@article{YasinCK10, title = {Analysis of Internet Download Manager for collection of digital forensic artefacts}, author = {Muhammad Yasin and Ahmad R. Cheema and Firdous Kausar}, year = {2010}, doi = {10.1016/j.diin.2010.08.005}, url = {http://dx.doi.org/10.1016/j.diin.2010.08.005}, tags = {analysis}, researchr = {https://researchr.org/publication/YasinCK10}, cites = {0}, citedby = {0}, journal = {di}, volume = {7}, number = {1-2}, pages = {90-94}, } @inproceedings{AhmadWK09, title = {Authenticated Encryption in WSN Using eSTREAM Ciphers}, author = {Shakil Ahmad and Arif Wahla and Firdous Kausar}, year = {2009}, doi = {10.1007/978-3-642-02617-1_75}, url = {http://dx.doi.org/10.1007/978-3-642-02617-1_75}, researchr = {https://researchr.org/publication/AhmadWK09}, cites = {0}, citedby = {0}, pages = {741-749}, booktitle = {sersc-isa}, } @inproceedings{KausarHKM07, title = {Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks}, author = {Firdous Kausar and Sajid Hussain and Tai-Hoon Kim and Ashraf Masood}, year = {2007}, doi = {10.1007/978-3-540-77090-9_1}, url = {http://dx.doi.org/10.1007/978-3-540-77090-9_1}, researchr = {https://researchr.org/publication/KausarHKM07}, cites = {0}, citedby = {0}, pages = {1-11}, booktitle = {euc}, } @inproceedings{KausarN09, title = {A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment}, author = {Firdous Kausar and Ayesha Naureen}, year = {2009}, doi = {10.1007/978-3-642-02617-1_69}, url = {http://dx.doi.org/10.1007/978-3-642-02617-1_69}, tags = {meta-model, analysis, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/KausarN09}, cites = {0}, citedby = {0}, pages = {682-691}, booktitle = {sersc-isa}, } @inproceedings{HussainKM07, title = {An efficient key distribution scheme for heterogeneous sensor networks}, author = {Sajid Hussain and Firdous Kausar and Ashraf Masood}, year = {2007}, doi = {10.1145/1280940.1281023}, url = {http://doi.acm.org/10.1145/1280940.1281023}, researchr = {https://researchr.org/publication/HussainKM07}, cites = {0}, citedby = {0}, pages = {388-392}, booktitle = {iwcmc}, } @inproceedings{YasinWK09, title = {Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts}, author = {Muhammad Yasin and Muhammad Arif Wahla and Firdous Kausar}, year = {2009}, doi = {10.1109/IMF.2009.11}, url = {http://doi.ieeecomputersociety.org/10.1109/IMF.2009.11}, tags = {analysis}, researchr = {https://researchr.org/publication/YasinWK09}, cites = {0}, citedby = {0}, pages = {142-152}, booktitle = {imf}, } @article{KausarHYM08, title = {Scalable and efficient key management for heterogeneous sensor networks}, author = {Firdous Kausar and Sajid Hussain and Laurence Tianruo Yang and Ashraf Masood}, year = {2008}, doi = {10.1007/s11227-008-0184-2}, url = {http://dx.doi.org/10.1007/s11227-008-0184-2}, researchr = {https://researchr.org/publication/KausarHYM08}, cites = {0}, citedby = {0}, journal = {tjs}, volume = {45}, number = {1}, pages = {44-65}, } @article{HussainKMP09, title = {An efficient collusion resistant security mechanism for heterogeneous sensor networks}, author = {Sajid Hussain and Firdous Kausar and Ashraf Masood and Jong Hyuk Park}, year = {2009}, doi = {10.1108/10662240910952364}, url = {http://dx.doi.org/10.1108/10662240910952364}, tags = {security}, researchr = {https://researchr.org/publication/HussainKMP09}, cites = {0}, citedby = {0}, journal = {intr}, volume = {19}, number = {2}, pages = {227-245}, } @inproceedings{AhmedWK09, title = {Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks}, author = {Usama Ahmed and Muhammad Arif Wahla and Firdous Kausar}, year = {2009}, doi = {10.1007/978-3-642-02617-1_73}, url = {http://dx.doi.org/10.1007/978-3-642-02617-1_73}, tags = {rule-based, routing, mobile}, researchr = {https://researchr.org/publication/AhmedWK09}, cites = {0}, citedby = {0}, pages = {722-731}, booktitle = {sersc-isa}, } @inproceedings{BilalMK09, title = {Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol}, author = {Zeeshan Bilal and Ashraf Masood and Firdous Kausar}, year = {2009}, doi = {10.1109/NBiS.2009.9}, url = {http://doi.ieeecomputersociety.org/10.1109/NBiS.2009.9}, tags = {tagging, protocol, analysis, security}, researchr = {https://researchr.org/publication/BilalMK09}, cites = {0}, citedby = {0}, pages = {260-267}, booktitle = {nbis}, } @inproceedings{KausarM07, title = {An Analysis of Public Key Cryptography based Techniques in Wireless Sensor Networks}, author = {Firdous Kausar and Ashraf Masood}, year = {2007}, tags = {rule-based, wireless sensor networks, analysis}, researchr = {https://researchr.org/publication/KausarM07}, cites = {0}, citedby = {0}, pages = {341-345}, booktitle = {imecs}, } @inproceedings{KausarHPM07:0, title = {A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks}, author = {Firdous Kausar and Sajid Hussain and Jong Hyuk Park and Ashraf Masood}, year = {2007}, doi = {10.1007/978-3-540-77090-9_68}, url = {http://dx.doi.org/10.1007/978-3-540-77090-9_68}, researchr = {https://researchr.org/publication/KausarHPM07%3A0}, cites = {0}, citedby = {0}, pages = {745-757}, booktitle = {euc}, } @inproceedings{KausarM07a, title = {A Key Management Scheme Based on Random Key Distribution for Clustered Wireless Sensor Networks}, author = {Firdous Kausar and Ashraf Masood}, year = {2007}, tags = {rule-based, wireless sensor networks}, researchr = {https://researchr.org/publication/KausarM07a}, cites = {0}, citedby = {0}, pages = {1395-1400}, booktitle = {imecs}, } @inproceedings{KausarHPM07, title = {Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks}, author = {Firdous Kausar and Sajid Hussain and Jong Hyuk Park and Ashraf Masood}, year = {2007}, doi = {10.1007/978-3-540-77024-4_67}, url = {http://dx.doi.org/10.1007/978-3-540-77024-4_67}, tags = {wireless sensor networks}, researchr = {https://researchr.org/publication/KausarHPM07}, cites = {0}, citedby = {0}, pages = {737-748}, booktitle = {dmsn}, } @inproceedings{KausarSM08, title = {Key Management and Secure Routing in Heterogeneous Sensor Networks}, author = {Firdous Kausar and M. Q. Saeed and Ashraf Masood}, year = {2008}, doi = {10.1109/WiMob.2008.120}, url = {http://dx.doi.org/10.1109/WiMob.2008.120}, tags = {routing}, researchr = {https://researchr.org/publication/KausarSM08}, cites = {0}, citedby = {0}, pages = {549-554}, booktitle = {wimob}, } @inproceedings{AhmedMK10, title = {An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation}, author = {Fahad Ahmed and Asif Masood and Firdous Kausar}, year = {2010}, doi = {10.1109/CIT.2010.280}, url = {http://doi.ieeecomputersociety.org/10.1109/CIT.2010.280}, researchr = {https://researchr.org/publication/AhmedMK10}, cites = {0}, citedby = {0}, pages = {1577-1581}, booktitle = {IEEEcit}, } @inproceedings{AbidHK09, title = {Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks}, author = {Aasma Abid and Mukhtar Hussain and Firdous Kausar}, year = {2009}, doi = {10.1109/NBiS.2009.18}, url = {http://doi.ieeecomputersociety.org/10.1109/NBiS.2009.18}, tags = {routing}, researchr = {https://researchr.org/publication/AbidHK09}, cites = {0}, citedby = {0}, pages = {316-320}, booktitle = {nbis}, }