Ashraf Masood
Orcid: 0000-0001-6564-1587
According to our database1,
Ashraf Masood
authored at least 20 papers
between 2004 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Analytical study of hardware-rooted security standards and their implementation techniques in mobile.
Telecommun. Syst., 2020
2016
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.
J. Medical Syst., 2016
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems.
Ann. des Télécommunications, 2016
2015
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network.
Mob. Inf. Syst., 2015
2014
Int. J. Distributed Sens. Networks, 2014
2010
Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
2009
An efficient collusion resistant security mechanism for heterogeneous sensor networks.
Internet Res., 2009
Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol.
Proceedings of the NBiS 2009, 2009
2008
J. Supercomput., 2008
Int. J. Electron. Secur. Digit. Forensics, 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
2007
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007
A Key Management Scheme Based on Random Key Distribution for Clustered Wireless Sensor Networks.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
An Analysis of Public Key Cryptography based Techniques in Wireless Sensor Networks.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
Algebraic Attack on A5-type Irregularly Clocked Key Stream Generator.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
A Review of Cryptanalytic Attacks on E-STREAM Submitted Stream Ciphers.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004