default search action
Mohammad Shahriar Rahman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i8]Mohammad Hasan, Mohammad Shahriar Rahman, Helge Janicke, Iqbal H. Sarker:
Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis. CoRR abs/2401.03530 (2024) - 2023
- [j15]Zaheed Ahmed Bhuiyan, Salekul Islam, Md. Motaharul Islam, A. B. M. Ahasan Ullah, Farha Naz, Mohammad Shahriar Rahman:
On the (in)Security of the Control Plane of SDN Architecture: A Survey. IEEE Access 11: 91550-91582 (2023) - [j14]Md. Abdul Hannan, Md. Atik Shahriar, Md. Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Mohammad Shahriar Rahman:
A systematic literature review of blockchain-based e-KYC systems. Computing 105(10): 2089-2118 (2023) - [i7]Sayada Sonia Akter, Mohammad Shahriar Rahman:
Cloud Forensic: Issues, Challenges and Solution Models. CoRR abs/2303.06313 (2023) - 2021
- [j13]Abdullah Al Omar, Abu Kaisar Jamil, Amith Khandakar, Abdur Razzak Uzzal, Rabeya Bosri, Nafees Mansoor, Mohammad Shahriar Rahman:
A Transparent and Privacy-Preserving Healthcare Platform With Novel Smart Contract for Smart Cities. IEEE Access 9: 90738-90749 (2021) - [j12]Tran Phuong Thao, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan, Ayumu Kubota, Shinsaku Kiyomoto, Kazumasa Omote:
Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data. IEEE Trans. Big Data 7(4): 703-716 (2021) - [j11]Rabeya Bosri, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan, Abdullah Al Omar:
Integrating Blockchain With Artificial Intelligence for Privacy-Preserving Recommender Systems. IEEE Trans. Netw. Sci. Eng. 8(2): 1009-1018 (2021) - [c34]Sharmin Akter, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan, Nafees Mansoor:
Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol. INFOCOM Workshops 2021: 1-6 - [c33]Rakesh Ranjan, Ki-Don Lee, Md Iqbal Mahmud, Mohammad Shahriar Rahman, Pavitra Ramadevi Perepa, Charles Briscoe LaRow, Caleb Dongkyun Kwon, Maihan Nguyen, Minhyo Kang, Ashish Kumar Jha, Ahmed Shariq, Shamas Musthafa Ummer, Susannah Laure Prater, Hyunchul Sagong, HwaSung Rhee:
Systematic Study of Process Impact on FinFET Reliability. IRPS 2021: 1-5 - [c32]Wahid Sadique Koly, Abu Kaisar Jamil, Mohammad Shahriar Rahman, Hanif Bhuiyan, Md. Zakirul Alam Bhuiyan, Abdullah Al Omar:
Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media. UbiSec 2021: 116-130 - 2020
- [j10]Mohammad Shahriar Rahman, Abdullah Al Omar, Md. Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, Guojun Wang:
Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption. IEEE Trans. Engineering Management 67(4): 1476-1486 (2020) - [c31]Raisa Tahseen Hasanat, Md. Arifur Rahman, Nafees Mansoor, Nabeel Mohammed, Mohammad Shahriar Rahman, Mirza Rasheduzzaman:
An IoT based Real-time Data-centric Monitoring System for Vaccine Cold Chain. EWDTS 2020: 1-5 - [c30]Rabeya Bosri, Abdur Razzak Uzzal, Abdullah Al Omar, Md. Zakirul Alam Bhuiyan, Mohammad Shahriar Rahman:
HIDEchain: A User-Centric Secure Edge Computing Architecture for Healthcare IoT Devices. INFOCOM Workshops 2020: 376-381 - [c29]Abdullah Al Omar, Abu Kaisar Jamil, Md. Shakhawath Hossain Nur, Md Mahamudul Hasan, Rabeya Bosri, Md. Zakirul Alam Bhuiyan, Mohammad Shahriar Rahman:
Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities. TrustCom 2020: 1291-1296 - [i6]Molla Rashied Hussein, Abdullah Bin Shams, Ehsanul Hoque Apu, Khondaker Abdullah Al Mamun, Mohammad Shahriar Rahman:
Digital Surveillance Systems for Tracing COVID-19: Privacy and Security Challenges with Recommendations. CoRR abs/2007.13182 (2020) - [i5]Sharmin Akter, Mohammad Shahriar Rahman, Nafees Mansoor:
An Efficient Routing Protocol for Secured Communication in Cognitive Radio Sensor Networks. CoRR abs/2008.12895 (2020)
2010 – 2019
- 2019
- [j9]Abdullah Al Omar, Md. Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, Mohammad Shahriar Rahman:
Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Future Gener. Comput. Syst. 95: 511-521 (2019) - [c28]Abdullah Al Omar, Rabeya Bosri, Mohammad Shahriar Rahman, Nasima Begum, Md. Zakirul Alam Bhuiyan:
Towards Privacy-preserving Recommender System with Blockchains. DependSys 2019: 106-118 - 2018
- [j8]Mohammad Shahriar Rahman, Anirban Basu, Toru Nakamura, Haruo Takasaki, Shinsaku Kiyomoto:
PPM: Privacy Policy Manager for Home Energy Management System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(2): 42-56 (2018) - [c27]Sushmita Ruj, Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
BlockStore: A Secure Decentralized Storage Framework on Blockchain. AINA 2018: 1096-1103 - [c26]Maisha Afrida Tasnim, Abdullah Al Omar, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan:
CRAB: Blockchain Based Criminal Record Management System. SpaCCS 2018: 294-303 - 2017
- [j7]Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto, Md. Zakirul Alam Bhuiyan:
Privacy-friendly secure bidding for smart grid demand-response. Inf. Sci. 379: 229-240 (2017) - [j6]Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction. J. Internet Serv. Inf. Secur. 7(3): 1-16 (2017) - [c25]Shinsaku Kiyomoto, Anirban Basu, Mohammad Shahriar Rahman, Sushmita Ruj:
On blockchain-based authorization architecture for beyond-5G mobile services. ICITST 2017: 136-141 - [c24]Anirban Basu, Mohammad Shahriar Rahman, Rui Xu, Kazuhide Fukushima, Shinsaku Kiyomoto:
VIGraph - A Framework for Verifiable Information. IFIPTM 2017: 12-20 - [c23]Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto:
Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation. IWSEC 2017: 159-178 - [c22]Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Ayumu Kubota:
Robust ORAM: Enhancing Availability, Confidentiality and Integrity. PRDC 2017: 30-39 - [c21]Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
Towards Outsourced Privacy-Preserving Multiparty DBSCAN. PRDC 2017: 225-226 - [c20]Shinsaku Kiyomoto, Mohammad Shahriar Rahman, Anirban Basu:
On blockchain-based anonymized dataset distribution platform. SERA 2017: 85-92 - [c19]Abdullah Al Omar, Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data. SpaCCS Workshops 2017: 534-543 - 2016
- [c18]Mohammad Shahriar Rahman, Shinsaku Kiyomoto:
Secure Bike Sharing System for Multi-Modal Journey. BDCloud-SocialCom-SustainCom 2016: 437-444 - [c17]Anirban Basu, Stephen Marsh, Mohammad Shahriar Rahman, Shinsaku Kiyomoto:
A Model for Personalised Perception of Policies. IFIPTM 2016: 52-62 - [c16]Anirban Basu, Rui Xu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto:
User-in-a-context: A blueprint for context-aware identification. PST 2016: 329-334 - [c15]Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings. Trustcom/BigDataSE/ISPA 2016: 1759-1764 - [c14]Mohammad Shahriar Rahman, Keita Emura, Shinsaku Kiyomoto:
On the Leakage Resilient Cryptography in Game-Theoretic Settings. Trustcom/BigDataSE/ISPA 2016: 1984-1989 - 2015
- [j5]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote:
Generic constructions of secure-channel free searchable encryption with adaptive security. Secur. Commun. Networks 8(8): 1547-1560 (2015) - [c13]Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
Privacy-friendly secure bidding scheme for demand response in smart grid. ISC2 2015: 1-6 - 2013
- [c12]Rahena Akhter, Rownak Jahan Chowdhury, Keita Emura, Tamzida Islam, Mohammad Shahriar Rahman, Nusrat Rubaiyat:
Privacy-Preserving Two-Party k-Means Clustering in Malicious Model. COMPSAC Workshops 2013: 121-126 - [c11]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman:
Private Multiparty Set Intersection Protocol in Rational Model. TrustCom/ISPA/IUCC 2013: 431-438 - [i4]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote:
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security. IACR Cryptol. ePrint Arch. 2013: 321 (2013) - 2012
- [j4]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman:
Dynamic attribute-based signcryption without random oracles. Int. J. Appl. Cryptogr. 2(3): 199-211 (2012) - [j3]Atsuko Miyaji, Mohammad Shahriar Rahman:
Privacy-preserving Two-party Rational Set Intersection Protocol. Informatica (Slovenia) 36(3): 277-286 (2012) - [j2]Atsuko Miyaji, Mohammad Shahriar Rahman:
Private Two-Party Set Intersection Protocol in Rational Model. J. Internet Serv. Inf. Secur. 2(1/2): 93-104 (2012) - [c10]Atsuko Miyaji, Mohammad Shahriar Rahman:
Privacy-Preserving Set Operations in the Presence of Rational Parties. AINA Workshops 2012: 869-874 - [c9]Mohammad Saiful Islam Mamun, Atsuko Miyaji, Mohammad Shahriar Rahman:
A Secure and Private RFID Authentication Protocol under SLPN Problem. NSS 2012: 476-489 - [c8]Keita Emura, Mohammad Shahriar Rahman:
Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure. SECRYPT 2012: 84-93 - [i3]Atsuko Miyaji, Mohammad Shahriar Rahman:
APRAP: Another Privacy Preserving RFID Authentication Protocol. CoRR abs/1209.5066 (2012) - [i2]Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi:
Efficient and Low-Cost RFID Authentication Schemes. CoRR abs/1209.5076 (2012) - [i1]Atsuko Miyaji, Mohammad Shahriar Rahman:
KIMAP: Key-Insulated Mutual Authentication Protocol for RFID. CoRR abs/1209.5388 (2012) - 2011
- [j1]Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi:
Efficient and Low-Cost RFID Authentication Schemes. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(3): 4-25 (2011) - [c7]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman:
Toward Dynamic Attribute-Based Signcryption (Poster). ACISP 2011: 439-443 - [c6]Atsuko Miyaji, Mohammad Shahriar Rahman:
Privacy-Preserving Data Mining: A Game-Theoretic Approach. DBSec 2011: 186-200 - [c5]Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, Masakazu Soshi:
Ideal Secret Sharing Schemes with Share Selectability. ICICS 2011: 143-157 - 2010
- [c4]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman:
Efficient Privacy-Preserving Data Mining in Malicious Model. ADMA (1) 2010: 370-382 - [c3]Atsuko Miyaji, Mohammad Shahriar Rahman:
Privacy-Preserving Data Mining in Presence of Covert Adversaries. ADMA (1) 2010: 429-440 - [c2]Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi:
Hidden Credential Retrieval without Random Oracles. WISA 2010: 160-174
2000 – 2009
- 2009
- [c1]Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko Miyaji:
A Secure RFID Authentication Protocol with Low Communication Cost. CISIS 2009: 559-564
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint