Follow
Junade Ali
Junade Ali
Verified email at cam.ac.uk - Homepage
Title
Cited by
Cited by
Year
Protocols for checking compromised credentials
L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
772019
Coverage and mobile sensor placement for vehicles on predetermined routes: A greedy heuristic approach
J Ali, V Dyo
SCITEPRESS–Science and Technology Publications, 2017
212017
Cross hashing: Anonymizing encounters in decentralised contact tracing protocols
J Ali, V Dyo
2021 International Conference on Information Networking (ICOIN), 181-185, 2021
132021
Practical hash-based anonymity for mac addresses
J Ali, V Dyo
arXiv preprint arXiv:2005.06580, 2020
112020
Analysis and safety engineering of fuzzy string matching algorithms
M Pikies, J Ali
ISA transactions 113, 1-8, 2021
102021
Mechanism for the prevention of password reuse through anonymized hashes
J Ali
PeerJ PrePrints 5, e3322v1, 2017
102017
String similarity algorithms for a ticket classification system
M Pikies, J Ali
2019 6th International Conference on Control, Decision and Information …, 2019
92019
Mastering PHP design patterns
J Ali
Packt Publishing Ltd, 2016
92016
Battery-assisted electric vehicle charging: Data driven performance analysis
J Ali, V Dyo, S Zhang
2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 429-433, 2020
22020
Password authentication attacks at scale
J Ali, M Pikies
International Conference on Advanced Engineering Theory and Applications …, 2019
12019
Cryptographic hash-based anonymisation of wireless unique identifiers
J Ali
University of Bedfordshire, 2022
2022
Novel Keyword Extraction and Language Detection Approaches
M Pikies, A Riyono, J Ali
arXiv preprint arXiv:2009.11832, 2020
2020
Object Oriented PHP
J Ali
Lulu. com, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–13