EASiER: Encryption-based access control in social networks with efficient revocation S Jahid, P Mittal, N Borisov Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 591 | 2011 |
DECENT: A decentralized architecture for enforcing privacy in online social networks S Jahid, S Nilizadeh, P Mittal, N Borisov, A Kapadia 2012 IEEE International Conference on Pervasive Computing and Communications …, 2012 | 174 | 2012 |
Cachet: a decentralized architecture for privacy preserving social networking with caching S Nilizadeh, S Jahid, P Mittal, N Borisov, A Kapadia Proceedings of the 8th international conference on Emerging networking …, 2012 | 167 | 2012 |
Piratte: Proxy-based immediate revocation of attribute-based encryption S Jahid, N Borisov arXiv preprint arXiv:1208.4877, 2012 | 39 | 2012 |
MyABDAC: compiling XACML policies for attribute-based database access control S Jahid, CA Gunter, I Hoque, H Okhravi Proceedings of the first ACM conference on Data and application security and …, 2011 | 32 | 2011 |
Secure key management protocol for distributed network encryption S Jahid, G Chandrashekhar, B Qian, A Feroz US Patent 10,798,073, 2020 | 23 | 2020 |
Enhancing database access control with xacml policy S Jahid, I Hoque, H Okhravi, CA Gunter Proceedings of the ACM Conference on Computer and Communications Security …, 2009 | 12 | 2009 |
Using rhythmic nonces for puzzle-based dos resistance EM Chan, CA Gunter, S Jahid, E Peryshkin, D Rebolledo Proceedings of the 2nd ACM workshop on Computer security architectures, 51-58, 2008 | 9 | 2008 |
Assessing environmental flow for the Kobadak River and developing a framework for its maintenance S Abu Jahid Institute of Water and Flood Management (IWFM), 2016 | 4 | 2016 |
Enhancing security and privacy in online social networks S Jahid, N Borisov Technical Report, 2012 | 4 | 2012 |
Enhancing Database Access Control with XACML Policy, poster at 16th ACM Conference on Computer and Communications Security S Jahid, I Hoque, H Okhravi, CA Gunter | 2 | 2009 |
Social networking: Security, privacy, and applications S Jahid University of Illinois at Urbana-Champaign, 2013 | 1 | 2013 |
Cachet S Nilizadeh, S Jahid, P Mittal, N Borisov, A Kapadia Proceedings of the 8th international conference on Emerging networking …, 2012 | 1 | 2012 |
Secure key management protocol for distributed network encryption S Jahid, G Chandrashekhar, B Qian, A Feroz US Patent 11,533,301, 2022 | | 2022 |
System and method for managing secret information using virtualization J Zhang, G Chandrashekhar, S Jahid, AV Patil, S Sundararaman US Patent 10,516,528, 2019 | | 2019 |
A Decentralized Architecture for Enforcing Privacy in Online Social Networks S Jahid, S Nilizadeh, P Mittal, N Borisov, A Kapadia CoRR, 2011 | | 2011 |
A Web Service based Architecture for Ubiquitous Computing Applications I Hoque, S Jahid, MM Akbar BANGLADESH UNIVERSITY OF ENGINEERING AND TECHNOLOGY, 2005 | | 2005 |
Auditable Anonymity S Jahid, N Borisov | | |
SECURITY ISSUES OF WEB SERVER S Jahid, I Hoque, M Hafiz | | |
Mail2Phone: Connecting E-mail to Telephone I Hoque, S Jahid | | |