Muhammad Khurram Khan
Orcid: 0000-0001-6636-0533Affiliations:
- King Saud University, Center of Excellence in Information Assurance, Riyadh, Saudi Arabia
According to our database1,
Muhammad Khurram Khan
authored at least 447 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Expert Syst. Appl., 2025
2024
Art or Artifact: Evaluating the Accuracy, Appeal, and Educational Value of AI-Generated Imagery in DALL·E 3 for Illustrating Congenital Heart Diseases.
J. Medical Syst., December, 2024
Global insights and the impact of generative AI-ChatGPT on multidisciplinary: a systematic review and bibliometric analysis.
Connect. Sci., December, 2024
UAV-Assisted IoT Applications, QoS Requirements and Challenges with Future Research Directions.
ACM Comput. Surv., October, 2024
IEEE Trans. Green Commun. Netw., September, 2024
Parallel intelligence in three decades: a historical review and future perspective on ACP and cyber-physical-social systems.
Artif. Intell. Rev., September, 2024
Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities.
IEEE Trans. Comput. Soc. Syst., August, 2024
Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment.
IEEE Internet Things J., July, 2024
IEEE J. Biomed. Health Informatics, June, 2024
Healthcare Internet of Things: Security Threats, Challenges, and Future Research Directions.
IEEE Internet Things J., June, 2024
An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems.
ACM Trans. Sens. Networks, May, 2024
IEEE Trans. Knowl. Data Eng., May, 2024
A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain.
IEEE Internet Things J., May, 2024
Trans. Emerg. Telecommun. Technol., April, 2024
ACM Trans. Sens. Networks, March, 2024
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions.
J. Netw. Comput. Appl., March, 2024
D³APTS: Design of ECC-Based Authentication Protocol and Data Storage for Tactile Internet Enabled IoD System With Blockchain.
IEEE Trans. Consumer Electron., February, 2024
A comprehensive examination of email spoofing: Issues and prospects for email security.
Comput. Secur., February, 2024
Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks.
IEEE Trans. Intell. Transp. Syst., January, 2024
RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things.
J. Netw. Comput. Appl., January, 2024
Finger pinching and imagination classification: A fusion of CNN architectures for IoMT-enabled BCI applications.
Inf. Fusion, January, 2024
AI-Driven EEC for Healthcare IoT: Security Challenges and Future Research Directions.
IEEE Consumer Electron. Mag., January, 2024
VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment.
Veh. Commun., 2024
rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN.
IEEE Trans. Inf. Forensics Secur., 2024
A review on 5G and beyond wireless communication channel models: Applications and challenges.
Phys. Commun., 2024
CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning.
J. Netw. Comput. Appl., 2024
Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network.
J. Netw. Comput. Appl., 2024
Skin lesion classification using modified deep and multi-directional invariant handcrafted features.
J. Netw. Comput. Appl., 2024
Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues.
J. Netw. Comput. Appl., 2024
J. Netw. Comput. Appl., 2024
J. Netw. Comput. Appl., 2024
IT Prof., 2024
Internet Things, 2024
The security and privacy challenges toward cybersecurity of 6G networks: A comprehensive review.
Comput. Sci. Inf. Syst., 2024
Towards safer online communities: Deep learning and explainable AI for hate speech detection and classification.
Comput. Electr. Eng., 2024
Pairing-free certificateless public key encryption with equality test for Internet of Vehicles.
Comput. Electr. Eng., 2024
Comprehensive survey: Biometric user authentication application, evaluation, and discussion.
Comput. Electr. Eng., 2024
Appl. Intell., 2024
A Systematic Review on Blockchain-Enabled Internet of Vehicles (BIoV): Challenges, Defenses, and Future Research Directions.
IEEE Access, 2024
2023
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System.
IEEE Trans. Intell. Transp. Syst., December, 2023
Container security: Precaution levels, mitigation strategies, and research perspectives.
Comput. Secur., December, 2023
A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System.
IEEE Trans. Artif. Intell., October, 2023
An object detection-based few-shot learning approach for multimedia quality assessment.
Multim. Syst., October, 2023
Big Data, October, 2023
Editorial: Multimodality, Multidimensional Representation, and Multimedia Quality Assessment Toward Information Quality in Social Web of Things.
ACM J. Data Inf. Qual., September, 2023
An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC.
Comput. Commun., September, 2023
An efficient certificateless key exchange protocol for heterogeneous networks in human-centered IoT systems.
