default search action
Kazi Md. Rokibul Alam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Dola Das, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
An Anonymity Retaining Framework for Multi-party Skyline Queries Based on Unique Tags. IEEE Trans. Dependable Secur. Comput. 21(4): 3183-3195 (2024) - 2023
- [i3]Md. Ahsan Habib, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
A Secure Medical Record Sharing Scheme Based on Blockchain and Two-fold Encryption. CoRR abs/2304.13511 (2023) - 2022
- [j12]Md. Siddiqur Rahman Tanveer, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
A multi-stage chaotic encryption technique for medical image. Inf. Secur. J. A Glob. Perspect. 31(6): 657-675 (2022) - [c12]Naoto Iwata, Sayaka Kamei, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
Location Data Anonymization Retaining Data Mining Utilization. ADMA (2) 2022: 407-418 - [c11]Md. Atikur Rahman, Kazi Md. Rokibul Alam, Muhammad Sheikh Sadi:
A Smartphone Based Real-Time Object Recognition System for Visually Impaired People. MIET (1) 2022: 524-538 - 2021
- [j11]Kazi Md. Rokibul Alam, Shinsuke Tamura, S. M. Saifur Rahman, Yasuhiko Morimoto:
An Electronic Voting Scheme Based on Revised-SVRM and Confirmation Numbers. IEEE Trans. Dependable Secur. Comput. 18(1): 400-410 (2021) - 2020
- [j10]Kazi Md. Rokibul Alam, Nazmul H. Siddique, Hojjat Adeli:
A dynamic ensemble learning algorithm for neural networks. Neural Comput. Appl. 32(12): 8675-8690 (2020)
2010 – 2019
- 2019
- [j9]Mahboob Qaosar, Kazi Md. Rokibul Alam, Asif Zaman, Chen Li, Saleh Ahmed, Mohammad Anisuzzaman Siddique, Yasuhiko Morimoto:
A Framework for Privacy-Preserving Multi-Party Skyline Query Based on Homomorphic Encryption. IEEE Access 7: 167481-167496 (2019) - [j8]Saleh Ahmed, Annisa, Asif Zaman, Zhan Zhang, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
Semi-Order Preserving Encryption Technique for Numeric Database. Int. J. Netw. Comput. 9(1): 111-129 (2019) - [j7]Saleh Ahmed, Mahboob Qaosar, Asif Zaman, Mohammad Anisuzzaman Siddique, Chen Li, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
Privacy-Aware MapReduce Based Multi-Party Secure Skyline Computation. Inf. 10(6): 207 (2019) - [j6]Md. Rafiul Biswas, Kazi Md. Rokibul Alam, Shinsuke Tamura, Yasuhiko Morimoto:
A technique for DNA cryptography based on dynamic mechanisms. J. Inf. Secur. Appl. 48 (2019) - [j5]Arindom Mondal, Kazi Md. Rokibul Alam, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto:
A Multi-Stage Encryption Technique to Enhance the Secrecy of Image. KSII Trans. Internet Inf. Syst. 13(5): 2698-2717 (2019) - [c10]Mahboob Qaosar, Kazi Md. Rokibul Alam, Chen Li, Yasuhiko Morimoto:
Privacy-preserving Top-k Dominating Queries in Distributed Multi-party Databases. IEEE BigData 2019: 5794-5803 - [c9]Chen Li, Xu Zhang, Mahboob Qaosar, Saleh Ahmed, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
Multi-factor Based Stock Price Prediction Using Hybrid Neural Networks with Attention Mechanism. DASC/PiCom/DataCom/CyberSciTech 2019: 961-966 - 2018
- [j4]Kazi Md. Rokibul Alam, Adnan Maruf, Md. Rezaur Rahman Rakib, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto:
An Untraceable Voting Scheme Based on Pairs of Signatures. Int. J. Netw. Secur. 20(4): 774-787 (2018) - [c8]Nur Imtiazul Haque, Kazi Md. Rokibul Alam, Tasfia Mashiat, Yasuhiko Morimoto:
A Technique to Enrich the Secrecy Level of High Capacity Data Hiding Steganography Technique in JPEG Compressed Image. NSysS 2018: 77-83 - [i2]Md. Kamruzzaman Sarker, Kazi Md. Rokibul Alam, Md. Arifuzzaman:
Emotion Recognition from Speech based on Relevant Feature and Majority Voting. CoRR abs/1807.03909 (2018) - 2017
- [j3]Md. Abdullah Al Rahat Kutubi, Kazi Md. Rokibul Alam, Rafaf Tahsin, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto:
An Offline Electronic Payment System Based on an Untraceable Blind Signature Scheme. KSII Trans. Internet Inf. Syst. 11(5): 2628-2645 (2017) - [c7]Saleh Ahmed, Annisa, Asif Zaman, Zhan Zhang, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
Semi-order Preserving Encryption Technique for Numeric Data to Enhance Privacy. CANDAR 2017: 68-74 - [c6]Md. Armanuzzaman, Kazi Md. Rokibul Alam, Md. Mehadi Hassan, Yasuhiko Morimoto:
A secure and efficient data transmission technique using quantum key distribution. NSysS (2) 2017: 1-5 - [c5]Md. Rafiul Biswas, Kazi Md. Rokibul Alam, Ali Akber, Yasuhiko Morimoto:
A DNA cryptographic technique based on dynamic DNA encoding and asymmetric cryptosystem. NSysS (2) 2017: 1-8 - [c4]Nazmul Islam, Kazi Md. Rokibul Alam, Shinsuke Tamura, Yasuhiko Morimoto:
A new e-voting scheme based on revised simplified verifiable re-encryption mixnet. NSysS 2017: 12-20 - 2016
- [c3]Khairul Alam, Kazi Md. Rokibul Alam, Omar Faruq, Yasuhiko Morimoto:
A comparison between RSA and ElGamal based untraceable blind signature schemes. NSysS 2016: 1-4 - 2015
- [j2]Nazmul Islam, Kazi Md. Rokibul Alam, Shaikh Shiam Rahman:
Commutative Re-encryption Techniques: Significance and Analysis. Inf. Secur. J. A Glob. Perspect. 24(4-6): 185-193 (2015) - [c2]Sahan Ahmad, Kazi Md. Rokibul Alam, Habibur Rahman, Shinsuke Tamura:
A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. NSysS 2015: 1-5 - [i1]Shinsuke Tamura, Hazim Anas Haddad, Nazmul Islam, Kazi Md. Rokibul Alam:
An Incoercible E-Voting Scheme Based on Revised Simplified Verifiable Re-encryption Mix-nets. CoRR abs/1512.05596 (2015)
2000 – 2009
- 2009
- [c1]Kazi Md. Rokibul Alam, Shinsuke Tamura:
Electronic Voting Using Confirmation Numbers. SMC 2009: 4535-4540 - 2008
- [j1]Shinsuke Tamura, Kazuya Kouro, Masatoshi Sasatani, Kazi Md. Rokibul Alam, Hazim Anas Haddad:
An Information System Platform for Anonymous Product Recycling. J. Softw. 3(6): 46-56 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-07 00:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint