8, 2005
142005
Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, S Lee, YJ Song, H Lee
2008 The 9th International Conference for Young Computer Scientists, 2038-2043, 2008
122008
Touch and you’re trapp (ck) ed: Quantifying the uniqueness of touch gestures for tracking
R Masood, BZH Zhao, HJ Asghar, MA Kaafar
Proceedings on Privacy Enhancing Technologies 2018 (2), 122-142, 2018
112018
The system can't perform the operation now. Try again later.
Articles 1–20