@article{YasinCK10, title = {Analysis of Internet Download Manager for collection of digital forensic artefacts}, author = {Muhammad Yasin and Ahmad R. Cheema and Firdous Kausar}, year = {2010}, doi = {10.1016/j.diin.2010.08.005}, url = {http://dx.doi.org/10.1016/j.diin.2010.08.005}, tags = {analysis}, researchr = {https://researchr.org/publication/YasinCK10}, cites = {0}, citedby = {0}, journal = {Digital Investigation}, volume = {7}, number = {1-2}, pages = {90-94}, } @inproceedings{AhmadWK09, title = {Authenticated Encryption in WSN Using eSTREAM Ciphers}, author = {Shakil Ahmad and Arif Wahla and Firdous Kausar}, year = {2009}, doi = {10.1007/978-3-642-02617-1_75}, url = {http://dx.doi.org/10.1007/978-3-642-02617-1_75}, researchr = {https://researchr.org/publication/AhmadWK09}, cites = {0}, citedby = {0}, pages = {741-749}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, editor = {Jong Hyuk Park and Hsiao-Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai-Hoon Kim and Sang-Soo Yeo}, volume = {5576}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-02616-4}, } @inproceedings{KausarHKM07, title = {Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks}, author = {Firdous Kausar and Sajid Hussain and Tai-Hoon Kim and Ashraf Masood}, year = {2007}, doi = {10.1007/978-3-540-77090-9_1}, url = {http://dx.doi.org/10.1007/978-3-540-77090-9_1}, researchr = {https://researchr.org/publication/KausarHKM07}, cites = {0}, citedby = {0}, pages = {1-11}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, editor = {Mieso K. Denko and Chi-Sheng Shih and Kuan-Ching Li and Shiao Li Tsao and Qing-An Zeng and Soo-Hyun Park and Young-Bae Ko and Shih-Hao Hung and Jong Hyuk Park}, volume = {4809}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-77089-3}, } @inproceedings{KausarN09, title = {A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment}, author = {Firdous Kausar and Ayesha Naureen}, year = {2009}, doi = {10.1007/978-3-642-02617-1_69}, url = {http://dx.doi.org/10.1007/978-3-642-02617-1_69}, tags = {meta-model, analysis, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/KausarN09}, cites = {0}, citedby = {0}, pages = {682-691}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, editor = {Jong Hyuk Park and Hsiao-Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai-Hoon Kim and Sang-Soo Yeo}, volume = {5576}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-02616-4}, } @inproceedings{HussainKM07, title = {An efficient key distribution scheme for heterogeneous sensor networks}, author = {Sajid Hussain and Firdous Kausar and Ashraf Masood}, year = {2007}, doi = {10.1145/1280940.1281023}, url = {http://doi.acm.org/10.1145/1280940.1281023}, researchr = {https://researchr.org/publication/HussainKM07}, cites = {0}, citedby = {0}, pages = {388-392}, booktitle = {Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2007, Honolulu, Hawaii, USA, August 12-16, 2007}, editor = {Mohsen Guizani and Hsiao-Hwa Chen and Xi Zhang}, publisher = {ACM}, isbn = {978-1-59593-695-0}, } @inproceedings{YasinWK09, title = {Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts}, author = {Muhammad Yasin and Muhammad Arif Wahla and Firdous Kausar}, year = {2009}, doi = {10.1109/IMF.2009.11}, url = {http://doi.ieeecomputersociety.org/10.1109/IMF.2009.11}, tags = {analysis}, researchr = {https://researchr.org/publication/YasinWK09}, cites = {0}, citedby = {0}, pages = {142-152}, booktitle = {IMF 2009, Fifth International Conference on IT Security Incident Management and IT Forensics, Stuttgart, Germany, 15-17 September 2009}, editor = {Oliver Goebel and Ralf Ehlert and Sandra Frings and Detlef Günther and Holger Morgenstern and Dirk Schadt}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-3807-5}, } @article{KausarHYM08, title = {Scalable and efficient key management for heterogeneous sensor networks}, author = {Firdous Kausar and Sajid Hussain and Laurence Tianruo Yang and Ashraf Masood}, year = {2008}, doi = {10.1007/s11227-008-0184-2}, url = {http://dx.doi.org/10.1007/s11227-008-0184-2}, researchr = {https://researchr.org/publication/KausarHYM08}, cites = {0}, citedby = {0}, journal = {The Journal of Supercomputing}, volume = {45}, number = {1}, pages = {44-65}, } @article{HussainKMP09, title = {An efficient collusion resistant security mechanism for heterogeneous sensor networks}, author = {Sajid Hussain and Firdous Kausar and Ashraf Masood and Jong Hyuk Park}, year = {2009}, doi = {10.1108/10662240910952364}, url = {http://dx.doi.org/10.1108/10662240910952364}, tags = {security}, researchr = {https://researchr.org/publication/HussainKMP09}, cites = {0}, citedby = {0}, journal = {Internet Research}, volume = {19}, number = {2}, pages = {227-245}, } @inproceedings{AhmedWK09, title = {Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks}, author = {Usama Ahmed and Muhammad Arif Wahla and Firdous Kausar}, year = {2009}, doi = {10.1007/978-3-642-02617-1_73}, url = {http://dx.doi.org/10.1007/978-3-642-02617-1_73}, tags = {rule-based, routing, mobile}, researchr = {https://researchr.org/publication/AhmedWK09}, cites = {0}, citedby = {0}, pages = {722-731}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, editor = {Jong Hyuk Park and Hsiao-Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai-Hoon Kim and Sang-Soo