Hassan Jameel Asghar
Hassan Jameel Asghar
Macquarie University & Data61, CSIRO
Verified email at data61.csiro.au
Title
Cited by
Cited by
Year
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008
3912008
A trust model for ubiquitous systems based on vectors of trust values
H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee
Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005
1172005
Trust management problem in distributed wireless sensor networks
RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song
12th IEEE International Conference on Embedded and Real-Time Computing …, 2006
902006
Towards seamless tracking-free web: Improved detection of trackers via one-class learning
M Ikram, HJ Asghar, MA Kaafar, B Krishnamurthy, A Mahanti
arXiv preprint arXiv:1603.06289, 2016
542016
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
502010
Cryptanalysis of the convex hull click human identification protocol
HJ Asghar, S Li, J Pieprzyk, H Wang
International Journal of Information Security 12 (2), 83-96, 2013
402013
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
H Jameel, U Kalim, A Sajjad, S Lee, T Jeon
European Grid Conference, 932-941, 2005
402005
Splitbox: Toward efficient private network function virtualization
HJ Asghar, L Melis, C Soldani, E De Cristofaro, MA Kaafar, L Mathy
Proceedings of the 2016 workshop on Hot topics in Middleboxes and Network …, 2016
392016
Human identification through image evaluation using secret predicates
H Jameel, RA Shaikh, H Lee, S Lee
Cryptographers’ Track at the RSA Conference, 67-84, 2007
382007
Private processing of outsourced network functions: Feasibility and constructions
L Melis, HJ Asghar, E De Cristofaro, MA Kaafar
Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016
352016
Mobility independent secret key generation for wearable health-care devices
G Revadigar, C Javali, HJ Asghar, KB Rasmussen, S Jha
Proceedings of the 10th EAI International Conference on Body Area Networks …, 2015
322015
Gesture-based continuous authentication for wearable devices: The smart glasses use case
J Chauhan, HJ Asghar, A Mahanti, MA Kaafar
International Conference on Applied Cryptography and Network Security, 648-665, 2016
31*2016
A new human identification protocol and coppersmith’s baby-step giant-step algorithm
HJ Asghar, J Pieprzyk, H Wang
International Conference on Applied Cryptography and Network Security, 349-366, 2010
282010
On the security of PAS (predicate-based authentication service)
S Li, HJ Asghar, J Pieprzyk, AR Sadeghi, R Schmitz, H Wang
2009 Annual Computer Security Applications Conference, 209-218, 2009
282009
Network level privacy for wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, S Lee, YJ Song, H Lee
2008 The Fourth International Conference on Information Assurance and …, 2008
172008
Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks
HJ Asghar, S Li, R Steinfeld, J Pieprzyk
Proceedings of the 20th Annual Network and Distributed System Security …, 2013
162013
Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 9 (8), 5989-6007, 2009
152009
Mobile-to-grid middleware: An approach for breaching the divide between mobile and grid environments
U Kalim, H Jameel, A Sajjad, S Lee
International Conference on Networking, 1-8, 2005
142005
Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, S Lee, YJ Song, H Lee
2008 The 9th International Conference for Young Computer Scientists, 2038-2043, 2008
132008
Touch and You're Trapp (ck) ed: Quantifying the Uniqueness of Touch Gestures for Tracking.
R Masood, BZH Zhao, HJ Asghar, MA Kaafar
Proc. Priv. Enhancing Technol. 2018 (2), 122-142, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20