Mohammad Shahriar Rahman

    Research Overview | Research Interests | Awards | Other Activities | Useful Links | Top

    Research interests

    1. Applied cryptography
    2. Privacy-preserving data mining
    3. Privacy in resource constrained devices
    4. Game theory

    Journal Papers

    1. "Dynamic Attribute based Signcryption without Random Oracles"-- International Journal of Applied Cryptography, (IJACT). To Appear. With Keita Emura and Atsuko Miyaji
    2. "KIMAP: Key-Insulated Mutual Authentication Protocol for RFID"-- International Journal of Automated Identification Technology, (IJAIT). To Appear. With Atsuko Miyaji
    3. "A Low Cost and Secure RFID Authentication Scheme" --Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, (JoWUA). To Appear. With Atsuko Miyaji and Masakazu Soshi.
    4. "Privacy-preserving Two-party Rational Set Intersection Protocol" -- In Submission.
    5. "Privacy-preserving Dot-Product Protocols in Malicious and Covert Adversarial Models" -- In Submission.
    6. "Ideal Secret Sharing Schemes with Share Selectability and its Application to Distributed Systems with General Access Structures" -- In Submission.

    Conference Papers

    1. "Privacy-preserving Set Operations in the Presence of Rational Parties" -- The 5th International Symposium on Mining and Web, MAW 2012, IEEE. With Atsuko Miyaji. To Appear.
    2. "Ideal Secret Sharing Schemes with Share Selectability" -- The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, 7043 (2011), Springer-Verlag. With Keita Emura, Atsuko Miyaji, Akito Nomura, and Masakazu Soshi (PDF)
    3. "Privacy-Preserving Data Mining: A Game-theoretic Approach" -- The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2011, Lecture Notes in Computer Science, 6818 (2011), Springer-Verlag. With Atsuko Miyaji (PDF)
    4. "Dynamic Attribute-based Signcryption without Random Oracles" -- The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, 6812 (2011), Springer-Verlag. With Keita Emura and Atsuko Miyaji (PDF)
    5. "Hidden Credential Retrieval Without Random Oracles" -- The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, 6513 (2010), Springer-Verlag. With Atsuko Miyaji and Masakazu Soshi (PDF)
    6. "APRAP: Another Privacy Preserving RFID Authentication Protocol" -- The 6th workshop on Secure Network Protocols, NPSec 2010, IEEE. With Atsuko Miyaji (PDF)
    7. "Efficient Privacy-Preserving Data Mining in Malicious Model" -- The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, 6440 (2010), Springer-Verlag. With Keita Emura and Atsuko Miyaji (Best Paper Award) (PDF)
    8. "Privacy-Preserving Data Mining in Presence of Covert Adversaries" -- The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, 6440 (2010), Springer-Verlag. With Atsuko Miyaji (PDF)
    9. "A Secure RFID Authentication protocol with Low Communication Cost"-- The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing, IMIS 2009, IEEE. With Atsuko Miyaji and Masakazu Soshi (PDF)

    Technical Reports

    1. ``Privacy-Preserving Set Operations in the Presence of Rational Parties"-- Information Security IEICE, Japan Tech. Rep., ISEC2011-11 (2011-11) With Atsuko Miyaji
    2. ``Authenticating RFID Tags using Insulated Keys"-- Information and Communication System Security IEICE, Japan Tech. Rep., ICSS2009-59 (2009-11) With Atsuko Miyaji
    3. ``An RFID Authentication Protocol Suitable for Batch-mode Authentication"-- Computer Security Symposium, CSS 2008. With Atsuko Miyaji and Masakazu Soshi (PDF)
    4. ``A Study on Turbo Code Design, Performance Analysis and Decoding Techniques"-- sub-research report submitted to Dr. Tadashi Matsumoto, Professor, Multimedia Laboratory, JAIST.
    5. ``Elliptic Curve Addition, Doubling and Scalar Multiplication in Jacobian coordinate system"-- summer study 2007 technical report submitted to Miyaji Lab, JAIST.

    Master's Thesis

      "On Security and Privacy Enhanced Authentication of RFID" -- Supervised by Professor Atsuko Miyaji.

    Undergraduate Project

      "Addressing Man-in-the-Middle Attack in WLAN"-- submitted in 2006 to Department of Computer Science & Engineering, University of Dhaka, Bangladesh.