Seguir
Rehana Yasmin
Rehana Yasmin
Dirección de correo verificada de kaust.edu.sa - Página principal
Título
Citado por
Citado por
Año
An authentication framework for wireless sensor networks using identity-based signatures
R Yasmin, E Ritter, G Wang
2010 10th IEEE International Conference on Computer and Information …, 2010
922010
Towards the verification of pervasive systems
M Arapinis, M Calder, L Dennis, M Fisher, P Gray, S Konur, A Miller, ...
Electronic Communications of the EASST 22, 2009
282009
An authentication framework for wireless sensor networks using identity-based signatures: implementation and evaluation
R Yasmin, E Ritter, G Wang
IEICE TRANSACTIONS on Information and Systems 95 (1), 126-133, 2012
202012
IoVShield: an efficient vehicular intrusion detection system for self-driving (short paper)
Z Wei, Y Yang, Y Rehana, Y Wu, J Weng, RH Deng
Information Security Practice and Experience: 13th International Conference …, 2017
132017
Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks
R Yasmin, E Ritter, G Wang
International journal of information security 13, 453-465, 2014
132014
An efficient authentication framework for wireless sensor networks
R Yasmin
University of Birmingham, 2012
92012
A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks
R Yasmin, E Ritter, G Wang
The 5th International Conference on Sensor Technologies and Applications, 21-27, 2011
92011
Investigating the possibility of data leakage in time of live VM migration
R Yasmin, MR Memarian, S Hosseinzadeh, M Conti, V Leppänen
Cyber Threat Intelligence, 259-279, 2018
52018
Intrusion monitoring system, method and related products
R Yasmin, Z Wei, SI Kang, F Geng
US Patent App. 18/186,040, 2023
12023
System and method for computing an escrow session key and a private session key for encoding digital communications between two devices
R Yasmin, Y Yanjiang, Z Wei, LI Tieyan, H Yu
US Patent 11,265,161, 2022
12022
Savvy: Trustworthy Autonomous Vehicles Architecture
A Shoker, R Yasmin, P Esteves-Verissimo
arXiv preprint arXiv:2402.14580, 2024
2024
Securing outside-vehicle communication using IBC
R Yasmin, Z Wei, F Hua, Y Yanjiang
US Patent 11,588,622, 2023
2023
Charging Authentication Method and Apparatus
R Yasmin, Y Yanjiang, S Zhan, Z Wei
US Patent App. 17/965,906, 2023
2023
Abnormal message identification method and device
R Rieke, D Zelle, F Fenzl, Z Wei, R Yasmin
CN Patent CN112,805,187 B, 2021
2021
System and method for authenticating communications between a vehicle, a charging station and a charging station management server
R Yasmin, Y Yang, Z Wei, Q Sha
CN Patent CN112,689,981 B, 2021
2021
Fault diagnosis method and device and vehicle
R Yasmin, Y Yang, Z Wei, Q Sha, Z Li
CN Patent CN112,585,549 B, 2021
2021
Device upgrade method and related device
Y Yang, Z Wei, R Yasmin, X Liu
EP Patent EP3926500B1, 2021
2021
Towards the Verification of Pervasive Systems, Proceedings of the Third International Workshop on Formal Methods for Interactive Systems (FMIS2009)
M Arapinis, M Calder, L Denis, M Fisher, P Gray, S Konour, A Miller, ...
2009
WIP: Savvy: a Trustworthy Autonomous Vehicles Architecture
A Shoker, R Yasmin, P Esteves-Verissimo
Method for detecting suspicious traffic for a vehicle and related device
R Yasmin, Z Wei, Z Li, M Li
WO Patent WO2023178479A1, 0
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20