Yeo}, volume = {5576}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-02616-4}, } @inproceedings{BilalMK09, title = {Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol}, author = {Zeeshan Bilal and Ashraf Masood and Firdous Kausar}, year = {2009}, doi = {10.1109/NBiS.2009.9}, url = {http://doi.ieeecomputersociety.org/10.1109/NBiS.2009.9}, tags = {tagging, protocol, analysis, security}, researchr = {https://researchr.org/publication/BilalMK09}, cites = {0}, citedby = {0}, pages = {260-267}, booktitle = {NBiS 2009, 12th International Conference on Network-Based Information Systems, Indianapolis, Indiana, USA, 19-21 August 2009}, editor = {Arjan Durresi and Leonard Barolli and Tomoya Enokido and Minoru Uehara and Elhadi Shakshuki and Makoto Takizawa}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-3767-2}, } @inproceedings{KausarM07, title = {An Analysis of Public Key Cryptography based Techniques in Wireless Sensor Networks}, author = {Firdous Kausar and Ashraf Masood}, year = {2007}, tags = {rule-based, wireless sensor networks, analysis}, researchr = {https://researchr.org/publication/KausarM07}, cites = {0}, citedby = {0}, pages = {341-345}, booktitle = {Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, March 21-23, 2007, Hong Kong, China}, editor = {Sio Iong Ao and Oscar Castillo and Craig Douglas and David Dagan Feng and Jeong-A. Lee}, series = {Lecture Notes in Engineering and Computer Science}, publisher = {Newswood Limited}, isbn = {978-988-98671-4-0}, } @inproceedings{KausarHPM07:0, title = {A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks}, author = {Firdous Kausar and Sajid Hussain and Jong Hyuk Park and Ashraf Masood}, year = {2007}, doi = {10.1007/978-3-540-77090-9_68}, url = {http://dx.doi.org/10.1007/978-3-540-77090-9_68}, researchr = {https://researchr.org/publication/KausarHPM07%3A0}, cites = {0}, citedby = {0}, pages = {745-757}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, editor = {Mieso K. Denko and Chi-Sheng Shih and Kuan-Ching Li and Shiao Li Tsao and Qing-An Zeng and Soo-Hyun Park and Young-Bae Ko and Shih-Hao Hung and Jong Hyuk Park}, volume = {4809}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-77089-3}, } @inproceedings{KausarM07a, title = {A Key Management Scheme Based on Random Key Distribution for Clustered Wireless Sensor Networks}, author = {Firdous Kausar and Ashraf Masood}, year = {2007}, tags = {rule-based, wireless sensor networks}, researchr = {https://researchr.org/publication/KausarM07a}, cites = {0}, citedby = {0}, pages = {1395-1400}, booktitle = {Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, March 21-23, 2007, Hong Kong, China}, editor = {Sio Iong Ao and Oscar Castillo and Craig Douglas and David Dagan Feng and Jeong-A. Lee}, series = {Lecture Notes in Engineering and Computer Science}, publisher = {Newswood Limited}, isbn = {978-988-98671-4-0}, } @inproceedings{KausarHPM07, title = {Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks}, author = {Firdous Kausar and Sajid Hussain and Jong Hyuk Park and Ashraf Masood}, year = {2007}, doi = {10.1007/978-3-540-77024-4_67}, url = {http://dx.doi.org/10.1007/978-3-540-77024-4_67}, tags = {wireless sensor networks}, researchr = {https://researchr.org/publication/KausarHPM07}, cites = {0}, citedby = {0}, pages = {737-748}, booktitle = {Mobile Ad-Hoc and Sensor Networks, Third International Conference, MSN 2007, Beijing, China, December 12-14, 2007, Proceedings}, editor = {Hongke Zhang and Stephan Olariu and Jiannong Cao and David B. Johnson}, volume = {4864}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-77023-7}, } @inproceedings{KausarSM08, title = {Key Management and Secure Routing in Heterogeneous Sensor Networks}, author = {Firdous Kausar and M. Q. Saeed and Ashraf Masood}, year = {2008}, doi = {10.1109/WiMob.2008.120}, url = {http://dx.doi.org/10.1109/WiMob.2008.120}, tags = {routing}, researchr = {https://researchr.org/publication/KausarSM08}, cites = {0}, citedby = {0}, pages = {549-554}, booktitle = {IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2008, Avignon, France, 12-14 October 2008, Proceedings}, publisher = {IEEE}, } @inproceedings{AhmedMK10, title = {An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation}, author = {Fahad Ahmed and Asif Masood and Firdous Kausar}, year = {2010}, doi = {10.1109/CIT.2010.280}, url = {http://doi.ieeecomputersociety.org/10.1109/CIT.2010.280}, researchr = {https://researchr.org/publication/AhmedMK10}, cites = {0}, citedby = {0}, pages = {1577-1581}, booktitle = {10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-4108-2}, } @inproceedings{AbidHK09, title = {Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks}, author = {Aasma Abid and Mukhtar Hussain and Firdous Kausar}, year = {2009}, doi = {10.1109/NBiS.2009.18}, url = {http://doi.ieeecomputersociety.org/10.1109/NBiS.2009.18}, tags = {routing}, researchr = {https://researchr.org/publication/AbidHK09}, cites = {0}, citedby = {0}, pages = {316-320}, booktitle = {NBiS 2009, 12th International Conference on Network-Based Information Systems, Indianapolis, Indiana, USA, 19-21 August 2009}, editor = {Arjan Durresi and Leonard Barolli and Tomoya Enokido and Minoru Uehara and Elhadi Shakshuki and Makoto Takizawa}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-3767-2}, }