Int. J. Commun. Syst., August, 2023
A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things.
IEEE Internet Things J., May, 2023
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks.
IEEE Trans. Intell. Veh., April, 2023
IEEE Trans. Artif. Intell., April, 2023
Harnessing intelligent technologies to curb COVID-19 pandemic: taxonomy and open challenges.
Computing, April, 2023
Data plane failure and its recovery techniques in SDN: A systematic literature review.
J. King Saud Univ. Comput. Inf. Sci., March, 2023
IEEE Internet Things Mag., March, 2023
IEEE Trans. Intell. Transp. Syst., February, 2023
Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework.
Clust. Comput., February, 2023
Telecommun. Syst., January, 2023
An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2023
A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment.
IEEE Trans. Netw. Sci. Eng., 2023
B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs.
IEEE Trans. Netw. Sci. Eng., 2023
An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023
Vision-Motion Codesign for Low-Level Trajectory Generation in Visual Servoing Systems.
IEEE Trans. Instrum. Meas., 2023
IEEE Trans. Ind. Informatics, 2023
PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023
Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches.
IEEE Trans. Inf. Forensics Secur., 2023
VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV.
Sensors, 2023
Secur. Priv., 2023
Redefining food safety traceability system through blockchain: findings, challenges and open issues.
Multim. Tools Appl., 2023
J. Ambient Intell. Humaniz. Comput., 2023
IEEE Internet Things J., 2023
IEEE Commun. Surv. Tutorials, 2023
Comprehensive risk assessment and analysis of blockchain technology implementation using fuzzy cognitive mapping.
Comput. Sci. Inf. Syst., 2023
Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing.
Comput. Secur., 2023
IEEE Consumer Electron. Mag., 2023
A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selection.
Artif. Intell. Rev., 2023
2022
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
Wirel. Pers. Commun., 2022
ACM Trans. Internet Techn., 2022
KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Netw. Sci. Eng., 2022
Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks.
IEEE Trans. Intell. Transp. Syst., 2022
Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems.
IEEE Trans. Intell. Transp. Syst., 2022
An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System.
IEEE J. Biomed. Health Informatics, 2022
Guest Editorial: Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
Telecommun. Syst., 2022
Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications.
Multim. Tools Appl., 2022
Radiological image retrieval technique using multi-resolution texture and shape features.
Multim. Tools Appl., 2022
MHADBOR: AI-Enabled Administrative-Distance-Based Opportunistic Load Balancing Scheme for an Agriculture Internet of Things Network.
IEEE Micro, 2022
A blockchain-based conditional privacy-preserving authentication scheme for edge computing services.
J. Inf. Secur. Appl., 2022
Improving the Software-Defined Wireless Sensor Networks Routing Performance Using Reinforcement Learning.
IEEE Internet Things J., 2022
Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies.
IEEE Internet Things J., 2022
An Improved Lightweight PUF-PKI Digital Certificate Authentication Scheme for the Internet of Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges.
Int. J. Commun. Syst., 2022
Int. J. Commun. Syst., 2022
Comput. Stand. Interfaces, 2022
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment.
Comput. Stand. Interfaces, 2022
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing.
Computing, 2022
Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: March 31, 2022.
Big Data, 2022
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET.
Ad Hoc Networks, 2022
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things.
IEEE Access, 2022
Proceedings of the 2022 The 6th International Conference on Advances in Artificial Intelligence, 2022
2021
ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things.
Wirel. Pers. Commun., 2021
A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2021
Efficient Privacy-Preserving Authentication Scheme With Fine-Grained Error Location for Cloud-Based VANET.
IEEE Trans. Veh. Technol., 2021
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid.
ACM Trans. Sens. Networks, 2021
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System.
ACM Trans. Internet Techn., 2021
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography.
J. Supercomput., 2021
Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems.
IEEE Trans. Ind. Informatics, 2021
Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC".
IEEE Syst. J., 2021
Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV.
IEEE Syst. J., 2021
Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication".
IEEE Syst. J., 2021
IEEE Syst. J., 2021
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things.
Peer-to-Peer Netw. Appl., 2021
Peer-to-Peer Netw. Appl., 2021
PeerJ Comput. Sci., 2021
Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis.
J. Sensors, 2021
J. Netw. Comput. Appl., 2021
From smart parking towards autonomous valet parking: A survey, challenges and future Works.
