تجاوز إلى المحتوى الرئيسي
User Image

Sk Md Mizanur Rahman

Assistant Professor

Faculty Members

علوم الحاسب والمعلومات
Building No. 31, Room No: 2101, College of Computer and Information Science, King Saud University, Riyadh, KSA
صفحة

Publications

Summary of Publications

Patent -  1
Journals -  Published/Accepted: 17
Conference/workshop proceedings - Published/Accepted: 28
Book Chapters - Published/Accepted: 2
Cryptology ePrint Archive – Published: 2
 

Patent (1)

[53]  SK MD Mizanur RAHMAN, James Muir “System and method for generating and protecting cryptographic keys”. WIPO (World Intellectual Property Organization), Pub. No.: WO/2013/116916, International Application No.: PCT/CA2012/000114, Publication Date: 15.08.2013, International Filing Date: 09.02.2012
 

Refereed Journal Articles (17)

[52]   Sk. Md. Mizanur Rahman, M. Anwar Hossain, Mohammad Mehedi Hassan, Atif Alamri, Abdullah Alghamdi, Mukaddim Pathan, “Secure Privacy Vault Design for Distributed Multimedia Surveillance System”, Future Generation Computer Systems (to appear)
 
[51]   Sk. Md. Mizanur Rahman, Mehedi Masud, Ali N M Noman, Atif Alamri and Mohammad Mehedi Hassan, “Towards Secure Data Exchange in Peer-to-Peer Data Management Systems”, Applied Mathematics & Information Sciences, Volume 8, No. 6, pp: 2775-2787, 2014.
 
[50]    Mehedi Masud, Sk. Md. Mizanur Rahman, "Secure Data Exchange in P2P Data Sharing Systems in eHealth Perspective", IJCSI  International Journal of Computer Science Issues, ISSN (Online): 1694-0814 Vol. 9, Issue 6, No 2, pp. 36-42, November 2012
 
[49]    Sk. Md. M. Rahman, M. A. Hossain, H. Mouftah, A. El Saddik, E. Okamoto, “Chaos-Cryptography Based Privacy Preservation Technique for Video Surveillance”, Multimedia Systems Journal (MSJ), Special Issue on “Privacy-aware Multimedia Surveillance Systems”, Volume 18, Number 2, pp.145-155, 2012.
 
[48]    Sk. Md. M. Rahman, K. El-Khatib, “Private Key Agreement and Secure Communication for Heterogeneous Sensor Networks”, Journal of Parallel and Distributed Computing (JPDC), © Elsevier Inc, Volume 70, Issue 8, pp. 858-870, 2010.
 
[47]    Sk. Md. M. Rahman, K. El-Khatib, “Secure Anonymous Communication for Wireless Sensor Networks based on Pairing over Elliptic Curves”, Journal of Interconnection Networks (JOIN): special issue on Distributed and Mobile Systems., World Scientific Publishing Company, Volume: 10, Issue: 4, pp. 459-479, 2009.
 
[46]    Sk. Md. M. Rahman, N. Nasser, T. Taleb, “Secure Timing Synchronization for Heterogeneous Sensor Networks using Pairing over Elliptic Curve”, Online Available at Wireless Communications and Mobile Computing Journal (WCM): special issue on Quality of Service and Security in Wireless and Mobile Networks, John Wiley & Sons, Ltd, (Published Online:  5 Jan 2009) Volume 10, Issue 5, pp. 662 – 671, 2010.
 
[45]    Sk. Md. M. Rahman, N. Nasser, A. Inomata, T. Okamoto, M. Mambo and E. Okamoto, “Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks”, Security and Communication Network Journal (SCN), ISSN: 1939-0114, Vol. 1, Issue. 2, Copyright © 2008 John Wiley & Sons, Ltd., Pages.179-189, March/ April 2008.
          Online: Security and Communication Networks, ISSN: 1939-0122, Copyright © 2008 John Wiley & Sons, Ltd. [DOI: 10.1002/sec.4]
 
[44]   Sk. Md. M. Rahman, A. Inomata, M. Mambo and E. Okamoto, “Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks”, IPSJ (Information Processing Society of Japan ) Journal, Japan, ISSN 0387-5806, Vol. 47, Number 8, pp. 2396-2408, August 2006.
Online: IPSJ Digital Courier, ISSN 1349-7456, Vol. 2, pp.524-536, 9th August 2006.
(“IPSJ Digital Courier Funai Young Researcher Encouragement Award”, March 27, 2007), [DOI:10.2197/ipsjdc.2.524]
 
[43]    M.L. Rahman, S. Rafique, M.I. Jabiullah and Sk. Md. M. Rahman, “Hash Function Generation for Encryption-free Message Authentication”, Dhaka University Journal of Science, University of Dhaka, Bangladesh, ISSN 1022-2502, vol. 54, N0. 1, pp.71-73, January 2006.
 
