Anwer Ghani

Orcid: 0000-0001-7474-0405

Affiliations:
  • International Islamic University, Islamabad, Pakistan


According to our database1, Anwer Ghani authored at least 50 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SKALP: Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing.
Trans. Emerg. Telecommun. Technol., September, 2024

Towards Smart Education through Internet of Things: A Survey.
ACM Comput. Surv., February, 2024

MCDH-SLKAP: Modified Computational Diffie-Hellman-Based Secure and Lightweight Key Agreement Protocol for Decentralized Edge Computing Networks.
IEEE Access, 2024

Accurate Wheat Yield Prediction Using Machine Learning and Climate-NDVI Data Fusion.
IEEE Access, 2024

Beyond the Illusion: Ensemble Learning for Effective Voice Deepfake Detection.
IEEE Access, 2024

Federated Learning for Real-Time Decentralized Smile Detection in Virtual Reality Environments.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024

Robust and Lightweight Authentication for Securing Communication in the Internet-of-Drones (IoD) Environment.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
Bandwidth and power efficient lightweight authentication scheme for healthcare system<sup>☆☆☆☆☆☆</sup>.
J. King Saud Univ. Comput. Inf. Sci., July, 2023

Symmetric mean binary pattern-based Pakistan sign language recognition using multiclass support vector machines.
Neural Comput. Appl., 2023

SOS: Socially omitting selfishness in IoT for smart and connected communities.
Int. J. Commun. Syst., 2023

Transforming Educational Institutions: Harnessing the Power of Internet of Things, Cloud, and Fog Computing.
Future Internet, 2023

Towards Smart Education through the Internet of Things: A Review.
CoRR, 2023

Location Centric Energy Harvesting Aware Routing Protocol for IoT in Smart Cities.
IEEE Access, 2023

Pre-Trained Model-Based NFR Classification: Overcoming Limited Data Challenges.
IEEE Access, 2023

Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks.
IEEE Access, 2023

2022
Improving network efficiency in wireless body area networks using dual forwarder selection technique.
Pers. Ubiquitous Comput., 2022

Revenue maximization approaches in IaaS clouds: Research challenges and opportunities.
Trans. Emerg. Telecommun. Technol., 2022

Multifactor Pattern Implicit Authentication.
IEEE Consumer Electron. Mag., 2022

A low-cost privacy preserving user access in mobile edge computing framework.
Comput. Electr. Eng., 2022

Light-Weight Secure Aggregated Data Sharing in IoT-Enabled Wireless Sensor Networks.
IEEE Access, 2022

2021
A secure and improved multi server authentication protocol using fuzzy commitment.
Multim. Tools Appl., 2021

Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost.
Int. J. Commun. Syst., 2021

Honesty based democratic scheme to improve community cooperation for Internet of Things based vehicular delay tolerant networks.
Trans. Emerg. Telecommun. Technol., 2021

A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment.
Comput. Networks, 2021

A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System.
Proceedings of the International Conference on Communications, 2021

2020
Selfishness in Vehicular Delay-Tolerant Networks: A Review.
Sensors, 2020

Finding rising stars in bibliometric networks.
Scientometrics, 2020

Structuring communities for sharing human digital memories in a social P2P network.
Peer-to-Peer Netw. Appl., 2020

A robust authentication and access control protocol for securing wireless healthcare sensor networks.
J. Inf. Secur. Appl., 2020

An efficient cryptographic technique using modified Diffie-Hellman in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2020

Performance-based service-level agreement in cloud computing to optimise penalties and revenue.
IET Commun., 2020

A community-based social P2P network for sharing human life digital memories.
Trans. Emerg. Telecommun. Technol., 2020

EER: Enterprise Expert Ranking using Employee Reputation.
CoRR, 2020

Honesty Based Democratic Scheme to Improve Community Cooperation for IoT Based Vehicular Delay Tolerant Networks.
CoRR, 2020

Cloud Storage Architecture: Research Challenges and Opportunities.
CoRR, 2020

PSDS-Proficient Security Over Distributed Storage: A Method for Data Transmission in Cloud.
IEEE Access, 2020

2019
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography.
Sensors, 2019

Fisher score and Matthews correlation coefficient-based feature subset selection for heart disease diagnosis using support vector machines.
Knowl. Inf. Syst., 2019

A provable and secure mobile user authentication scheme for mobile cloud computing services.
Int. J. Commun. Syst., 2019

Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key.
Int. J. Commun. Syst., 2019

Optimising infrastructure as a service provider revenue through customer satisfaction and efficient resource provisioning in cloud computing.
IET Commun., 2019

IPS: Incentive and Punishment Scheme for Omitting Selfishness in the Internet of Vehicles (Iov).
IEEE Access, 2019

Authentication and Secure Key Management in E-Health Services: A Robust and Efficient Protocol Using Biometrics.
IEEE Access, 2019

Reputation-Based Approach Toward Web Content Credibility Analysis.
IEEE Access, 2019

Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks Using Collaborative Communication.
IEEE Access, 2019

2016
Energy efficient communication in body area networks using collaborative communication in Rayleigh fading channel.
Telecommun. Syst., 2016

Conversion of Legal Text to a Logical Rules Set from Medical Law Using the Medical Relational Model and the World Rule Model for a Medical Decision Support System.
Informatics, 2016

2015
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2015

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography.
Multim. Tools Appl., 2015

2014
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme.
Secur. Commun. Networks, 2014


  Loading...