Sheikh Iqbal Ahamed
Cited by
Cited by
Intelligent mobile health monitoring system (IMHMS)
R Shahriyar, M Bari, G Kundu, SI Ahamed, M Akbar
International conference on electronic healthcare, 5-12, 2009
A smart classroom for enhancing collaborative learning using pervasive computing technology
D Yoon
2003 Annual Conference, 8.118. 1-8.118. 10, 2003
A survey of middleware for sensor network and challenges
MM Molla, SI Ahamed
2006 International Conference on Parallel Processing Workshops (ICPPW'06), 6 …, 2006
A privacy preserving framework for RFID based healthcare systems
F Rahman, MZA Bhuiyan, SI Ahamed
Future generation computer systems 72, 339-352, 2017
Better physical activity classification using smartphone acceleration sensor
M Arif, M Bilal, A Kattan, SI Ahamed
Journal of medical systems 38 (9), 1-10, 2014
CAT: a context-aware trust model for open and dynamic systems
MG Uddin, M Zulkernine, SI Ahamed
Proceedings of the 2008 ACM symposium on Applied computing, 2024-2029, 2008
ePet: When cellular phone learns to recognize its owner
M Tamviruzzaman, SI Ahamed, CS Hasan, C O'brien
Proceedings of the 2nd ACM workshop on Assurable and usable security …, 2009
Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments
M Hoque, F Rahman, SI Ahamed, JH Park
Wireless personal communications 55 (1), 65-79, 2010
Security in pervasive computing: Current status and open issues
M Haque, SI Ahamed
International Journal of Network Security, 2006
Marks (middleware adaptability for resource discovery, knowledge usability and self-healing) for mobile devices of pervasive computing environments
M Sharmin, S Ahmed, SI Ahamed
Third International Conference on Information Technology: New Generations …, 2006
A reference architecture for improving security and privacy in internet of things applications
ID Addo, SI Ahamed, SS Yau, A Buduru
2014 IEEE International conference on mobile services, 108-115, 2014
Preventing multi-query attack in location-based services
N Talukder, SI Ahamed
Proceedings of the third ACM conference on Wireless network security, 25-36, 2010
ERAP: ECC based RFID authentication protocol
SI Ahamed, F Rahman, E Hoque
2008 12th IEEE International Workshop on Future Trends of Distributed …, 2008
An omnipresent formal trust model (FTM) for pervasive computing environment
MM Haque, SI Ahamed
31st annual international computer software and applications conference …, 2007
An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments
M Sharmin, S Ahmed, SI Ahamed
Fourth Annual IEEE International Conference on Pervasive Computing and …, 2006
A mobile intelligent interruption management system
S Zulkernain, P Madiraju, SI Ahamed, K Stamm
Journal of Universal Comupter Science, 2010
Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments
SI Ahamed, MM Haque, ME Hoque, F Rahman, N Talukder
Journal of Systems and Software 83 (2), 253-270, 2010
A feature extraction method for realtime human activity recognition on cell phones
M Khan, SI Ahamed, M Rahman, RO Smith
Proceedings of 3rd International Symposium on Quality of Life Technology …, 2011
Privacy in pervasive computing and open issues
P Bhaskar, SI Ahamed
The Second International Conference on Availability, Reliability and …, 2007
SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments
M Sharmin, S Ahmed, SI Ahamed
International Conference on Information Technology: Coding and Computing …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20