Sk. Md. Mizanur Rahman, Ph.D.
Sk. Md. Mizanur Rahman, Ph.D.
Professor, Centennial College, Toronto, Canada
Verified email at centennialcollege.ca - Homepage
Title
Cited by
Cited by
Year
Wireless mesh networking: architectures, protocols and standards
Y Zhang, J Luo, H Hu
CRC Press, 2006
4102006
RFID and sensor networks: architectures, protocols, security, and integrations
Y Zhang, LT Yang, J Chen
CRC Press, 2009
1982009
Review of cyber-physical system in healthcare
SA Haque, SM Aziz, M Rahman
international journal of distributed sensor networks 10 (4), 217415, 2014
1592014
Smart Health Solution Integrating IoT and Cloud: A Case Study of Voice Pathology Monitoring
G Muhammad, SMM Rahman, A Alelaiwi, A Alamri
IEEE Communications Magazine 55 (1), 69-73, 2017
1172017
Anonymous on-demand position-based routing in mobile ad-hoc networks
SMM Rahman, A Inomata, M Mambo, E Okamoto
Information and Media Technologies 1 (2), 1191-1203, 2006
842006
Private key agreement and secure communication for heterogeneous sensor networks
SMM Rahman, K El-Khatib
Journal of Parallel and Distributed Computing 70 (8), 858-870, 2010
602010
Toward end-to-end biometrics-based security for IoT infrastructure
MS Hossain, G Muhammad, SMM Rahman, A Wadud, A Alelaiwi, ...
IEEE Wireless Communications 23 (5), 44-51, 2016
582016
Pke-aet: Public key encryption with authorized equality test
K Huang, R Tso, YC Chen, SMM Rahman, A Almogren, A Alamri
The Computer Journal 58 (10), 2686-2697, 2015
542015
Proposal and evaluation of a dynamic resource allocation method based on the load of VMs on IaaS
A Inomata, T Morikawa, M Ikebe, Y Okamoto, S Noguchi, K Fujikawa, ...
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
472011
A software defined network routing in wireless multihop network
J Wang, Y Miao, P Zhou, MS Hossain, SMM Rahman
Journal of Network and Computer Applications 85, 76-83, 2017
452017
Continuous authentication by electrocardiogram data
M Guennoun, N Abbad, J Talom, SMM Rahman, K El-Khatib
2009 IEEE Toronto International Conference Science and Technology for …, 2009
442009
Sybil Defense Techniques in Online Social Networks: A Survey
M Al-Qurishi, M Al-Rakhami, A Alamri, M AlRubaian, M Rahman, ...
IEEE Access 5, 1200-1219, 2017
382017
Chaos-cryptography based privacy preservation technique for video surveillance
SMM Rahman, MA Hossain, H Mouftah, A El Saddik, E Okamoto
Multimedia systems 18 (2), 145-155, 2012
282012
Secure time synchronization for wireless sensor networks based on bilinear pairing functions
M Rahman, K El-Khatib
IEEE Transactions on Parallel and Distributed Systems, 2010
282010
Anonymous secure communication in wireless mobile ad-hoc networks
SMM Rahman, A Inomata, T Okamoto, M Mambo, E Okamoto
International Conference on Ubiquitous Convergence Technology, 140-149, 2006
272006
TOLA: Topic-oriented learning assistance based on cyber-physical system and big data
J Song, Y Zhang, K Duan, MS Hossain, SMM Rahman
Future Generation Computer Systems 75, 200-205, 2017
252017
Leveraging analysis of user behavior to identify malicious activities in large-scale social networks
M Al-Qurishi, MS Hossain, M Alrubaian, SMM Rahman, A Alamri
IEEE Transactions on Industrial Informatics 14 (2), 799-813, 2017
232017
QoS and trust‐aware coalition formation game in data‐intensive cloud federations
MM Hassan, M Abdullah‐Al‐Wadud, A Almogren, SKMM Rahman, ...
Concurrency and computation: practice and experience 28 (10), 2889-2905, 2016
232016
Sentiment detection from bangla text using contextual valency analysis
KMA Hasan, M Rahman
2014 17th International Conference on Computer and Information Technology …, 2014
212014
Android vs. iOS: The security battle
F Al-Qershi, M Al-Qurishi, S Md Mizanur Rahman, A Al-Amri
2014 World Congress on Computer Applications and Information Systems (WCCAIS …, 2014
202014
The system can't perform the operation now. Try again later.
Articles 1–20