Ashraf Masood

Orcid: 0000-0001-6564-1587

According to our database1, Ashraf Masood authored at least 20 papers between 2004 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Analytical study of hardware-rooted security standards and their implementation techniques in mobile.
Telecommun. Syst., 2020

2016
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.
J. Medical Syst., 2016

Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems.
Ann. des Télécommunications, 2016

2015
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network.
Mob. Inf. Syst., 2015

2014
Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

2010
Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

2009
An efficient collusion resistant security mechanism for heterogeneous sensor networks.
Internet Res., 2009

Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol.
Proceedings of the NBiS 2009, 2009

2008
Scalable and efficient key management for heterogeneous sensor networks.
J. Supercomput., 2008

Algebraic analysis of Trivium and Trivium/128.
Int. J. Electron. Secur. Digit. Forensics, 2008

Key Management and Secure Routing in Heterogeneous Sensor Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

2007
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

An efficient key distribution scheme for heterogeneous sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

A Key Management Scheme Based on Random Key Distribution for Clustered Wireless Sensor Networks.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

An Analysis of Public Key Cryptography based Techniques in Wireless Sensor Networks.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Algebraic Attack on A5-type Irregularly Clocked Key Stream Generator.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Review of Cryptanalytic Attacks on E-STREAM Submitted Stream Ciphers.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2004
Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004


  Loading...