2006 |
5 | EE | Shahabuddin Muhammad,
Zeeshan Furqan,
Ratan K. Guha:
Understanding the intruder through attacks on cryptographic protocols.
ACM Southeast Regional Conference 2006: 667-672 |
4 | EE | Zeeshan Furqan,
Shahabuddin Muhammad,
Ratan K. Guha:
Formal Verification of 802.11i using Strand Space Formalism.
ICN/ICONS/MCL 2006: 140 |
3 | EE | Shahabuddin Muhammad,
Zeeshan Furqan,
Ratan K. Guha:
Designing Authentication Protocols: Trends and Issues.
ICN/ICONS/MCL 2006: 76 |
2005 |
2 | EE | Shahabuddin Muhammad,
Zeeshan Furqan,
Ratan K. Guha:
Wireless sensor network security: a secure sink node architecture.
IPCCC 2005: 371-376 |
2004 |
1 | | Zeeshan Furqan,
Ratan K. Guha,
Shahabuddin Muhammad:
A Heuristic State Space Search Model for Security Protocol Verification.
ICETE (2) 2004: 113-118 |