Sk. Md. Mizanur Rahman, Ph.D.
Sk. Md. Mizanur Rahman, Ph.D.
Professor, Centennial College, Toronto, Canada
Verified email at - Homepage
Cited by
Cited by
Smart Health Solution Integrating IoT and Cloud: A Case Study of Voice Pathology Monitoring
G Muhammad, SMM Rahman, A Alelaiwi, A Alamri
IEEE Communications Magazine 55 (1), 69-73, 2017
Toward end-to-end biometrics-based security for IoT infrastructure
MS Hossain, G Muhammad, SMM Rahman, A Wadud, A Alelaiwi, ...
IEEE Wireless Communications 23 (5), 44-51, 2016
Sybil Defense Techniques in Online Social Networks: A Survey
M Al-Qurishi, M Al-Rakhami, A Alamri, M AlRubaian, M Rahman, ...
IEEE Access 5, 1200-1219, 2017
Pke-aet: Public key encryption with authorized equality test
K Huang, R Tso, YC Chen, SMM Rahman, A Almogren, A Alamri
The Computer Journal 58 (10), 2686-2697, 2015
A software defined network routing in wireless multihop network
J Wang, Y Miao, P Zhou, MS Hossain, SMM Rahman
Journal of Network and Computer Applications 85, 76-83, 2017
Anonymous on-demand position-based routing in mobile ad-hoc networks
SMM Rahman, A Inomata, M Mambo, E Okamoto
Information and Media Technologies 1 (2), 1191-1203, 2006
Leveraging analysis of user behavior to identify malicious activities in large-scale social networks
M Al-Qurishi, MS Hossain, M Alrubaian, SMM Rahman, A Alamri
IEEE Transactions on Industrial Informatics 14 (2), 799-813, 2017
Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment
S Khatoon, SMM Rahman, M Alrubaian, A Alamri
IEEE Access 7, 47962-47971, 2019
A prediction system of Sybil attack in social network using deep-regression model
M Al-Qurishi, M Alrubaian, SMM Rahman, A Alamri, MM Hassan
Future Generation Computer Systems 87, 743-753, 2018
Private key agreement and secure communication for heterogeneous sensor networks
SMM Rahman, K El-Khatib
Journal of Parallel and Distributed Computing 70 (8), 858-870, 2010
Continuous authentication by electrocardiogram data
M Guennoun, N Abbad, J Talom, SMM Rahman, K El-Khatib
2009 IEEE Toronto International Conference Science and Technology for …, 2009
Proposal and evaluation of a dynamic resource allocation method based on the load of VMs on IaaS
A Inomata, T Morikawa, M Ikebe, Y Okamoto, S Noguchi, K Fujikawa, ...
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
TOLA: Topic-oriented learning assistance based on cyber-physical system and big data
J Song, Y Zhang, K Duan, MS Hossain, SMM Rahman
Future Generation Computer Systems 75, 200-205, 2017
Secure time synchronization for wireless sensor networks based on bilinear pairing functions
M Rahman, K El-Khatib
IEEE Transactions on Parallel and Distributed Systems, 2010
Chaos-cryptography based privacy preservation technique for video surveillance
SMM Rahman, MA Hossain, H Mouftah, A El Saddik, E Okamoto
Multimedia systems 18 (2), 145-155, 2012
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud
R Tso, A Alelaiwi, SMM Rahman, ME Wu, MS Hossain
Journal of Signal Processing Systems, 2016
DL-HAR: Deep Learning-Based Human Activity Recognition Framework for Edge Computing
G Abdu, AR Mabrook, AS Hussain, SMM Rahman, A Alamri
CMC-Computers, Materials & Continua, 65 (2), 1033-1057, 2020
An efficient key agreement protocol for Sybil-precaution in online social network
M Al-Qurishi, SMM Rahman, MS Hossain, A Almogren, M Alrubaian, ...
Future Generation Computer Systems, 2017
Multiple Disease Risk Assessment with Uniform Model based on Medical Clinical Notes
X Shi, Y Hu, Y Zhang, W Li, Y Hao, A Alelaiwi, SMM Rahman, MS Hossain
IEEE Access 4, 7074 - 7083, 2016
Android vs. iOS: The security battle
F Al-Qershi, M Al-Qurishi, S Md Mizanur Rahman, A Al-Amri
2014 World Congress on Computer Applications and Information Systems (WCCAIS …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20