J. Netw. Comput. Appl., 2021
Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function.
IEEE Internet Things J., 2021
Trust Management in Social Internet of Things: Architectures, Recent Advancements, and Future Challenges.
IEEE Internet Things J., 2021
SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing.
Int. J. Commun. Syst., 2021
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios.
IEEE Commun. Lett., 2021
An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network.
Trans. Emerg. Telecommun. Technol., 2021
Secure content-based image retrieval using modified Euclidean distance for encrypted features.
Trans. Emerg. Telecommun. Technol., 2021
Trans. Emerg. Telecommun. Technol., 2021
Comput. Secur., 2021
Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT.
Comput. Commun., 2021
Augmenting Cybersecurity in Autonomous Vehicles: Innovative Recommendations for Aspiring Entrepreneurs.
IEEE Consumer Electron. Mag., 2021
Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021.
Big Data, 2021
Optimizing the Lifetime of Software Defined Wireless Sensor Network via Reinforcement Learning.
IEEE Access, 2021
IEEE Access, 2021
IEEE Access, 2021
WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology Communication between BLE and WiFi.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Digital Labels: Influencing Consumers Trust and Raising Cybersecurity Awareness for Adopting Autonomous Vehicles.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
2020
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing.
Veh. Commun., 2020
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020
Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance.
IEEE Trans. Emerg. Top. Comput., 2020
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems.
IEEE Syst. J., 2020
IEEE Netw., 2020
Int. J. Commun. Syst., 2020
Future Gener. Comput. Syst., 2020
An efficient certificateless aggregate signature scheme for the Internet of Vehicles.
Trans. Emerg. Telecommun. Technol., 2020
Diagnosing COVID-19 Pneumonia from X-Ray and CT Images using Deep Learning and Transfer Learning Algorithms.
CoRR, 2020
Comput. Secur., 2020
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey.
Comput. Secur., 2020
Comput. Commun., 2020
An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET.
Sci. China Inf. Sci., 2020
Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks.
IEEE Access, 2020
IEEE Access Special Section Editorial: Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Compute and Network Resources.
IEEE Access, 2020
2019
g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices.
IEEE Trans. Consumer Electron., 2019
IEEE Trans. Consumer Electron., 2019
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment.
Soft Comput., 2019
Multim. Tools Appl., 2019
J. Parallel Distributed Comput., 2019
A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases.
J. Netw. Comput. Appl., 2019
Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges.
J. Netw. Comput. Appl., 2019
IEEE Internet Things J., 2019
Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities.
Comput. Sci. Inf. Syst., 2019
Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things.
IEEE Consumer Electron. Mag., 2019
IEEE Consumer Electron. Mag., 2019
Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique.
IEEE Access, 2019
Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications.
IEEE Access, 2019
Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks Using Collaborative Communication.
IEEE Access, 2019
IEEE Access, 2019
CrowdSwitch: Crowdsensing Based Switch between Multiple Cellular Operators in Subways.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Veh. Commun., 2018
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data.
J. Supercomput., 2018
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomed. Health Informatics, 2018
IEEE Syst. J., 2018
Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things.
IEEE Netw., 2018
Multim. Tools Appl., 2018
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multim. Tools Appl., 2018
Mob. Networks Appl., 2018
Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits.
J. Netw. Comput. Appl., 2018
Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges.
J. Netw. Comput. Appl., 2018
J. Medical Syst., 2018
A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor.
Int. J. Ad Hoc Ubiquitous Comput., 2018
A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018
A secure chaotic map-based remote authentication scheme for telecare medicine information systems.
Future Gener. Comput. Syst., 2018
SIMDOM: A framework for SIMD instruction translation and offloading in heterogeneous mobile architectures.
Trans. Emerg. Telecommun. Technol., 2018
Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions.
IEEE Commun. Surv. Tutorials, 2018
Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions.
IEEE Consumer Electron. Mag., 2018
Certificateless searchable public key encryption scheme for mobile healthcare system.
Comput. Electr. Eng., 2018
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks.
Comput. Electr. Eng., 2018
A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.
IEEE Access, 2018
IEEE Access, 2018
Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols.
IEEE Access, 2018
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018
Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare.
IEEE Access, 2018
Five acts of consumer behavior: A potential security and privacy threat to Internet of Things.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
2017
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things.
Wirel. Pers. Commun., 2017
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
IEEE Wirel. Commun., 2017
Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing.
