• 150 Citations
  • 8 h-Index
20092019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Outputs

  • 150 Citations
  • 8 h-Index
  • 13 Conference proceeding contribution
  • 8 Article
Filter
Conference proceeding contribution
2019

A decade of mal-activity reporting: a retrospective analysis of Internet malicious activity blacklists

Zhao, B. Z. H., Ikram, M., Asghar, H. J., Kaafar, M. A., Chaabane, A. & Thilakarathna, K., Jul 2019, Proceedings of the 2019 ACM Asia Computer Communication and Security (AsiaCCS). New York: Association for Computing Machinery (ACM), p. 193-205 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
2 Citations (Scopus)

Private continual release of real-valued data streams

Perrier, V., Asghar, H. J. & Kaafar, D., 2019, Proceedings of the Network and Distributed System Security Symposium, NDSS 2019. Internet Society, p. 1-13 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access

When air traffic management meets blockchain technology: a blockchain-based concept for securing the sharing of flight data

Dehez Clementi, M., Larrieu, N., Lochin, E., Kaafar, M. A. & Asghar, H., 2019, 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC) Proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-10 10 p. (AIAA/IEEE Digital Avionics Systems Conference - Proceedings; vol. 2019-September).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2017

BehavioCog: an observation resistant authentication scheme

Chauhan, J., Zhao, B. Z. H., Asghar, H. J., Chan, J. & Kaafar, M. A., 2017, Financial Cryptography and Data Security: 21st International Conference, FC 2017, Revised Selected Papers. Kiayias, A. (ed.). Springer, Springer Nature, Vol. 10322 LNCS. p. 39-58 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

TouchTrack: How unique are your touch gestures?

Masood, R., Zhao, B. Z. H., Asghar, H. J. & Kaafar, M. A., 30 Oct 2017, CCS 2017: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2555-2557 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2016

Gesture-based continuous authentication for wearable devices: The smart glasses use case

Chauhan, J., Asghar, H. J., Mahanti, A. & Kaafar, M. A., 2016, 14th International Conference on Applied Cryptography and Network Security (ACNS) 2016 : proceedings: Applied Cryptography and Network Security. Manulis, M., Schneider, S. & Sadeghi, A-R. (eds.). Springer, Springer Nature, Vol. 9696. p. 648-665 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

12 Citations (Scopus)

Private processing of outsourced network functions: feasibility and constructions

Melis, L., Asghar, H. J., De Cristofaro, E. & Kaafar, M. A., 11 Mar 2016, Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization. New York: Association for Computing Machinery, Inc, p. 39-44 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

18 Citations (Scopus)

Splitbox: toward efficient private network function virtualization

Asghar, H. J., Melis, L., Soldani, C., De Cristofaro, E., Kaafar, M. A. & Mathy, L., 2016, HotMIddlebox '16: Proceedings of the 2016 workshop on Hot topics in Middleboxes and Network Function Virtualization. New York: ACM, p. 7-13 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

19 Citations (Scopus)
2014

On the intrusiveness of JavaScript on the web

Ikram, M., Asghar, H., Kaafar, M. A. & Mahanti, A., 2 Dec 2014, CoNEXT Student Workshop 2014: Proceedings of the 2014 CoNEXT on Student Workshop. New York, NY: Association for Computing Machinery, p. 31-33 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)
2013

Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks

Asghar, H. J., Li, S., Steinfeld, R. & Pieprzyk, J., 2013, NDSS 2013: 20th Annual Network & Distributed System Security Symposium : proceedings. Geneva, Switzerland: Internet Society, p. 1-18 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2010

A new human identification protocol and Coppersmith's baby-step giant-step algorithm

Asghar, H. J., Pieprzyk, J. & Wang, H., Jun 2010, Applied Cryptography and Network Security - 8th International Conference, ACNS 2010, Proceedings. Zhou, J. & Yung, M. (eds.). Berlin; New York: Springer, Springer Nature, p. 349-366 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6123 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

15 Citations (Scopus)

Cryptanalysis of the convex hull click human identification protocol

Asghar, H. J., Li, S., Pieprzyk, J. & Wang, H., 2010, Information Security - 13th International Conference, ISC 2010, Revised Selected Papers. Burmester, M., Tsudik, G. & Magliveras, S. S. (eds.). Berlin: Springer, Springer Nature, Vol. 6531. p. 24-30 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6531 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

13 Citations (Scopus)
2009

On the security of PAS (Predicate-based Authentication Service)

Li, S., Asghar, H. J., Pieprzyk, J., Sadeghi, A. R., Schmitz, R. & Wang, H., 2009, 25th Annual Computer Conference Security Applications, ACSAC 2009. Ceballos, S. (ed.). Pistacaway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 209-218 10 p. 5380509

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
16 Citations (Scopus)
13 Downloads (Pure)