| Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations SY Chau, O Chowdhury, E Hoque, H Ge, A Kate, C Nita-Rotaru, N Li 2017 IEEE symposium on security and privacy (SP), 503-520, 2017 | 97 | 2017 |
| Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments ME Hoque, F Rahman, SI Ahamed, JH Park Wireless personal communications 55 (1), 65-79, 2010 | 75 | 2010 |
| Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. S Jero, ME Hoque, DR Choffnes, A Mislove, C Nita-Rotaru NDSS, 2018 | 69 | 2018 |
| ERAP: ECC based RFID authentication protocol SI Ahamed, F Rahman, E Hoque 2008 12th IEEE International Workshop on Future Trends of Distributed …, 2008 | 69 | 2008 |
| Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments SI Ahamed, MM Haque, ME Hoque, F Rahman, N Talukder Journal of Systems and Software 83 (2), 253-270, 2010 | 64 | 2010 |
| Expat: Expectation-based policy analysis and enforcement for appified smart-home platforms M Yahyazadeh, P Podder, E Hoque, O Chowdhury Proceedings of the 24th ACM symposium on access control models and …, 2019 | 54 | 2019 |
| S3PR: Secure serverless search protocols for RFID SI Ahamed, F Rahman, E Hoque, F Kawsar, T Nakajima 2008 International Conference on Information Security and Assurance (isa …, 2008 | 43 | 2008 |
| Analyzing operational behavior of stateful protocol implementations for detecting semantic bugs E Hoque, O Chowdhury, SY Chau, C Nita-Rotaru, N Li 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 41 | 2017 |
| Turret: A platform for automated attack finding in unmodified distributed system implementations H Lee, J Seibert, E Hoque, C Killian, C Nita-Rotaru 2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014 | 34 | 2014 |
| Anonpri: A secure anonymous private authentication protocol for RFID systems F Rahman, ME Hoque, SI Ahamed Information Sciences 379, 195-210, 2017 | 26 | 2017 |
| AnonPri: An efficient anonymous private authentication protocol ME Hoque, F Rahman, SI Ahamed 2011 IEEE International Conference on Pervasive Computing and Communications …, 2011 | 26 | 2011 |
| Oil extraction from pine seed (Polyalthia longifolia) by solvent extraction method and its property analysis MN Islam, A Sabur, R Ahmmed, ME Hoque Procedia Engineering 105, 613-618, 2015 | 24 | 2015 |
| Secure and efficient tag searching in RFID systems using serverless search protocol SI Ahamed, F Rahman, E Hoque, F Kawsar, T Nakajima International Journal of Security and Its Applications 2 (4), 57-66, 2008 | 23 | 2008 |
| PatrIoT: Policy Assisted Resilient Programmable IoT System M Yahyazadeh, SR Hussain, E Hoque, O Chowdhury International Conference on Runtime Verification, 151-171, 2020 | 22 | 2020 |
| Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks. A Rahman, ME Hoque, F Rahman, SK Kundu, P Gburzynski J. Networks 4 (9), 895-904, 2009 | 22 | 2009 |
| Preserve your privacy with pco: A privacy sensitive architecture for context obfuscation for pervasive e-community based applications F Rahman, ME Hoque, FA Kawsar, SI Ahamed 2010 IEEE Second International Conference on Social Computing, 41-48, 2010 | 21 | 2010 |
| A formal security analysis of ZigBee (1.0 and 3.0) L Li, P Podder, E Hoque Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-11, 2020 | 19 | 2020 |
| All your credentials are belong to us: On insecure wpa2-enterprise configurations MH Hue, J Debnath, KM Leung, L Li, M Minaei, MH Mazhar, K Xian, ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 14 | 2021 |
| YA-SRAP: Yet another serverless RFID authentication protocol SI Ahamed, MDE Hoque, F Rahman, F Kawsar, T Nakajima 2008 IET 4th International Conference on Intelligent Environments, 1-8, 2008 | 14 | 2008 |
| Supporting recovery, privacy and security in RFID systems using a robust authentication protocol ME Hoque, F Rahman, SI Ahamed Proceedings of the 2009 ACM symposium on Applied Computing, 1062-1066, 2009 | 13 | 2009 |