[42]    M.L. Rahman, S. Rafique, M.I. Jabiullah and Sk. Md. M. Rahman, “Strong Authentication Using Pseudo-Random Bit Stream”, Dhaka University Journal of Science, University of Dhaka, Bangladesh, ISSN 1022-2502, Vol. 54, No. 1, pp. 59-61, January 2006.
 
[41]    Sk. Md. M. Rahman, M. I. Jabiullah and M. L. Rahman, “Session Key Generation for Message Authentication using Conventional Encryption Techniques”, Journal of Electrical Engineering, The Institute of Engineers, Bangladesh (JEE–IEB), ISSN 0379 – 4318, Vol.  EE 29, No. 2, December 2001, &  Vol . EE 30, No. 1, Reg. No . 13/76, pp. 8-12, June 2002.
 
[40]    M.S. Islam, Sk. Md. M. Rahman, S.M. Masum, S. Parveen, and S. Rafique, “DWDM Technology: Implementation on A Unidirectional System Through Algorithmic Approach”, Journal of Electrical Engineering, The Institution of Engineers, Bangladesh (JEE–IEB), ISSN 0379-4318, Vol. EE 29, No. 2, December 2001 & Vol. EE 30, No. 1, Reg. No. 13/76, pp. 13-17, June 2002.
 
[39]    Sk. Md. M. Rahman, S.M. Masum, M.S.I. Khan, M.S. Alam, and M.I. Hasan, “A New Message Digest Function for Message Authentication”, WSEAS Transactions on Computers, USA, ISSN 1109–2750, Vol. 3, Issue 5, pp. 1466 – 1469, November 2004.
 
[38]    M.I.Jabiullah, Sk. Md. M. Rahman, M.A.Hossain and M.L.Rahman, “Pseudorandom Bit String for Cryptographic Applications”, Dhaka University Journal of Science, University of Dhaka, Bangladesh, ISSN 1022-2502, Vol. 52, No.2, pp: 260-264, January 2004.
 
[37]    M. I. Jabiullah, Sk. Md. M. Rahman, M.L. Rahman and M. A. Hossain, “Pseudorandom Bit  String Generation for Secure Electronic Transactions”, Nuclear Science and Applications, Bangladesh Atomic Energy Commission, Dhaka, Bangladesh, ISSN 1016-197X, Vol. 12, Number 1, 2. pp. 59-61, December 2003.
 
[36]    M.I. Jabiullah, M. Rahman, Sk. Md. M. Rahman and M.L. Rahman “Encryption with Randomly Chosen Base Conversion and Special Symbols”, Nuclear Science and Applications, Bangladesh Atomic Energy Commission, Dhaka, Bangladesh, ISSN 1016-197X, Vol. 12, Number 1, 2. pp. 53-57, December 2003.
 

Conference Papers - Accepted/Published (28)

[35]    S. M. Kamruzzaman, Abdullah Alghamdi, and Sk. Md. Mizanur Rahman, "Spectrum and Energy Aware Multipath Routing for Cognitive Radio Ad Hoc Networks", International Conference on ICT Convergence 2014 - Communication Networks and Future Internet Technologies, October 22-24, Busan, Korea, 2014. (accepted)
 
[34]  Sk Md Mizanur Rahman, "Towards Integrity Protection of Software for eHealth Data", IEEE International Conference Multimedia & Expo, The 4th International IEEE Workshop on Multimedia Services and Technologies for E-health (MUST-EH 2014), July 14-18, Chengdu, China, 2014.
 
[33]   Fattoh Al-Qershi, Muhammad Al-Qurishi, Sk Md Mizanur Rahman, and Atif Al-Amri, "Android vs. iOS: The Security Battle”, World Congress on Computer Applications and Information Systems (WCCAIS), 17-19 Jan, Hammamet, Tunisia, 2014.
 
[32]   M Anwar Hossain, Sk Md Mizanur Rahman, “Towards Privacy Preserving Multimedia Surveillance System: A Secure Privacy Vault Design”. International Symposium on Biometrics and Security Technologies (ISBAST), 2 Jul - 5 Jul 2013, Sichuan, China, 2013
 
[31]    Sk. Md. M. Rahman, Md. M. Masud, C. Adams, K. El-Khatib, H. Mouftah and E. Okamoto, “Cryptographic Security Models for eHealth P2P Database Management Systems Network”, IEEE 2011 Ninth Annual Conference on Privacy, Security and Trust (PST2011), July 19-21, Montreal, Quebec, Canada, 2011.
 
[30]    Sk. Md. M. Rahman, Md. M. Masud, C. Adams, H. Mouftah and A. Inomata, “Session-wise Private Data Exchange in eHealth Peer-to-Peer Database Management Systems” IEEE International Conference on Intelligence and Security Informatics (ISI2011), July 9-12, Beijing, China, 2011.
 
[29]    A. N M Noman, Sk. Md. M. Rahman, and C. Adams, “Improving Security and Usability of Low Cost  RFID Tags”, IEEE 2011 Ninth Annual Conference on Privacy, Security and Trust (PST2011), July 19-21, Montreal, Quebec, Canada, 2011.
[28]    A. Inomata, T. Morikawa, M. Ikebe, Y. Okamoto, S. Noguchi, K. Fujikawa, H. Sunahara, Sk. Md. M. Rahman, “Proposal and Evaluation of Dynamic Resource Allocation Method Based on Load of VMs on IaaS” 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011), ISSN: 2157-4952, DOI: 10.1109/NTMS.2011.5720603, 7 - 10 February, Paris, France, pp.1-6, 2011
 
[27]    Sk. Md. M. Rahman, M. A. Hossain, H. Mouftah, A. El Saddik, E. Okamoto, “A Real-Time Privacy-Sensitive Data Hiding Approach Based On Chaos Cryptography”, IEEE International Conference on Multimedia and Expo (ICME 2010), Singapore, pp. 72-77, 2010.
 
[26]    J. Israr, M. Guennoun, H. Mouftah, Sk. Md. M. Rahman, “Credible-BGP: Use of hybrid cryptosystem to secure BGP”, IEEE Global Communications Conference 2010 (IEEE GLOBECOM 2010), ISSN: 1930-529X, DOI: 10.1109/GLOCOM.2010.5684004, 6-10 Dec. 2010, Miami, FL, USA, pp.1 - 6, 2010.
 
[25]    S. U. Hashmi, Sk. Md. M. Rahman, H. Mouftah,  N. D. Georganas, “Reliability Model for Extending Cluster Lifetime using Backup Cluster Heads in Cluster-Based Wireless Sensor Networks”, 2010 IEEE 6th International Conference on  Wireless and Mobile Computing, Networking and Communications (WiMob 2010), E-ISBN: 978-1-4244-7741-8, DOI: 10.1109/WIMOB.2010.5645024, 11-13 Oct. 2010, Niagara Falls, ON, Canada, pp. 479-485, 2010.
 
[24]    M. Guennoun, N. Abbad, J. Talom, Sk. Md. M. Rahman, and K. El-Khatib, “Continuous Authentication by Electrocardiogram Data” 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH 2009), ISBN: 978-1-4244-3877-8, DOI: 10.1109/TIC-STH.2009.5444466, 26-27 September, Toronto, ON, Canada, pp. 40 – 42, 2009. 
 
[23]    Sk. Md. M. Rahman, N. Nasser, T. Taleb, “Pairing-based Secure Timing Synchronization for Heterogeneous Sensor Networks”, IEEE Global Communications Conference 2008 (IEEE GLOBECOM 2008), DOI:10.1109/GLOCOM.2008.ECP.36; ISSN: 1930-529X; ISBN: 978-1-4244-2324-8; 30th November–4th December, New Orleans, LA, USA, pp. 1-5, 2008. (Acceptance rate: 36.8%)
 
[22]    Sk. Md. M. Rahman, N. Nasser, A. Inomata, “Private Communication and Authentication Protocol for Wireless Sensor Networks”, The Second International Conference on new Technologies, Mobility and Security (NTMS’2008), Technically sponsored by the IEEE Communications Society and IFIP TC6, 5-7 November 2008, Tangier, Morocco, ISBN: 978-1-42443547-0; DOI: 10.1109/NTMS.2008.ECP.80; pp.1-6, 2008. (Acceptance rate: 37%)
 
[21]    Sk. Md. M. Rahman, N. Nasser and K. Saleh, “Identity and Pairing-based Secure Key Management Scheme for Heterogeneous Sensor Networks”, Proceedings of 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2008), October 12-14, Avignon, France, ISBN: 978-0-7695-3393-3; pp. 423-428, 2008. (Acceptance rate: 23%)
 
[20]    Sk. Md. M. Rahman, A. Inomata, T. Okamoto, M. Mambo and E. Okamoto, “Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks”, Proceedings of the First International Conference on Ubiquitous Convergence Technology (ICUCT2006), Jeju, Korea, December 5-6, 2006, Lecture Notes in Computer Science LNCS 4412, © Springer-Verlag Berlin Heidelberg, F. Stajano et al. (Eds.): pp. 140–149, 2007. (Acceptance rate: 5%)
 
[19]    Sk. Md. M. Rahman, A. Inomata, M. Mambo and E. Okamoto, An Anonymous On-Demand Position-based Routing in Mobile Ad Hoc Networks”, Proceedings of The 2006 Symposium on Applications & the Internet (SAINT-2006), Mesa/Phoenix, Arizona, USA, IEEE Computer Society Order Number P2508, Library of Congress Number 2005937742, ISBN 0-7695-2508-3, pp. 300-306, January 23-27, 2006. (Acceptance rate: 30%)
 
[18]    A. Inomata, Sk. Md. M. Rahman, T. Okamoto, and E. Okamoto, A Novel Mail Filtering Method Against Phishing”, 2005 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM '05), Victoria BC, Canada, IEEE Catalog Number: 05CH37690C, ISBN: 0-7803-9196-9, pp. 221-224, August 24-26, 2005.
 
[17]    S.M. Masum, Sk. Md. M. Rahman, M. Ali, and M.S.I. Khan, “On the Design of Segmented Display for Bengali Digits”, Proceedings of the 8th International Conference on Computer and Information Technology (ICCIT 2005), Islamic University of Technology, Gazipur 1704, Bangladesh, ISBN 984–32–2873–1, pp. 1120 – 1123, December 28–30, 2005.
 
[16]    Sk. Md. M. Rahman and E. Okamoto, A Quantum Sorting Technique”, Proceedings of the 7th International Conference on Computer and Information Technology (ICCIT 2004), Brac University, Dhaka, Bangladesh, ISBN 984-32-1836-1, pp. 32-35, December 26–28, 2004. (Acceptance rate: 25%).
 
[15]    Sk. Md. M. Rahman, S.M. Masum, M.S.I. Khan, M.S. Alam, and M.I. Hasan, “A New Message Digest Function for Message Authentication”, Proceedings of the 4th International Conference on Information Science and Applications (ISA 2004) , Miami, Florida, USA, ISBN 960–8052–97–1, April 21–23, 2004.
 
[14]    M. I. Jabiullah, A.A. Shamim, Sk. Md. M. Rahman, M.L. Rahman “Session  Key Generation  using Conventional Encryption  Techniques”, Proceedings of the 6th  International Conference on Computer & Information Technology (ICCIT 2003), Jahangirnagar University, Dhaka 1342, Bangladesh. ISBN 984 -584- 005-1, pp. 200–205, December 19-21, 2003.
 
[13]    M.S. Islam, Sk. Md. M. Rahman, S.M. Masum, S. Parveen, and S. Rafique, “DWDM Technology: Implementation on A Unidirectional System through Algorithmic Approach”, Proceedings of the 4th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2003), Chengdu, Sichuan, China, IEEE Catalog No. 03EX684, ISBN 0–7803–7840–7, Library of Congress 2003101499, pp. 282 – 285, August 27–29, 2003.
 
