Dr. Mohammad Shahriar Rahman
Associate Professor
PhD
Publications
Total Publications
78
Q1 Publications
0
Last 2 Years (Excl. Current)
9
This Year
0
CNN Based Deep Learning Modeling with Explainability Analysis for Detecting Fraudulent Blockchain Transactions
2025Benchmarking Fully Homomorphic Encryption Libraries in IoT Devices
2024Cloud Forensic: Issues, Challenges, and Solution Models
2024Deep Learning for Agile Malware Detection
2024Design and Development of an IoT Based Smart Vaccine Carrier and Real-Time Monitoring System
2024Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis
2024E Hasan, H Das, NI Shourav, R Hossain, MS Rahman, MMA Shibly
2024Enhancing Malware Detection Through Convolutional Neural Networks and Explainable AI
2024ThreatScan-Strengthening Website Security with Predictive Analytics Using Machine Learning Model
20242024 World Scientific Publishing Company
2023An Anti-Counterfeiting Architecture Ensuring Authenticity and Traceability for Expensive Medicines Using QR Codes
2023A systematic literature review of blockchain-based e-KYC systems
2023Blockchain-Based Secure Medical Data Management with Enabling IoT
2023Cloud Computing: An Overview of Security Risk Assessment Models and Frameworks
2023Cyber-Physical Energy Systems Security: Attacks, Vulnerabilities and Risk Management
2023On the (in) security of the control plane of sdn architecture: A survey
2023Secure and Transparent Supply Chain Management to Prevent Counterfeit
2022A Transparent and Privacy-Preserving Healthcare Platform With Novel Smart Contract for Smart Cities
2021Development of a monitoring system and power management for an IoT based vaccine carrier
2021Secure and Transparent Supply Chain Management to Prevent Counterfeit Drugs
2021Towards a location-aware blockchain-based solution to distinguish fake news in social media
2021Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol
2021Accountable cross-border data sharing using blockchain under relaxed trust assumption
2020An Efficient Routing Protocol for Secured Communication in Cognitive Radio Sensor Networks
2020An IoT based real-time data-centric monitoring system for vaccine cold chain
2020Digital Surveillance Systems for Tracing COVID-19: Privacy and Security Challenges with Recommendations
2020Hidechain: A user-centric secure edge computing architecture for healthcare iot devices
2020Integrating blockchain with artificial intelligence for privacy-preserving recommender systems
2020Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities
2020Demographic Factors of Cybersecurity Awareness in Bangladesh
2019Privacy-friendly platform for healthcare data in cloud based on blockchain environment
2019Towards privacy-preserving recommender system with blockchains
2019Blockstore: A secure decentralized storage framework on blockchain
2018Crab: Blockchain based criminal record management system
2018PPM: Privacy Policy Manager for Home Energy Management System.
2018Record Management System
2018A Miyaji, MS Rahman, M Soshi
2017Cybersecurity awareness survey: An analysis from Bangladesh perspective
2017Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction.
2017Medibchain: A blockchain based privacy preserving platform for healthcare data
2017MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data.[In:] Security, Privacy, and Anonymity in Computation, Communication, and Storage. Wang G …
2017On blockchain-based anonymized dataset distribution platform
2017On blockchain-based authorization architecture for beyond-5G mobile services
2017Optimizing share size in efficient and robust secret sharing scheme for big data
2017Privacy-friendly secure bidding for smart grid demand-response
2017Robust ORAM: Enhancing Availability, Confidentiality and Integrity
2017Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation
2017Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017
2017Towards outsourced privacy-preserving multiparty DBSCAN
2017VIGraph–A Framework for Verifiable Information
2017A Model for Personalised Perception of Policies
2016Decentralized ciphertext-policy attribute-based encryption from learning with errors over rings
2016On the Leakage Resilient Cryptography in Game-Theoretic Settings
2016Secure bike sharing system for multi-modal journey
2016User-in-a-context: A blueprint for context-aware identification
2016Generic constructions of secure‐channel free searchable encryption with adaptive security
2015Privacy-friendly secure bidding scheme for demand response in smart grid
2015Secure and Private Bidding Protocol for Incentive-Based Demand-Response System of Smart Grid
2015Privacy-preserving two-party k-means clustering in malicious model
2013Private multiparty set intersection protocol in rational model
2013A secure and private RFID authentication protocol under SLPN problem
2012Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure.
2012Designing privacy preserving cryptographic protocols
2012Dynamic attribute-based signcryption without random oracles
2012Efficient and low-cost rfid authentication schemes
2012Kimap: Key-insulated mutual authentication protocol for RFID
2012Privacy-preserving set operations in the presence of rational parties
2012Privacy-preserving two-party rational set intersection protocol
2012Private Two-Party Set Intersection Protocol in Rational Model.
2012Ideal secret sharing schemes with share selectability
2011Privacy-preserving data mining: a game-theoretic approach
2011Toward dynamic attribute-based signcryption (poster)
2011Aprap: Another privacy preserving rfid authentication protocol
2010Efficient privacy-preserving data mining in malicious model
2010Hidden credential retrieval without random oracles
2010Privacy-preserving data mining in presence of covert adversaries
2010A secure RFID authentication protocol with low communication cost
2009On Security and Privacy Enhanced Authentication of RFID
2009Research Interest
No research interest information available.
No resume/CV available.
No additional information available.
No routine information available.
No educational qualification information available.
No course information available.