Intelligent mobile health monitoring system (IMHMS) R Shahriyar, M Bari, G Kundu, SI Ahamed, M Akbar International conference on electronic healthcare, 5-12, 2009 | 181 | 2009 |
A smart classroom for enhancing collaborative learning using pervasive computing technology D Yoon 2003 Annual Conference, 8.118. 1-8.118. 10, 2003 | 163 | 2003 |
A survey of middleware for sensor network and challenges MM Molla, SI Ahamed 2006 International Conference on Parallel Processing Workshops (ICPPW'06), 6 …, 2006 | 158 | 2006 |
A privacy preserving framework for RFID based healthcare systems F Rahman, MZA Bhuiyan, SI Ahamed Future generation computer systems 72, 339-352, 2017 | 95 | 2017 |
Better physical activity classification using smartphone acceleration sensor M Arif, M Bilal, A Kattan, SI Ahamed Journal of medical systems 38 (9), 1-10, 2014 | 92 | 2014 |
CAT: a context-aware trust model for open and dynamic systems MG Uddin, M Zulkernine, SI Ahamed Proceedings of the 2008 ACM symposium on Applied computing, 2024-2029, 2008 | 78 | 2008 |
ePet: When cellular phone learns to recognize its owner M Tamviruzzaman, SI Ahamed, CS Hasan, C O'brien Proceedings of the 2nd ACM workshop on Assurable and usable security …, 2009 | 74 | 2009 |
Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments M Hoque, F Rahman, SI Ahamed, JH Park Wireless personal communications 55 (1), 65-79, 2010 | 71 | 2010 |
Security in pervasive computing: Current status and open issues M Haque, SI Ahamed International Journal of Network Security, 2006 | 70 | 2006 |
Marks (middleware adaptability for resource discovery, knowledge usability and self-healing) for mobile devices of pervasive computing environments M Sharmin, S Ahmed, SI Ahamed Third International Conference on Information Technology: New Generations …, 2006 | 69 | 2006 |
A reference architecture for improving security and privacy in internet of things applications ID Addo, SI Ahamed, SS Yau, A Buduru 2014 IEEE International conference on mobile services, 108-115, 2014 | 65 | 2014 |
Preventing multi-query attack in location-based services N Talukder, SI Ahamed Proceedings of the third ACM conference on Wireless network security, 25-36, 2010 | 63 | 2010 |
ERAP: ECC based RFID authentication protocol SI Ahamed, F Rahman, E Hoque 2008 12th IEEE International Workshop on Future Trends of Distributed …, 2008 | 63 | 2008 |
An omnipresent formal trust model (FTM) for pervasive computing environment MM Haque, SI Ahamed 31st annual international computer software and applications conference …, 2007 | 63 | 2007 |
An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments M Sharmin, S Ahmed, SI Ahamed Fourth Annual IEEE International Conference on Pervasive Computing and …, 2006 | 62 | 2006 |
A mobile intelligent interruption management system S Zulkernain, P Madiraju, SI Ahamed, K Stamm Journal of Universal Comupter Science, 2010 | 61 | 2010 |
Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments SI Ahamed, MM Haque, ME Hoque, F Rahman, N Talukder Journal of Systems and Software 83 (2), 253-270, 2010 | 59 | 2010 |
A feature extraction method for realtime human activity recognition on cell phones M Khan, SI Ahamed, M Rahman, RO Smith Proceedings of 3rd International Symposium on Quality of Life Technology …, 2011 | 54 | 2011 |
Privacy in pervasive computing and open issues P Bhaskar, SI Ahamed The Second International Conference on Availability, Reliability and …, 2007 | 53 | 2007 |
SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments M Sharmin, S Ahmed, SI Ahamed International Conference on Information Technology: Coding and Computing …, 2005 | 52 | 2005 |