Endadul Hoque
Endadul Hoque
Verified email at - Homepage
Cited by
Cited by
Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments
ME Hoque, F Rahman, SI Ahamed, JH Park
Wireless personal communications 55 (1), 65, 2010
ERAP: ECC based RFID authentication protocol
SI Ahamed, F Rahman, E Hoque
2008 12th IEEE International Workshop on Future Trends of Distributed …, 2008
Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments
SI Ahamed, MM Haque, ME Hoque, F Rahman, N Talukder
Journal of Systems and Software 83 (2), 253-270, 2010
Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations
SY Chau, O Chowdhury, E Hoque, H Ge, A Kate, C Nita-Rotaru, N Li
2017 IEEE Symposium on Security and Privacy (SP), 503-520, 2017
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
S Jero, ME Hoque, DR Choffnes, A Mislove, C Nita-Rotaru
NDSS, 2018
S3PR: Secure serverless search protocols for RFID
SI Ahamed, F Rahman, E Hoque, F Kawsar, T Nakajima
2008 International Conference on Information Security and Assurance (isa …, 2008
Expat: Expectation-based policy analysis and enforcement for appified smart-home platforms
M Yahyazadeh, P Podder, E Hoque, O Chowdhury
Proceedings of the 24th ACM symposium on access control models and …, 2019
AnonPri: An efficient anonymous private authentication protocol
ME Hoque, F Rahman, SI Ahamed
2011 IEEE International Conference on Pervasive Computing and Communications …, 2011
Secure and efficient tag searching in RFID systems using serverless search protocol
SI Ahamed, F Rahman, E Hoque, F Kawsar, T Nakajima
International Journal of Security and Its Applications 2 (4), 57-66, 2008
Turret: A platform for automated attack finding in unmodified distributed system implementations
H Lee, J Seibert, E Hoque, C Killian, C Nita-Rotaru
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
Anonpri: A secure anonymous private authentication protocol for RFID systems
F Rahman, ME Hoque, SI Ahamed
Information Sciences 379, 195-210, 2017
Preserve your privacy with pco: A privacy sensitive architecture for context obfuscation for pervasive e-community based applications
F Rahman, ME Hoque, FA Kawsar, SI Ahamed
2010 IEEE Second International Conference on Social Computing, 41-48, 2010
Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks.
A Rahman, ME Hoque, F Rahman, SK Kundu, P Gburzynski
J. Networks 4 (9), 895-904, 2009
Analyzing operational behavior of stateful protocol implementations for detecting semantic bugs
E Hoque, O Chowdhury, SY Chau, C Nita-Rotaru, N Li
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
YA-SRAP: Yet another serverless RFID authentication protocol
SI Ahamed, MDE Hoque, F Rahman, F Kawsar, T Nakajima
2008 IET 4th International Conference on Intelligent Environments, 1-8, 2008
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol
ME Hoque, F Rahman, SI Ahamed
Proceedings of the 2009 ACM symposium on Applied Computing, 1062-1066, 2009
Adversarial testing of wireless routing implementations
ME Hoque, H Lee, R Potharaju, CE Killian, C Nita-Rotaru
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
Preserving privacy in wireless sensor networks using reliable data aggregation
F Rahman, E Hoque, SI Ahamed
ACM SIGAPP Applied Computing Review 11 (3), 52-62, 2011
Taming epidemic outbreaks in mobile adhoc networks
E Hoque, R Potharaju, C Nita-Rotaru, S Sarkar, SS Venkatesh
Ad Hoc Networks 24, 57-72, 2015
UCFC-Ubiquitous personal carbon footprint calculation platform
F Rahman, SI Ahamed, E Hoque, C O'Brien, H Zhang, L Liu
International Conference on Green Computing, 425-432, 2010
The system can't perform the operation now. Try again later.
Articles 1–20