default search action
Syed Taha Ali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Akhlaque Ahmad, Ashfaq Ahmed, Arafat Al-Dweik, Syed Taha Ali, Arsalan Ahmad:
Merging engine implementation for intra-frame sharing in multi-tenant virtual passive optical networks. JOCN 15(4): 209-218 (2023) - [j11]Aamna Tariq, Hina Binte Haq, Syed Taha Ali:
Cerberus: A Blockchain-Based Accreditation and Degree Verification System. IEEE Trans. Comput. Soc. Syst. 10(4): 1503-1514 (2023) - [c15]Farooque Hassan Kumbhar, Syed Taha Ali:
Hyper Metamorphism: Hyper Secure and Trustworthy 5G Networks using Blockchain with IoT. FIT 2023: 166-171 - 2022
- [i5]Hina Binte Haq, Syed Taha Ali, Ronan McDermott:
End-to-end verifiable voting for developing countries - what's hard in Lausanne is harder still in Lahore. CoRR abs/2210.04764 (2022) - 2021
- [j10]Abdul Wajid, Nasir Kamal, Muhammad Sharjeel, Raaez Muhammad Sheikh, Huzaifah Bin Wasim, Muhammad Hashir Ali, Wajahat Hussain, Syed Taha Ali, Latif Anjum:
A First Look at Private Communications in Video Games using Visual Features. Proc. Priv. Enhancing Technol. 2021(3): 433-452 (2021) - [j9]Muhammad Siddiqi, Syed Taha Ali, Vijay Sivaraman:
Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing Devices. IEEE Trans. Dependable Secur. Comput. 18(2): 753-764 (2021) - 2020
- [j8]Muhammad Siddiqi, Syed Taha Ali, Vijay Sivaraman:
Forensic Verification of Health Data From Wearable Devices Using Anonymous Witnesses. IEEE Internet Things J. 7(11): 10745-10762 (2020)
2010 – 2019
- 2019
- [i4]Hina Binte Haq, Ronan McDermott, Syed Taha Ali:
Pakistan's Internet Voting Experiment. CoRR abs/1907.07765 (2019) - [i3]Aamna Tariq, Hina Binte Haq, Syed Taha Ali:
Cerberus: A Blockchain-Based Accreditation and Degree Verification System. CoRR abs/1912.06812 (2019) - 2018
- [j7]Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao:
ZombieCoin 2.0: managing next-generation botnets using Bitcoin. Int. J. Inf. Sec. 17(4): 411-422 (2018) - [c14]Patrick McCorry, Malte Möser, Syed Taha Ali:
Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough. Security Protocols Workshop 2018: 225-233 - 2017
- [c13]Dylan Clarke, Syed Taha Ali:
End to End Security is Not Enough. Security Protocols Workshop 2017: 260-267 - [i2]Syed Taha Ali, Dylan Clarke, Patrick McCorry:
The Nuts and Bolts of Micropayments: A Survey. CoRR abs/1710.02964 (2017) - 2016
- [i1]Syed Taha Ali, Judy Murray:
An Overview of End-to-End Verifiable Voting Systems. CoRR abs/1605.08554 (2016) - 2015
- [j6]Vijay Sivaraman, John Matthews, Craig Russell, Syed Taha Ali, Arun Vishwanath:
Greening Residential Wi-Fi Networks under Centralized Control. IEEE Trans. Mob. Comput. 14(3): 552-564 (2015) - [j5]Syed Taha Ali, Vijay Sivaraman, Adam Radford, Sanjay Jha:
A Survey of Securing Networks Using Software Defined Networking. IEEE Trans. Reliab. 64(3): 1086-1097 (2015) - [c12]Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao:
ZombieCoin: Powering Next-Generation Botnets with Bitcoin. Financial Cryptography Workshops 2015: 34-48 - [c11]Syed Taha Ali, Dylan Clarke, Patrick McCorry:
Bitcoin: Perils of an Unregulated Global P2P Currency. Security Protocols Workshop 2015: 283-293 - [c10]Syed Taha Ali:
Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion). Security Protocols Workshop 2015: 294-306 - 2014
- [j4]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring. Future Gener. Comput. Syst. 35: 80-90 (2014) - [j3]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Gene Tsudik, Sanjay K. Jha:
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints. IEEE Trans. Inf. Forensics Secur. 9(12): 2193-2204 (2014) - [j2]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices. IEEE Trans. Mob. Comput. 13(12): 2763-2776 (2014) - 2013
- [c9]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay K. Jha:
Securing data provenance in body area networks using lightweight wireless link fingerprints. TrustED@CCS 2013: 65-72 - [c8]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay K. Jha:
Securing data provenance in body area networks using lightweight wireless link fingerprints. SenSys 2013: 85:1-85:2 - 2012
- [c7]Linjia Yao, Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Decorrelating secret bit extraction via channel hopping in body area networks. PIMRC 2012: 1454-1459 - [c6]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Authentication of lossy data in body-sensor networks for healthcare monitoring. SECON 2012: 470-478 - [c5]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Zero reconciliation secret key generation for body-worn health monitoring devices. WISEC 2012: 39-50 - 2011
- [b1]Syed Taha Ali:
Security mechanisms for body sensor networks. University of New South Wales, Sydney, Australia, 2011 - [c4]Linjia Yao, Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Improving secret key generation performance for on-body devices. BODYNETS 2011: 19-22 - 2010
- [j1]Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, Diethelm Ostry:
Secure key loss recovery for network broadcast in single-hop wireless sensor networks. Ad Hoc Networks 8(6): 668-679 (2010) - [c3]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks. EUC 2010: 644-650
2000 – 2009
- 2009
- [c2]Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere:
A Per-Hop Security Scheme for Highly Dynamic Wireless Sensor Networks. MASS 2009: 1005-1011 - 2008
- [c1]Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, Diethelm Ostry:
A key loss recovery scheme for secure broadcasts in wireless sensor networks. PIMRC 2008: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint