Fahad Samad

  • Citations Per Year
Learn More
The threat of possible malicious activities that can be executed by adversaries impedes the rapid deployment of wireless networks. Researchers and scientists have rendered various mechanisms in order to preclude or at least mitigate such activities. Many of these strategies necessitate or presume the presence of a trusted authority to actualize their(More)
Mobile wireless networks have fascinating characteristics of rapid deployment and network connectivity anywhere and anytime. Due to their very nature of being mobile, grievous security issues may arise, for which some homogeneous solutions have already been proposed. However, each node may have its own security requirements depending on the available(More)
Networks have become an integral part of all communications, associations, businesses, services, government/public organizations and human interactions around the globe. Emergence of technologies and dynamism of user needs & access pattern of network resources have shifted paradigm to wireless ad-hoc network infrastructure supporting mobile devices. Ad-hoc(More)
Security and privacy threats in technological environment are great hindrances to use latest technologies for our benefits. Such threats also exist in RFID systems which are currently utilized to a great extent in ubiquitous communication. These systems can also work in combination with cellular networks to control user's physical objects in a secure way(More)
An important aspect when implementing haptic system is to resemble as closely as possible the specific real world haptic sensation the feedback is trying to mimic. System designers have used various techniques to improve realism of such sensation. One of the approaches is by involving haptic feedback analysis that employs visualization of haptic sensation.(More)
  • 1