BibTeX records: Mohammed Shafiul Alam Khan

download as .bib file

@inproceedings{DBLP:conf/wisec/KhanM17,
  author    = {Mohammed Shafiul Alam Khan and
               Chris J. Mitchell},
  title     = {Trashing {IMSI} catchers in mobile networks},
  booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
               Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
               2017},
  pages     = {207--218},
  year      = {2017},
  crossref  = {DBLP:conf/wisec/2017},
  url       = {https://doi.org/10.1145/3098243.3098248},
  doi       = {10.1145/3098243.3098248},
  timestamp = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/KhanM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KhanM16,
  author    = {Mohammed Shafiul Alam Khan and
               Chris J. Mitchell},
  title     = {Retrofitting Mutual Authentication to {GSM} Using {RAND} Hijacking},
  booktitle = {Security and Trust Management - 12th International Workshop, {STM}
               2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  pages     = {17--31},
  year      = {2016},
  crossref  = {DBLP:conf/stm/2016},
  url       = {https://doi.org/10.1007/978-3-319-46598-2\_2},
  doi       = {10.1007/978-3-319-46598-2\_2},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/KhanM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KhanM16,
  author    = {Mohammed Shafiul Alam Khan and
               Chris J. Mitchell},
  title     = {Retrofitting mutual authentication to {GSM} using {RAND} hijacking},
  journal   = {CoRR},
  volume    = {abs/1607.00729},
  year      = {2016},
  url       = {http://arxiv.org/abs/1607.00729},
  archivePrefix = {arXiv},
  eprint    = {1607.00729},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/KhanM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KhanM15,
  author    = {Mohammed Shafiul Alam Khan and
               Chris J. Mitchell},
  title     = {Improving Air Interface User Privacy in Mobile Telephony},
  booktitle = {Security Standardisation Research - Second International Conference,
               {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  pages     = {165--184},
  year      = {2015},
  crossref  = {DBLP:conf/secsr/2015},
  url       = {https://doi.org/10.1007/978-3-319-27152-1\_9},
  doi       = {10.1007/978-3-319-27152-1\_9},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secsr/KhanM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KayuniKLMY15,
  author    = {Mwawi Nyirenda Kayuni and
               Mohammed Shafiul Alam Khan and
               Wanpeng Li and
               Chris J. Mitchell and
               Po{-}Wah Yau},
  title     = {Generating Unlinkable IPv6 Addresses},
  booktitle = {Security Standardisation Research - Second International Conference,
               {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  pages     = {185--199},
  year      = {2015},
  crossref  = {DBLP:conf/secsr/2015},
  url       = {https://doi.org/10.1007/978-3-319-27152-1\_10},
  doi       = {10.1007/978-3-319-27152-1\_10},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secsr/KayuniKLMY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KhanM15,
  author    = {Mohammed Shafiul Alam Khan and
               Chris J. Mitchell},
  title     = {Improving Air Interface User Privacy in Mobile Telephony},
  journal   = {CoRR},
  volume    = {abs/1504.03287},
  year      = {2015},
  url       = {http://arxiv.org/abs/1504.03287},
  archivePrefix = {arXiv},
  eprint    = {1504.03287},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/KhanM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KhanM14,
  author    = {Mohammed Shafiul Alam Khan and
               Chris J. Mitchell},
  title     = {Another Look at Privacy Threats in 3G Mobile Telephony},
  booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
               2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  pages     = {386--396},
  year      = {2014},
  crossref  = {DBLP:conf/acisp/2014},
  url       = {https://doi.org/10.1007/978-3-319-08344-5\_25},
  doi       = {10.1007/978-3-319-08344-5\_25},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/KhanM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1202-1918,
  author    = {Md. Golam Rabiul Alam and
               Chayan Biswas and
               Naushin Nower and
               Mohammed Shafiul Alam Khan},
  title     = {A Reliable Semi-Distributed Load Balancing Architecture of Heterogeneous
               Wireless Networks},
  journal   = {CoRR},
  volume    = {abs/1202.1918},
  year      = {2012},
  url       = {http://arxiv.org/abs/1202.1918},
  archivePrefix = {arXiv},
  eprint    = {1202.1918},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1202-1918},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-6229,
  author    = {Md. Selim Reza and
               Mohammed Shafiul Alam Khan and
               Md. Golam Rabiul Alam and
               Serajul Islam},
  title     = {An Approach of Digital Image Copyright Protection by Using Watermarking
               Technology},
  journal   = {CoRR},
  volume    = {abs/1205.6229},
  year      = {2012},
  url       = {http://arxiv.org/abs/1205.6229},
  archivePrefix = {arXiv},
  eprint    = {1205.6229},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1205-6229},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1008-3321,
  author    = {Zerina Begum and
               Mohammed Shafiul Alam Khan and
               Mohd. Zulfiquar Hafiz and
               Md. Saiful Islam and
               Md. Shoyaib},
  title     = {Software Development Standard and Software Engineering Practice: {A}
               Case Study of Bangladesh},
  journal   = {CoRR},
  volume    = {abs/1008.3321},
  year      = {2010},
  url       = {http://arxiv.org/abs/1008.3321},
  archivePrefix = {arXiv},
  eprint    = {1008.3321},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1008-3321},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2017,
  editor    = {Guevara Noubir and
               Mauro Conti and
               Sneha Kumar Kasera},
  title     = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
               Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3098243},
  doi       = {10.1145/3098243},
  isbn      = {978-1-4503-5084-6},
  timestamp = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2016,
  editor    = {Gilles Barthe and
               Evangelos P. Markatos and
               Pierangela Samarati},
  title     = {Security and Trust Management - 12th International Workshop, {STM}
               2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9871},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-46598-2},
  doi       = {10.1007/978-3-319-46598-2},
  isbn      = {978-3-319-46597-5},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2015,
  editor    = {Liqun Chen and
               Shin'ichiro Matsuo},
  title     = {Security Standardisation Research - Second International Conference,
               {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9497},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-27152-1},
  doi       = {10.1007/978-3-319-27152-1},
  isbn      = {978-3-319-27151-4},
  timestamp = {Sun, 21 May 2017 00:17:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secsr/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2014,
  editor    = {Willy Susilo and
               Yi Mu},
  title     = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
               2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8544},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-08344-5},
  doi       = {10.1007/978-3-319-08344-5},
  isbn      = {978-3-319-08343-8},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier