Mustaque Ahamad

Affiliations: 
Georgia Institute of Technology, Atlanta, GA 
Area:
Computer Science
Google:
"Mustaque Ahamad"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Dacosta I, Chakradeo S, Ahamad M, et al. (2012) One-time cookies: Preventing session hijacking attacks with stateless authentication tokens Acm Transactions On Internet Technology. 12
Mashima D, Ahamad M. (2012) Enhancing accountability of Electronic Health Record usage via patient-centric monitoring Ihi'12 - Proceedings of the 2nd Acm Sighit International Health Informatics Symposium. 409-418
Dacosta I, Ahamad M, Traynor P. (2012) Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 199-216
Dacosta I, Balasubramaniyan V, Ahamad M, et al. (2011) Improving aquthentication performance of distributed SIP proxies Ieee Transactions On Parallel and Distributed Systems. 22: 1804-1812
Balasubramaniyan VA, Poonawalla A, Ahamad M, et al. (2010) PinDr0p: Using single-ended audio features to determine call provenance Proceedings of the Acm Conference On Computer and Communications Security. 109-120
Mashima D, Ahamad M. (2009) Using identity credential usage logs to detect anomalous service accesses Proceedings of the Acm Conference On Computer and Communications Security. 73-79
Dacosta I, Balasubramaniyan V, Ahamad M, et al. (2009) Improving authentication performance of distributed SIP proxies Iptcomm 2009: Services and Security For Next Generation Networks - Proceedings of the 3rd International Conference On Principles, Systems and Applications of Ip Telecommunications
Mashima D, Ahamad M, Kannan S. (2009) User-centric handling of identity agent compromise Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 19-36
Kong J, Schwan K, Lee M, et al. (2008) Protectit: Trusted distributed services operating on sensitive data Eurosys'08 - Proceedings of the Eurosys 2008 Conference. 137-147
Mashima D, Ahamad M. (2008) Towards a user-centric identity-usage monitoring system Proceedings - the 3rd International Conference On Internet Monitoring and Protection, Icimp 2008. 47-52
See more...