Year |
Citation |
Score |
2017 |
Hasan R, Hossain MM, Khan R. Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading Future Generation Computer Systems. 86: 821-835. DOI: 10.1016/J.Future.2017.11.024 |
0.305 |
|
2017 |
Hossain MM, Islam SMR, Ali F, Kwak KS, Hasan R. An Internet of Things-based health prescription assistant and its security system design Future Generation Computer Systems. 82: 422-439. DOI: 10.1016/J.Future.2017.11.020 |
0.371 |
|
2017 |
Hasan R, Khan R. Unified authentication factors and fuzzy service access using interaction provenance Computers & Security. 67: 211-231. DOI: 10.1016/J.Cose.2017.02.014 |
0.357 |
|
2016 |
Hasan R, Khan R, Zawoad S, Haque MM. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices Ieee Transactions On Emerging Topics in Computing. 4: 129-141. DOI: 10.1109/Tetc.2015.2401394 |
0.351 |
|
2016 |
Zawoad S, Dutta AK, Hasan R. Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service Ieee Transactions On Dependable and Secure Computing. 13: 148-162. DOI: 10.1109/Tdsc.2015.2482484 |
0.388 |
|
2016 |
Zawoad S, Hasan R. Trustworthy Digital Forensics in the Cloud Computer. 49: 78-81. DOI: 10.1109/Mc.2016.89 |
0.324 |
|
2015 |
Zawoad S, Hasan R, Grimes J. LINCS: Towards building a trustworthy litigation hold enabled cloud storage system Digital Investigation. 14: S55-S67. DOI: 10.1016/J.Diin.2015.05.014 |
0.389 |
|
2014 |
Zawoad S, Mernik M, Hasan R. Towards building a forensics aware language for secure logging Computer Science and Information Systems. 11: 1291-1314. DOI: 10.2298/Csis131201051Z |
0.335 |
|
2013 |
Zawoad S, Hasan R. I have the proof: Providing proofs of past data possession in cloud forensics Proceedings of the 2012 Ase International Conference On Cyber Security, Cybersecurity 2012. 75-82. DOI: 10.1109/Cybersecurity.2012.17 |
0.352 |
|
2011 |
Hasan R, Winslett M. Efficient audit-based compliance for relational data retention Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 238-248. DOI: 10.1145/1966913.1966944 |
0.472 |
|
2010 |
Hasan R, Winslett M. Trustworthy vacuuming and litigation holds in long-term high-integrity records retention Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 621-632. DOI: 10.1145/1739041.1739115 |
0.491 |
|
2009 |
Hasan R, Sion R, Winslett M. Preventing history forgery with secure provenance Acm Transactions On Storage. 5. DOI: 10.1145/1629080.1629082 |
0.521 |
|
2005 |
Hasan R, Tucek J, Stanton P, Yurcik W, Brumbaugh L, Rosendale J, Boonstra R. The techniques and challenges of immutable storage with applications in multimedia Proceedings of Spie - the International Society For Optical Engineering. 5682: 41-52. DOI: 10.1117/12.588103 |
0.322 |
|
Show low-probability matches. |