[12]    Sk. Md. M. Rahman, S.M. Masum, M.S.I. Khan, M.L. Rahman, and E. Okamoto, “Message Digest and Integrity Checking using Hash Function”, Proceedings of the 6th International Conference on Computer and Information Technology (ICCIT 2003), Jahangirnagar University, Dhaka 1342, Bangladesh, ISBN 984–584–005–1, Vol. I, pp. 136–138, December 19–21, 2003.
 
[11]    S.M. Masum, M.S.I. Khan, Sk. Md. M. Rahman, and M. Ali, “Designing 10–Segment Display for Bangla Digits”, Proceedings of the 3rd International Conference on Electrical, Electronics and Computer Engineering (ICEECE 2003), Stamford University Bangladesh, Dhaka 1217, Bangladesh, ISBN 984–31–1528–7, pp. 161–164, December 22–24, 2003.
 
[10]   M.I. Jabiullah, Sk. Md. M. Rahman and M.L.Rahman, “Session-Key Generation for Secure Electronic Transactions”, Proceedings of the Industrial Solution (Technical Track) Session, of the International Conference on Applied Cryptography and Network Security (ACNS 2003), Kunming, China, Published by the International Communications and Information Security Association (ICISA), October 16-19, 2003.
 
[9]     M. I. Jabiullah, Sk. Md. M. Rahman and M. L. Rahman, “Session Key Generation For Message Authentication Using Conventional Encryption Techniques”, Proceedings of the 3rd International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT' 02), Kanazawa Bunka Hall, Kanazawa, Japan, ISBN 4-9900330-2-73-6, pp.  278–282, September 3-6, 2002.
 
[8]     M. I. Jabiullah, Sk. Md. M. Rahman, M.L. Rahman and M. A. Hossain, “Secure Pseudorandom Bit Generation For Cryptographic Applications”, Proceedings of the 4th International Conference on Computer and Information Technology (ICCIT 2001), University of Dhaka, Dhaka, Bangladesh. ISBN 984-32-015-2, pp. 275 – 277, December 28–29, 2001.
 

Book Chapter (2)

[7]     Sk. Md. M. Rahman, H. Mouftah, "Security and Privacy Issues in Pervasive Communications ", in Handbook of Pervasive Computing. (to appear)
 
[6]     Sk. Md. M. Rahman, N.Nasser, T. El Salti, "Security in Wireless Sensor Networks", in Handbook of RFID and Sensor Networks: Architectures, Protocols, Security and Integrations, edited by Y. Zhang et al. ISBN-10: 1420077775, ISBN-13: 978-1420077773, CRC Press, Taylor & Francis Group, USA, PP.409-445, November 4, 2009.

Cryptology ePrint Archive (2)

[5]      Sk. Md. M. Rahman, et al., “Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems”, available as a technical report. [http://eprint.iacr.org/2010/085]
 
[4]      Sk. Md. M. Rahman, et al., “Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks”, available as a technical report. [http://eprint.iacr.org/2006/328]

Local Symposium Proceedings (3)

[3]     Sk. Md. M. Rahman, A. Inomata, T. Okamoto, M.Mambo, and E. Okamoto, “Anonymous Communication in Wireless Mobile Ad-hoc Networks”, Proceedings of the Computer Security Symposium 2006 (CSS2006), Kyoto, Japan, Information Processing Society of Japan, IPSJ Symposium Series Vol. 2006, No.11, ISSN 1344-0640, pp. 375-380, October 25-27, 2006.
 
[2]     A. Inomata, Sk. Md. M. Rahman, T. Okamoto, and E. Okamoto, “Propose of Mail Filter Method Against Phishing”, Proceedings of the 2005 Symposium on Cryptography and Information Security (SCIS 2005), Kobe, Japan, pp. 193-198, January 25th - 28th, 2005.
 
[1]     Sk. Md. M. Rahman and E. Okamoto, “A Partial Image Encryption Based on the Center Point and Chaotic System”, Proceedings of the Computer Security Symposium 2004 (CSS2004), Hokkaido University, Hokkaido, Japan, Information Processing Society of Japan, IPSJ, Symposium Series Vol. 2004, No.11, ISSN 1344-0640, pp. 673-677,  October 20-22, 2004.