The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Munirul M. Haque: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Anahita Vyas, Sheikh Iqbal Ahamed, Munirul M. Haque, Madhavi V. S. Jayanthi
    A Robust Lightweight Solution for RFID Security. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:182-187 [Conf]
  2. Munirul M. Haque, Sheikh Iqbal Ahamed
    m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2006, pp:189-195 [Conf]
  3. Sheikh Iqbal Ahamed, Munirul M. Haque, K. M. Ibrahim Asif
    S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:303-310 [Conf]
  4. Sheikh Iqbal Ahamed, Munirul M. Haque, Karl Stamm, Ahmed J. Khan
    Wellness assistant: a virtual wellness assistant using pervasive computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:782-787 [Conf]
  5. Shameem Ahmed, Sheikh Iqbal Ahamed, Moushumi Sharmin, Munirul M. Haque
    Self-healing for autonomic pervasive computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:110-111 [Conf]
  6. Sheikh Iqbal Ahamed, Moushumi Sharmin, Shameem Ahmed, Munirul M. Haque, Ahmed J. Khan
    Design and implementation of a virtual assistant for healthcare professionals using pervasive computing technologies. [Citation Graph (0, 0)][DBLP]
    Elektrotechnik und Informationstechnik, 2006, v:123, n:4, pp:112-120 [Journal]
  7. Munirul M. Haque, Sheikh Iqbal Ahamed, Haifeng Li, K. M. Ibrahim Asif
    An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:57-64 [Conf]
  8. Munirul M. Haque, Sheikh Iqbal Ahamed
    An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:49-56 [Conf]

  9. Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment. [Citation Graph (, )][DBLP]


  10. Service sharing with trust in pervasive environment: now it's time to break the jinx. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002