>> Information For:   |   Prospective Students   |   Current Students   |   Alumni   |   Industry & Government   |   Faculty Members
Username : Password : Forgot password?
 Research Detail:


  Security and Privacy:

  Research Fields:

Information Security
Security of Cloud Computing Contents
Communication Security
Access Security
Trust Model

  Research Groups:

  Related Faculties:

No Faculties Involved.

  Related Links:

  Recent Publications:

22. Shaikh Shahriar Hassan, Soumik Das Bibon, Md. Shohrab Hossain, and M. Atiquzzaman, Security Threats in Bluetooth Technology. Journal of Computers & Security, Elsevier, 2017
21. A. H. M. Kamal, and Mohammad Mahfuzul Islam, Enhancing Embedding Capacity and Stego Image Quality by Employing Multi Predictors. Journal of Information Security and Applications, Elsevier, 32:59-74, 2017
20. Mehedee Zaman, Mohammad Rakib Amin, Md. Shohrab Hossain, and M. Atiquzzaman, Behavioral Malware Detection Approaches for Android. In Proceedings of IEEE ICCC, IEEE, Kuala Lumpur, Malaysia, 2016
19. Mohammad Khaliqur Rahman, and Muhammad Abdullah Adnan, Dynamic Weight on Static Trust for Trustworthy Social Media Networks. In Proceedings of IEEE International Conference on Privacy, Security and Trust (PST), IEEE, Auckland, New Zealand, pages 8, 2016
18. Fariha Tasmin Jaigirdar, and Mohammad Mahfuzul Islam, A new cost-effective approach for battlefield surveillance in wireless sensor networks. In Proceedings of International Conference on Networking Systems and Security (NSysS), Dhaka, 2016
17. A. H. M. Kamal, and Mohammad Mahfuzul Islam, Enhancing the Embedding Payload by Handling the Affair of Association and Mapping of Block Pixels through Prediction Errors Histogram. In Proceedings of International Conference on Networking Systems and Security (NSysS), Dhaka, 2016
16. A. H. M. Kamal, and Mohammad Mahfuzul Islam, Boosting up the Data Hiding Rate through Multi Cycle Embedment Process. Journal of Visual Communication and Image Representation, Elsevier, 2016
15. Sultana Habiba, A. H. M. Kamal, and Mohammad Mahfuzul Islam, Enhancing the Robustness of Visual Degradation Based HAM Reversible Data Hiding. Journal of Computer Science, Science Publications, 12(2), :88-97, 2016
14. A. H. M. Kamal, and Mohammad Mahfuzul Islam, Capacity Improvement of Reversible Data Hiding Scheme through Better Prediction and Double Cycle Embedding Process. In Proceedings of IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), IEEE, Kalkata, India, 2015
13. Safique Ahmed Faruque, Mossa. Anisa Khatun, and Md. Saidur Rahman, Stop propagation of harmful information on social networks. In Proceedings of International Conference on Informatics, Electronics & Vision (ICIEV), 2014, IEEE, Dhaka, pages 1-4, 2014
12. A. H. M. Kamal, and Mohammad Mahfuzul Islam, Facilitating and securing offline e-medicine service through image steganography. Healthcare Technology Letters, The Institution of Engineering and Technology (IET), 1(2), :74-79, 2014
11. Sadia Shamma, and Md. Yusuf Sarwar Uddin, Towards Privacy-aware Photo Sharing using Mobile Phones. In Proceedings of ICECE, IEEE, Dhaka, 2014
10. Mohammed Eunus Ali, Tanzima Hashem, Anika Anwar, Lars Kulik, Ishrat Ahmed, and Egemen Tanin, Protecting mobile users from visual privacy attacks. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct, ACM, Seattle, WA, USA, pages 13-17, 2014
9. Anupam Das, and Mohammad Mahfuzul Islam, SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transaction on Dependable and Secured Computing (TDSC), IEEE, 9(2), :261-274, 2012
8. F. T. Jaigirdar, and Mohammad Mahfuzul Islam, Assurance of the Maximum Destruction in Battlefield using Cost-Effective Approximation Techniques. Journal of Networks, Academy Publisher, 7(12), :1967-1977, 2012
7. Tanzima Hashem, and Lars Kulik, "Don't Trust Anyone": Privacy Protection for Location-Based Services. Pervasive and Mobile Computing (PMC), 7(1), :44-59, 2011
6. F. T. Jaigirdar, Mohammad Mahfuzul Islam, and S. K. Huq, Grid Approximation Based Inductive Charger Deployment Technique in Wireless Sensor Networks. International Journal of Advanced Computer Science and Applications (IJACSA), The Science and Information Organization, 2(1), :30-37, 2011
5. Tanzima Hashem, Lars Kulik, and Rui Zhang, Privacy preserving group nearest neighbor queries. In Proceedings of 3rd International Conference on Extending Database Technology (EDBT), Lausanne, Switzerland, pages 489-500, 2010
4. Tanzima Hashem, and Lars Kulik, Safeguarding Location Privacy in Wireless Ad-Hoc Networks. In Proceedings of 9th International Conference on Ubiquitous Computing (UbiComp), Innsbruck, Austria, pages 372-390, 2007
3. Naznin Fauzia, Tanima Dey , Inaba Bhuiyan, and Md. Saidur Rahman, An efficient implementation of electronic election system. In Proceedings of 10th international conference on Computer and information technology (ICCIT 2007), IEEE Xplore, pages 1-6, 2007
2. A. B. M. Alim Al Islam, Md. A. Azad, Md. K. Alam, and Md. S. Alam, Security Attack Detection using Genetic Algorithm (GA) in Policy Based Network. In Proceedings of International Conference on Information and Communication Technology (ICICT), Dhaka, pages 341-347, 2007
1. Md. A. Azad, A. B. M. Alim Al Islam, Md. K. Alam, and Md. S. Alam, Router Oriented Traffic Flow Analysis For Ip Backbone Network. In Proceedings of International Conference on Information and Communication Technology (ICICT), Dhaka, pages 348-351, 2007

Department of Computer Science and Engineering, ECE building, Palashi, Dhaka, Bangladesh. The Department is part of the Faculty of Electrical and Electronic Engineering at the Bangladesh University of Engineering & Technology. No part or content of this website may be copied or reproduced without permission of the department authority. Contact info@cse.buet.ac.bd with questions or comments on this page.  [Development Credits]