Research Detail:

Security and Privacy

» Research Fields:
Information Security
Security of Cloud Computing Contents
Communication Security
Access Security
Trust Model

» Research Groups:

» Related Faculties:
Md. Iftekharul Islam Sakib

» Related Links:

» Recent Publications:

1. A.H.M.Kamal, mahfuz, An image distortion-based enhanced embedding scheme, Iran Journal of Computer Science, , , 2018. [paper link]
2. ShaikhShahriarHassan, SoumikDasBibon, mshohrabhossain, M.Atiquzzaman, Security Threats in Bluetooth Technology, Journal of Computers & Security, , , 2017.
3. A.H.M.Kamal, mahfuz, Enhancing Embedding Capacity and Stego Image Quality by Employing Multi Predictors, Journal of Information Security and Applications, 32, 59-74, 2017.
4. A.H.M.Kamal, mahfuz, Boosting up the Data Hiding Rate through Multi Cycle Embedment Process, Journal of Visual Communication and Image Representation, , , 2016.
5. SultanaHabiba, A.H.M.Kamal, mahfuz, Enhancing the Robustness of Visual Degradation Based HAM Reversible Data Hiding, Journal of Computer Science, 12(2), 88-97, 2016.
6. A.H.M.Kamal, mahfuz, Facilitating and securing offline e-medicine service through image steganography, Healthcare Technology Letters, 1(2), 74-79, 2014.
7. F.T.Jaigirdar, mahfuz, Assurance of the Maximum Destruction in Battlefield using Cost-Effective Approximation Techniques, Journal of Networks, 7(12), 1967-1977, 2012.
8. anupam, mahfuz, SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems, IEEE Transaction on Dependable and Secured Computing (TDSC), 9(2), 261-274, 2012.
9. tanzimahashem, LarsKulik, "Don't Trust Anyone": Privacy Protection for Location-Based Services, Pervasive and Mobile Computing (PMC), 7(1), 44-59, 2011.
10. F.T.Jaigirdar, mahfuz, S.K.Huq, Grid Approximation Based Inductive Charger Deployment Technique in Wireless Sensor Networks, International Journal of Advanced Computer Science and Applications (IJACSA), 2(1), 30-37, 2011.
11. MdRafidUlIslam, saifulislam, ZakariaAhmed, anindyaiqbal, rifat, Automatic Detection of NoSQL Injection Using Supervised Learning, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), , , 2019. [paper link]
12. SyedaIsratFerdaus, adnan, Privacy in Multi-party Computation in MapReduce, 4th International Conference on Computer and Communication Systems (ICCCS 2019), , , 2019.
13. SkTahsinAmin, Semantic Clustering in Credible Human Sensed Event Detection, 14th DCOSS, , 3, 2018.
14. Md.DelwarHossain, adnan, Secured and High Performance Distributed Big Data Storage in Cloud Systems, 3rd International Conference on Computer and Communication Systems (ICCCS 2018), , 6, 2018.
15. SajedulTalukder, miisakib, Md.FarukHossen, ZahidurRahimTalukder, mshohrabhossain, Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net, International Conference on Current Trends in Computer, Electrical, Electronics and Communication (ICCTCEEC), , 1-8, 2017.
16. M.M.Rahman, adnan, Two step verification system of highly secure social media: Possible to breach the security, 3rd International Conference on Networking, Systems and Security (NSysS), , 6, 2017.
17. NawSafrinSattar, adnan, MaimunaBegumKali, Secured Aerial Photography using Homomorphic Encryption, 3rd International Conference on Networking, Systems and Security (NSysS), , 12, 2017.
18. MousumiAkter, tanzimahashem, Computing Aggregates Over Numeric Data with Personalized Local Differential Privacy, Information Security and Privacy - 22nd Australasian Conference (ACISP), , 249--260, 2017.
19. FaysalHossainShezan, SyedaFarziaAfroze, anindyaiqbal, Vulnerability Detection in Recent Android Apps: An Empirical Study, International Conference on Networking, Systems and Security, , , 2017.
20. 4. MuhammedDastagirHusain, anindyaiqbal, An Empirical Study on Typosquatting Abuse in Bangladesh, International Conference on Networking, Systems and Security, , , 2017.
21. EMWasifurRahmanChowdhury, mrahman, razi, msrahman, Salty Secret: Let us secretly salt the secret, 2017 International Conference on Networking, Systems and Security (NSysS), , 115-123, 2017. [paper link]
22. FarihaTasminJaigirdar, mahfuz, A new cost-effective approach for battlefield surveillance in wireless sensor networks, International Conference on Networking Systems and Security (NSysS), , , 2016.
23. A.H.M.Kamal, mahfuz, Enhancing the Embedding Payload by Handling the Affair of Association and Mapping of Block Pixels through Prediction Errors Histogram, International Conference on Networking Systems and Security (NSysS), , , 2016.
24. TahsinaHashem, tanzimahashem, anindyaiqbal, Ensuring Feedback Data Privacy in the Context of Developing Countries, ACM Symposium on Computing and Development (DEV), , , 2016.
25. TishnaSabrina, ManzurMurshed, anindyaiqbal, Anonymization Techniques for Preserving Data Quality in Participatory Sensing, IEEE Conference on Local Computer Networks (LCN), , , 2016.
26. MehedeeZaman, MohammadRakibAmin, mshohrabhossain, M.Atiquzzaman, Behavioral Malware Detection Approaches for Android, IEEE ICCC, , , 2016.
27. MohammadKhaliqurRahman, adnan, Dynamic Weight on Static Trust for Trustworthy Social Media Networks, IEEE International Conference on Privacy, Security and Trust (PST), , 8, 2016.
28. A.H.M.Kamal, mahfuz, Capacity Improvement of Reversible Data Hiding Scheme through Better Prediction and Double Cycle Embedding Process, IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), , , 2015.
29. SadiaShamma, yusufsarwar, Towards Privacy-aware Photo Sharing using Mobile Phones, ICECE, , , 2014.
30. eunus, tanzimahashem, AnikaAnwar, LarsKulik, IshratAhmed, EgemenTanin, Protecting mobile users from visual privacy attacks, the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct, , 13-17, 2014.
31. SafiqueAhmedFaruque, Mossa.AnisaKhatun, saidurrahman, Stop propagation of harmful information on social networks, International Conference on Informatics, Electronics & Vision (ICIEV), 2014, , 1-4, 2014.
32. tanzimahashem, LarsKulik, RuiZhang, Privacy preserving group nearest neighbor queries, 3rd International Conference on Extending Database Technology (EDBT), , 489-500, 2010.
33. tanzimahashem, LarsKulik, Safeguarding Location Privacy in Wireless Ad-Hoc Networks, 9th International Conference on Ubiquitous Computing (UbiComp), , 372-390, 2007.
34. NazninFauzia, TanimaDey, InabaBhuiyan, saidurrahman, An efficient implementation of electronic election system, 10th international conference on Computer and information technology (ICCIT 2007), , 1-6, 2007.
35. razi, Md.A.Azad, Md.K.Alam, Md.S.Alam, Security Attack Detection using Genetic Algorithm (GA) in Policy Based Network, International Conference on Information and Communication Technology (ICICT), , 341-347, 2007.
36. Md.A.Azad, razi, Md.K.Alam, Md.S.Alam, Router Oriented Traffic Flow Analysis For Ip Backbone Network, International Conference on Information and Communication Technology (ICICT), , 348-351, 2007.