IEEE Veh. Technol. Mag., 2017
Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs.
IEEE Trans. Veh. Technol., 2017
J. Supercomput., 2017
Security analysis of a publicly verifiable data possession scheme for remote storage.
J. Supercomput., 2017
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Secur. Comput., 2017
A software agent enabled biometric security algorithm for secure file access in consumer storage devices.
IEEE Trans. Consumer Electron., 2017
Secur. Commun. Networks, 2017
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Pers. Ubiquitous Comput., 2017
Peer-to-Peer Netw. Appl., 2017
Formal modeling and verification of security controls for multimedia systems in the cloud.
Multim. Tools Appl., 2017
Knowl. Inf. Syst., 2017
Frontiers Inf. Technol. Electron. Eng., 2017
J. Netw. Comput. Appl., 2017
Towards next-generation heterogeneous mobile data stream mining applications: Opportunities, challenges, and future research directions.
J. Netw. Comput. Appl., 2017
J. Netw. Comput. Appl., 2017
Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.
J. Netw. Comput. Appl., 2017
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey.
J. Netw. Comput. Appl., 2017
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
J. Medical Syst., 2017
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.
IEEE Internet Things J., 2017
Neurocomputing, 2017
An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems.
Int. J. Commun. Syst., 2017
A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography.
Int. J. Commun. Syst., 2017
Int. J. Commun. Syst., 2017
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.
Int. J. Commun. Syst., 2017
A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017
Attribute-based data access control in mobile cloud computing: Taxonomy and open issues.
Future Gener. Comput. Syst., 2017
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017
On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017
Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art.
IEEE Commun. Surv. Tutorials, 2017
IEEE Commun. Mag., 2017
IEEE Commun. Mag., 2017
Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges.
IEEE Commun. Mag., 2017
Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues.
IEEE Commun. Mag., 2017
A high-level domain-specific language for SIEM (design, development and formal verification).
Clust. Comput., 2017
On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues.
Comput. J., 2017
Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique.
IEEE Consumer Electron. Mag., 2017
When social objects collaborate: Concepts, processing elements, attacks and challenges.
Comput. Electr. Eng., 2017
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Ann. des Télécommunications, 2017
Ann. des Télécommunications, 2017
IEEE Access, 2017
A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing.
IEEE Access, 2017
Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures.
IEEE Access, 2017
Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017
Proceedings of the IEEE International Conference on Consumer Electronics, 2017
2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wirel. Pers. Commun., 2016
J. Supercomput., 2016
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016
An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Secur. Commun. Networks, 2016
Robust three-factor remote user authentication scheme with key agreement for multimedia systems.
Secur. Commun. Networks, 2016
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Secur. Commun. Networks, 2016
Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Secur. Commun. Networks, 2016
Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification.
Peer-to-Peer Netw. Appl., 2016
Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges.
IEEE Netw., 2016
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
J. Univers. Comput. Sci., 2016
Towards native code offloading based MCC frameworks for multimedia applications: A survey.
J. Netw. Comput. Appl., 2016
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.
J. Netw. Comput. Appl., 2016
J. Netw. Comput. Appl., 2016
A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
J. Medical Syst., 2016
A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2016
KSII Trans. Internet Inf. Syst., 2016
Int. J. Commun. Syst., 2016
Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks.
Int. J. Commun. Syst., 2016
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Commun., 2016
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Comput. Networks, 2016
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis.
IEEE Access, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
2015
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wirel. Pers. Commun., 2015
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wirel. Pers. Commun., 2015
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2015
A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems.
Secur. Commun. Networks, 2015
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing.
Secur. Commun. Networks, 2015
An enhanced privacy preserving remote user authentication scheme with provable security.
Secur. Commun. Networks, 2015
Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code.
Multim. Tools Appl., 2015
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions.
J. Netw. Comput. Appl., 2015
Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges.
J. Netw. Comput. Appl., 2015
An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.
J. Medical Syst., 2015
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Syst., 2015
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Syst., 2015
An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2015
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks.
Inf. Sci., 2015
Int. J. Distributed Sens. Networks, 2015
A new handover authentication protocol based on bilinear pairing functions for wireless networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015
IEEE Commun. Surv. Tutorials, 2015
On the security enhancement of integrated electronic patient records information systems.
Comput. Sci. Inf. Syst., 2015
IEEE Commun. Mag., 2015
Clust. Comput., 2015
Ad Hoc Networks, 2015
A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.
