His primary scientific interests are in Computer security, Malware, World Wide Web, Digital signature and Cryptography. His Computer security research incorporates themes from Computer network and Data structure. Zulfikar Ramzan works mostly in the field of World Wide Web, limiting it down to topics relating to Software and, in certain cases, Filter, Identification, End user and Versa, as a part of the same area of interest.
His Ring signature, Blind signature and Schnorr signature study in the realm of Digital signature connects with subjects such as Electronic cash. His work investigates the relationship between Ring signature and topics such as Random oracle that intersect with problems in Theoretical computer science and Discrete logarithm. His studies in Cryptography integrate themes in fields like Public key certificate, Certificate authority, Encryption, Certificate and Revocation.
His main research concerns Computer security, Theoretical computer science, Cryptography, World Wide Web and Encryption. The Computer security study combines topics in areas such as Computer network and Phishing. Zulfikar Ramzan combines subjects such as Key derivation function, Hash function, Secure Hash Standard, Message authentication code and Key schedule with his study of Theoretical computer science.
Zulfikar Ramzan interconnects Discrete logarithm, Random oracle and The Internet in the investigation of issues within Cryptography. His Random oracle study combines topics from a wide range of disciplines, such as Adversary, Substitution-permutation network and Ring signature, Digital signature. As part of the same scientific family, he usually focuses on Malware, concentrating on Software and intersecting with Identification.
His scientific interests lie mostly in Computer security, World Wide Web, Malware, Operating system and Software. His research links Phishing with Computer security. Many of his research projects under World Wide Web are closely connected to Action, Time to live, Imitation and Domain masking with Action, Time to live, Imitation and Domain masking, tying the diverse disciplines of science together.
His research investigates the connection between Malware and topics such as End user that intersect with problems in Resource allocation. His research in Software focuses on subjects like Identification, which are connected to Filter. His Security token study also includes
His main research concerns Computer security, Malware, World Wide Web, Software and Identification. His primary area of study in Computer security is in the field of Transport Layer Security. Zulfikar Ramzan has researched Malware in several fields, including Computer file, Feature vector, Artificial intelligence, Construct and Event.
His study in the field of End user and Versa is also linked to topics like Action. The various areas that Zulfikar Ramzan examines in his Identification study include Filter and Laptop.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Single-database private information retrieval with constant communication rate
Craig Gentry;Zulfikar Ramzan.
international colloquium on automata languages and programming (2005)
Identity-Based aggregate signatures
Craig Gentry;Zulfikar Ramzan.
public key cryptography (2006)
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash
Anna Lysyanskaya;Zulfikar Ramzan.
financial cryptography (1998)
Filter-based identification of malicious websites
Zulfikar Ramzan.
(2008)
Crimeware: Understanding New Attacks and Defenses
Markus Jakobsson;Zulfikar Ramzan.
(2008)
SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions
Mark Etzel;Sarvar Patel;Zulfikar Ramzan.
international cryptology conference (1999)
Drive-by pharming
Sid Stamm;Zulfikar Ramzan;Markus Jakobsson.
international conference on information and communication security (2007)
Using sequencing and timing information of behavior events in machine learning to detect malware
Sourabh Satish;Zulfikar Ramzan.
(2010)
A method for making password-based key exchange resilient to server compromise
Craig Gentry;Philip MacKenzie;Zulfikar Ramzan.
international cryptology conference (2006)
Using machine infection characteristics for behavior-based detection of malware
Vijay Seshardi;Zulfikar Ramzan;Sourabh Satish;Chandrasekhar Kalle.
(2009)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
TripleBlind
Google (United States)
ZapFraud
Carnegie Mellon University
Washington University in St. Louis
Boston University
Brown University
University of Seville
Tel Aviv University
University of California, Irvine
Microsoft (United States)
Michigan State University
Robert Bosch (Germany)
Université de Sherbrooke
Duke University
James Cook University
Technical University of Berlin
United States Geological Survey
University of Copenhagen
University of Chicago
University of New Hampshire
University of Ulsan
University of California, San Francisco