2008 |
11 | EE | Sheikh Iqbal Ahamed,
Munirul M. Haque,
Nilothpal Talukder:
Service sharing with trust in pervasive environment: now it's time to break the jinx.
SAC 2008: 1622-1628 |
10 | EE | Munirul M. Haque,
Sheikh Iqbal Ahamed:
An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications.
IEEE Transactions on Systems, Man, and Cybernetics, Part C 38(3): 334-346 (2008) |
2007 |
9 | EE | Anahita Vyas,
Sheikh Iqbal Ahamed,
Munirul M. Haque,
Madhavi V. S. Jayanthi:
A Robust Lightweight Solution for RFID Security.
AINA Workshops (2) 2007: 182-187 |
8 | EE | Munirul M. Haque,
Sheikh Iqbal Ahamed:
An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment.
COMPSAC (1) 2007: 49-56 |
7 | EE | Munirul M. Haque,
Sheikh Iqbal Ahamed,
Haifeng Li,
K. M. Ibrahim Asif:
An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing Environment.
COMPSAC (1) 2007: 57-64 |
6 | EE | Sheikh Iqbal Ahamed,
Munirul M. Haque,
K. M. Ibrahim Asif:
S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment.
ITNG 2007: 303-310 |
5 | EE | Sheikh Iqbal Ahamed,
Nilothpal Talukder,
Munirul M. Haque:
Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment.
MobiQuitous 2007: 1-6 |
4 | EE | Shameem Ahmed,
Sheikh Iqbal Ahamed,
Moushumi Sharmin,
Munirul M. Haque:
Self-healing for autonomic pervasive computing.
SAC 2007: 110-111 |
3 | EE | Sheikh Iqbal Ahamed,
Munirul M. Haque,
Karl Stamm,
Ahmed J. Khan:
Wellness assistant: a virtual wellness assistant using pervasive computing.
SAC 2007: 782-787 |
2006 |
2 | EE | Munirul M. Haque,
Sheikh Iqbal Ahamed:
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications.
ICPP Workshops 2006: 189-195 |
1 | | Sheikh Iqbal Ahamed,
Moushumi Sharmin,
Shameem Ahmed,
Munirul M. Haque,
Ahmed J. Khan:
Design and implementation of a virtual assistant for healthcare professionals using pervasive computing technologies.
Elektrotechnik und Informationstechnik 123(4): 112-120 (2006) |