Seguir
Rasib Khan, Ph.D.
Rasib Khan, Ph.D.
Associate Professor, School of Computing and Analytics, Northern Kentucky University
Dirección de correo verificada de nku.edu
Título
Citado por
Citado por
Año
OpenID authentication as a service in OpenStack
RH Khan, J Ylitalo, AS Ahmed
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
1062011
Aura: An iot based cloud infrastructure for localized mobile computation outsourcing
R Hasan, MM Hossain, R Khan
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015
772015
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading
R Hasan, M Hossain, R Khan
Future Generation Computer Systems 86, 821-835, 2018
602018
SEPIA: Secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices
R Khan, R Hasan, J Xu
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015
442015
OTIT: Towards secure provenance modeling for location proofs
R Khan, S Zawoad, MM Haque, R Hasan
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
332014
Secure networking for virtual machines in the cloud
M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma
2012 IEEE international conference on cluster computing workshops, 88-96, 2012
332012
WORAL: A witness oriented secure location provenance framework for mobile devices
R Hasan, R Khan, S Zawoad, MM Haque
IEEE Transactions on Emerging Topics in Computing 4 (1), 128-141, 2015
312015
‘who, when, and where?’location proof assertion for mobile devices
R Khan, S Zawoad, MM Haque, R Hasan
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014
242014
Modeling a secure supply chain integrity preservation system
R Khan, MM Haque, R Hasan
Technologies for Homeland Security (HST), 2013 IEEE International Conference …, 2013
21*2013
A cloud you can wear: Towards a mobile and wearable personal cloud
R Hasan, R Khan
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
182016
Fuzzy authentication using interaction provenance in service oriented computing
R Khan, R Hasan
2015 IEEE International Conference on Services Computing, 170-177, 2015
172015
Jugo: A generic architecture for composite cloud as a service
M Hossain, R Khan, S Al Noor, R Hasan
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 806-809, 2016
152016
Hot zone identification: Analyzing effects of data sampling on spam clustering
R Khan, M Mizan, R Hasan, A Sprague
152014
Secure cloud connectivity for scientific applications
L Osmani, S Toor, M Komu, MJ Kortelainen, T Lindén, J White, R Khan, ...
IEEE Transactions on Services Computing 11 (4), 658-670, 2015
102015
Interaction provenance model for unified authentication factors in service oriented computing
R Hasan, R Khan
Proceedings of the 4th ACM conference on Data and application security and …, 2014
102014
Midep: Multiparty identity establishment protocol for decentralized collaborative services
R Khan, R Hasan
2015 IEEE International Conference on Services Computing, 546-553, 2015
72015
Towards non-intrusive continuous healthcare monitoring with the Smart Hospital Gown
M Guru, R Hasan, R Khan
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017
62017
Accountable proof of ownership for data using timing element in cloud services
M Mizan, ML Rahman, R Khan, M Haque, R Hasan
High Performance Computing and Simulation (HPCS), 2013 International …, 2013
62013
A security adaptive protocol suite: Ranked Neighbor Discovery (RND) and Security Adaptive AODV (SA-AODV)
RH Khan, KM Imtiaz-ud-Din, AA Faruq, ARM Kamal, A Mottalib
2008 International Conference on Electrical and Computer Engineering, 588-593, 2008
62008
Unified authentication factors and fuzzy service access using interaction provenance
R Hasan, R Khan
Computers & Security 67, 211-231, 2017
52017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20