Proceedings of the Security and Privacy in Communication Networks, 2015
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015
2014
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs.
Wirel. Pers. Commun., 2014
Attack containment in mobile ad-hoc networks through fair distribution of processing resources.
Telecommun. Syst., 2014
Interactive Artificial Bee Colony Supported Passive Continuous Authentication System.
IEEE Syst. J., 2014
A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion.
Secur. Commun. Networks, 2014
More secure smart card-based remote user password authentication scheme with user anonymity.
Secur. Commun. Networks, 2014
An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.
Secur. Commun. Networks, 2014
Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems".
Secur. Commun. Networks, 2014
Multim. Tools Appl., 2014
J. Netw. Comput. Appl., 2014
Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System.
J. Medical Syst., 2014
Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce.
J. Medical Syst., 2014
Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition.
Neurocomputing, 2014
Int. J. Netw. Secur., 2014
An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'.
Int. J. Commun. Syst., 2014
More efficient key-hash based fingerprint remote authentication scheme using mobile device.
Computing, 2014
Comput. Electr. Eng., 2014
Comput. Ind. Eng., 2014
Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint Preprocessing.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014
The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 21st International Conference on Telecommunications, 2014
Proceedings of the IEEE 12th International Conference on Dependable, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network.
Telecommun. Syst., 2013
Telecommun. Syst., 2013
Anonymous two-factor authentication for consumer roaming service in global mobility networks.
IEEE Trans. Consumer Electron., 2013
J. Vis. Commun. Image Represent., 2013
J. Vis. Commun. Image Represent., 2013
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata.
J. Netw. Comput. Appl., 2013
J. Netw. Comput. Appl., 2013
J. Comput. Sci., 2013
Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles.
KSII Trans. Internet Inf. Syst., 2013
Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'.
KSII Trans. Internet Inf. Syst., 2013
Int. J. Electron. Secur. Digit. Forensics, 2013
Int. J. Electron. Secur. Digit. Forensics, 2013
Int. J. Distributed Sens. Networks, 2013
Int. J. Comput. Intell. Syst., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme".
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2013
2012
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography.
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
J. Netw. Comput. Appl., 2012
Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'.
J. Medical Syst., 2012
J. Medical Syst., 2012
Study on the common criteria methodology for secure ubiquitous environment construction.
J. Intell. Manuf., 2012
Int. Arab J. Inf. Technol., 2012
Adaptively weighted sub-directional two-dimensional linear discriminant analysis for face recognition.
Future Gener. Comput. Syst., 2012
Future Gener. Comput. Syst., 2012
A blind reversible method for watermarking relational databases based on a time-stamping protocol.
Expert Syst. Appl., 2012
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol".
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012
2011
Wirel. Pers. Commun., 2011
Telecommun. Syst., 2011
Telecommun. Syst., 2011
Steganalysis for palette-based images using generalized difference image and color correlogram.
Signal Process., 2011
Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks.
Sensors, 2011
Multim. Tools Appl., 2011
3D block-based medial axis transform and chessboard distance transform based on dominance.
Image Vis. Comput., 2011
Inf. Sci., 2011
Challenge-response-based biometric image scrambling for secure personal identification.
Future Gener. Comput. Syst., 2011
A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization.
Expert Syst. Appl., 2011
Expert Syst. Appl., 2011
Expert Syst. Appl., 2011
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'.
Comput. Commun., 2011
Comput. Ind. Eng., 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Information Security and Assurance - International Conference, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'.
Sensors, 2010
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem.
Sensors, 2010
Pattern Recognit., 2010
Special issue on: Recent advances and future directions in biometrics personal identification.
J. Netw. Comput. Appl., 2010
Int. J. Comput. Commun. Control, 2010
Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing.
IEICE Trans. Inf. Syst., 2010
Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals.
Digit. Signal Process., 2010
Proceedings of the Advances in Computer Science and Information Technology, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'.
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009
Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding).
Proceedings of the Bio-Science and Bio-Technology, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Neurocomputing, 2008
2007
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards.
Comput. Stand. Interfaces, 2007
Comput. Stand. Interfaces, 2007
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007
Proceedings of the Advances in Biometrics, International Conference, 2007
2006
An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards.
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006
2005
Proceedings of the Advances in Intelligent Computing, 2005
2004
Proceedings of the Advances in Biometric Person Authentication, 2004