Dr Rahman Ziaur

Profile image of Dr Rahman Ziaur

Faculty of Science,
School of Computer Science


Expertise related to UN Sustainable Development Goals

In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. This person’s work contributes towards the following SDG(s):

  • SDG 3 - Good Health and Well-being
  • SDG 4 - Quality Education
  • SDG 5 - Gender Equality
  • SDG 9 - Industry, Innovation and Infrastructure
  • SDG 10 - Reduced Inequalities
  • SDG 12 - Responsible Consumption and Production
  • SDG 17 - Partnerships for the Goals

Personal details

Positions

Research Fellow in Cyber Security
Faculty of Science,
School of Computer Science

Keywords

Blockchain Technology, Internet of Things Security, Edge Machine Learning, Software Security, Post-quantum Cryptography, Cybersecurity

Research field

Distributed Computing, Computer Software, Artificial Intelligence and Image Processing

Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008

Qualifications

  • Doctor of Philosophy (RMIT University Melbourne)

Professional memberships and associations

Professional Member, Australian Information Security Association (AISA), Australia


  • Registration number: M289361ID
  • Current status: Active

Professional Member, Association for Computing Machinery, USA


  • Registration number: 7441133
  • Current status: Active

Full Member,  Institute of Electrical and Electronics Engineers (IEEE), USA


  • Registration number 94742759
  • Current status: Active

Full Member, Australian Computer Society (ACS), Australia


  • Registration number 4265362
  • Current status: Active
  • Area of Continous Profession Hours (CPD): Cyber Security Analyst ( Completed Session & Risk Management with 100% score)

Full Member, Institution of Engineers (IEB), Bangladesh


  • Registration number 41139
  • Date of expiry: NA
  • Current status: Active

Teaching

Academic courses conducted:


[1] Advanced Networks (IFN649 @QUT)

  • This unit is designed for graduate students in the Masters of IT. Students will learn the theory, architecture, hardware/software, and programming of networks, including network services and Internet-of-Things (IoT).

[2] Programming Foundations in Python (FIT9133 @Monash Uni)

  • Basic python programming.  Jupiter Notebook., Python for network security

[3] Programming with C++ Theory & Practical (ICT -2103 & 2104 @MBSTU)

  • Structural programming, Object-oriented programming, Collection , File I/O, project Development.

[4] Advanced Java & Practical (ICT-2205 & 2206 @MBSTU)

  • Java Standard Edition (JDK 1.12), Java Enterprise Edition (J2EE), Java FX UI, Project Development.

[5] Secure Electronic Commerce & Sessional (CS-1950 @RMIT)

  • Symmetric Encryption, Assymetric Encryption, RSA, RSADSA, ECDSA, Elgamal, Secure Payment Gateway, Blind Signature, etc.

[6] Cyber Security (SWE-3203 @DIU)


[7] Software Quality Assurance and Testing (ICT-5105-5106 @MBSTU)

  • J-Unit Testing, Testing Annotation,  Project Development

For more, list of courses I conducted so far are also available on Linkedin.


Cybersecurity Learning Help:



  • How to generate a chart using python matplotlib and pandas?  📄


  • What is IoT? Can you make me understand with an example? 📄


  • What is digital currency? Do Fiat, Commodity, Coupon and Crypto confuse you like me?   📄


  • What is Blockchain? Need a simple answer? 📄


  • Have heard about Hyperledger permissioned Blockchain? Here is its consensus look like. 📄


  • Do you want to understand RSA algorithm with a simple example? 📄


  • Do you know how RSA works with Digital Signature Algorithm (DSA)? 📄


  • What if we consider an El Gamal encryption scheme over an Elliptic curve ? Here is the simple example. 📄


  • Multi-signature/Signature Aggregation :  Let 's calculate some well-known multisig schemes. Yes, Multi-signature (9 examples): Kiesler-Harn & GQ  Identity-based (IBE), Okamato, Schnorr, and Boneh–Lynn–Shacham (BLS) signature aggrgation techniques with curve singularity & cardinality are here. 📄


  • Let's have a look on Cybersecurity tutorials now?  It contains couple of topics that we eventually talk and use. For example, Contents such as  Digital cash model, SSL/TLS Handshaking, Elliptic Curve Digital Signature Algorithm (ECDSA), Addition, Doubling formula, Elliptic Curve over Galois field, E-commerce security etc. Digital Envelope, Dual Signature (NIST recetnly recommends to use it for transitional post-quantum security) are here. (total 10 tutes) 📄


  • Do you know Learning With Error (LWE)? Yes it is the core concept of lattice-based signatures that are even secure in the post-quantum era.  Let us learn Short  Vector Problem (SVP), Short Integer Solution (SIS) and how these work for the Lattic-based signature technique. 📄

These single-click pdf documents are based on email conversations with the teaching coordination team in different time.

Experience

Publications

Research outputs by year

QUT ePrints

For more publications by Rahman, explore their research in QUT ePrints (our digital repository).

View more publications

Filter publications:

A complete list of publications is available at: https://www.qut.edu.au/about/our-people/academic-profiles/rahman.ziaur

Awards

Supervision

Looking for a postgraduate research supervisor?

I am currently accepting research students for Honours, Masters and PhD study.

You can browse existing student topics offered by QUT or propose your own topic.

View student topics