Muhammad Khurram Khan

Orcid: 0000-0001-6636-0533

Affiliations:
  • King Saud University, Center of Excellence in Information Assurance, Riyadh, Saudi Arabia


According to our database1, Muhammad Khurram Khan authored at least 447 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
LRCN: Layer-residual Co-Attention Networks for visual question answering.
Expert Syst. Appl., 2025

2024
Art or Artifact: Evaluating the Accuracy, Appeal, and Educational Value of AI-Generated Imagery in DALL·E 3 for Illustrating Congenital Heart Diseases.
J. Medical Syst., December, 2024

Global insights and the impact of generative AI-ChatGPT on multidisciplinary: a systematic review and bibliometric analysis.
Connect. Sci., December, 2024

UAV-Assisted IoT Applications, QoS Requirements and Challenges with Future Research Directions.
ACM Comput. Surv., October, 2024

NetDP: In-Network Differential Privacy for Large-Scale Data Processing.
IEEE Trans. Green Commun. Netw., September, 2024

Parallel intelligence in three decades: a historical review and future perspective on ACP and cyber-physical-social systems.
Artif. Intell. Rev., September, 2024

Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities.
IEEE Trans. Comput. Soc. Syst., August, 2024

Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment.
IEEE Internet Things J., July, 2024

Guest Editorial XAI Based Biomedical Big Data Privacy and Security.
IEEE J. Biomed. Health Informatics, June, 2024

Healthcare Internet of Things: Security Threats, Challenges, and Future Research Directions.
IEEE Internet Things J., June, 2024

An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems.
ACM Trans. Sens. Networks, May, 2024

Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey.
IEEE Trans. Knowl. Data Eng., May, 2024

A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain.
IEEE Internet Things J., May, 2024

A survey on the blockchain techniques for the Internet of Vehicles security.
Trans. Emerg. Telecommun. Technol., April, 2024

Secure Data Sharing over Vehicular Networks Based on Multi-sharding Blockchain.
ACM Trans. Sens. Networks, March, 2024

5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions.
J. Netw. Comput. Appl., March, 2024

D³APTS: Design of ECC-Based Authentication Protocol and Data Storage for Tactile Internet Enabled IoD System With Blockchain.
IEEE Trans. Consumer Electron., February, 2024

A comprehensive examination of email spoofing: Issues and prospects for email security.
Comput. Secur., February, 2024

Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks.
IEEE Trans. Intell. Transp. Syst., January, 2024

RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things.
J. Netw. Comput. Appl., January, 2024

Finger pinching and imagination classification: A fusion of CNN architectures for IoMT-enabled BCI applications.
Inf. Fusion, January, 2024

AI-Driven EEC for Healthcare IoT: Security Challenges and Future Research Directions.
IEEE Consumer Electron. Mag., January, 2024

VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment.
Veh. Commun., 2024

rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN.
IEEE Trans. Inf. Forensics Secur., 2024

A review on 5G and beyond wireless communication channel models: Applications and challenges.
Phys. Commun., 2024

CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning.
J. Netw. Comput. Appl., 2024

Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network.
J. Netw. Comput. Appl., 2024

Skin lesion classification using modified deep and multi-directional invariant handcrafted features.
J. Netw. Comput. Appl., 2024

Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues.
J. Netw. Comput. Appl., 2024

Terra: Low-latency and reliable event collection in network measurement.
J. Netw. Comput. Appl., 2024

Blockchain applications in UAV industry: Review, opportunities, and challenges.
J. Netw. Comput. Appl., 2024

Intelligent IoT- and UAV-Assisted Architecture for Pipeline Monitoring in OGI.
IT Prof., 2024

Edge-assisted federated learning framework for smart crowd management.
Internet Things, 2024

Navigating Cybersecurity Training: A Comprehensive Review.
CoRR, 2024

The security and privacy challenges toward cybersecurity of 6G networks: A comprehensive review.
Comput. Sci. Inf. Syst., 2024

Towards safer online communities: Deep learning and explainable AI for hate speech detection and classification.
Comput. Electr. Eng., 2024

Pairing-free certificateless public key encryption with equality test for Internet of Vehicles.
Comput. Electr. Eng., 2024

Comprehensive survey: Biometric user authentication application, evaluation, and discussion.
Comput. Electr. Eng., 2024

Model-agnostic generation-enhanced technology for few-shot intrusion detection.
Appl. Intell., 2024

A Systematic Review on Blockchain-Enabled Internet of Vehicles (BIoV): Challenges, Defenses, and Future Research Directions.
IEEE Access, 2024

2023
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System.
IEEE Trans. Intell. Transp. Syst., December, 2023

Container security: Precaution levels, mitigation strategies, and research perspectives.
Comput. Secur., December, 2023

A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System.
IEEE Trans. Artif. Intell., October, 2023

An object detection-based few-shot learning approach for multimedia quality assessment.
Multim. Syst., October, 2023

Big Data-Driven Futuristic Fabric System in Societal Digital Transformation.
Big Data, October, 2023

Editorial: Multimodality, Multidimensional Representation, and Multimedia Quality Assessment Toward Information Quality in Social Web of Things.
ACM J. Data Inf. Qual., September, 2023

An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC.
Comput. Commun., September, 2023

An efficient certificateless key exchange protocol for heterogeneous networks in human-centered IoT systems.
Int. J. Commun. Syst., August, 2023

A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things.
IEEE Internet Things J., May, 2023

An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks.
IEEE Trans. Intell. Veh., April, 2023

Deep-Learning-Based COVID-19 Detection: Challenges and Future Directions.
IEEE Trans. Artif. Intell., April, 2023

Harnessing intelligent technologies to curb COVID-19 pandemic: taxonomy and open challenges.
Computing, April, 2023

Data plane failure and its recovery techniques in SDN: A systematic literature review.
J. King Saud Univ. Comput. Inf. Sci., March, 2023

Cracking the Anonymous IoT Routing Networks: A Deep Learning Approach.
IEEE Internet Things Mag., March, 2023

AISChain: Blockchain-Based AIS Data Platform With Dynamic Bloom Filter Tree.
IEEE Trans. Intell. Transp. Syst., February, 2023

Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework.
Clust. Comput., February, 2023

AI-enabled transformations in telecommunications industry.
Telecommun. Syst., January, 2023

An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2023

A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment.
IEEE Trans. Netw. Sci. Eng., 2023

B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs.
IEEE Trans. Netw. Sci. Eng., 2023

An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023

Vision-Motion Codesign for Low-Level Trajectory Generation in Visual Servoing Systems.
IEEE Trans. Instrum. Meas., 2023

Guest Editorial: Cybersecurity Intelligence in the Healthcare System.
IEEE Trans. Ind. Informatics, 2023

PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023

Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches.
IEEE Trans. Inf. Forensics Secur., 2023

VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV.
Sensors, 2023

Efficient and secure e-voting scheme using elliptic curve cryptography.
Secur. Priv., 2023

Redefining food safety traceability system through blockchain: findings, challenges and open issues.
Multim. Tools Appl., 2023

Systematic survey of mobile payments, protocols, and security infrastructure.
J. Ambient Intell. Humaniz. Comput., 2023

GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network.
IEEE Internet Things J., 2023

Editor's Note.
Int. J. Interact. Multim. Artif. Intell., 2023

Edge-computing-driven Internet of Things: A Survey.
ACM Comput. Surv., 2023

Empowering Network Security With Programmable Switches: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

Comprehensive risk assessment and analysis of blockchain technology implementation using fuzzy cognitive mapping.
Comput. Sci. Inf. Syst., 2023

Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing.
Comput. Secur., 2023

Cybersecurity Digital Labels for Connected and Autonomous Vehicles.
IEEE Consumer Electron. Mag., 2023

A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selection.
Artif. Intell. Rev., 2023

2022
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
Wirel. Pers. Commun., 2022

Secure Distributed Mobile Volunteer Computing with Android.
ACM Trans. Internet Techn., 2022

KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System.
IEEE Trans. Netw. Sci. Eng., 2022

A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy.
IEEE Trans. Netw. Sci. Eng., 2022

Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View.
IEEE Trans. Intell. Transp. Syst., 2022

DeFLoc: Deep Learning Assisted Indoor Vehicle Localization Atop FM Fingerprint Map.
IEEE Trans. Intell. Transp. Syst., 2022

Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System.
IEEE J. Biomed. Health Informatics, 2022

Guest Editorial: Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures.
IEEE Trans. Ind. Informatics, 2022

Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry.
IEEE Trans. Ind. Informatics, 2022

Technology and telecommunications: a panacea in the COVID-19 crisis.
Telecommun. Syst., 2022

Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications.
Multim. Tools Appl., 2022

Radiological image retrieval technique using multi-resolution texture and shape features.
Multim. Tools Appl., 2022

MHADBOR: AI-Enabled Administrative-Distance-Based Opportunistic Load Balancing Scheme for an Agriculture Internet of Things Network.
IEEE Micro, 2022

A blockchain-based conditional privacy-preserving authentication scheme for edge computing services.
J. Inf. Secur. Appl., 2022

Improving the Software-Defined Wireless Sensor Networks Routing Performance Using Reinforcement Learning.
IEEE Internet Things J., 2022

Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies.
IEEE Internet Things J., 2022

An Improved Lightweight PUF-PKI Digital Certificate Authentication Scheme for the Internet of Things.
IEEE Internet Things J., 2022

An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT.
IEEE Internet Things J., 2022

Co-Learning to Hash Palm Biometrics for Flexible IoT Deployment.
IEEE Internet Things J., 2022

Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges.
Int. J. Commun. Syst., 2022

ESOTP: ECC-based secure object tracking protocol for IoT communication.
Int. J. Commun. Syst., 2022

Designing secure and lightweight user access to drone for smart city surveillance.
Comput. Stand. Interfaces, 2022

Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment.
Comput. Stand. Interfaces, 2022

An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing.
Computing, 2022

Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: March 31, 2022.
Big Data, 2022

A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET.
Ad Hoc Networks, 2022

ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things.
IEEE Access, 2022

Deep Ternary Hashing Code for Palmprint Retrieval and Recognition.
Proceedings of the 2022 The 6th International Conference on Advances in Artificial Intelligence, 2022

2021
Reliable and Secure e-Health Networks.
Wirel. Pers. Commun., 2021

ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things.
Wirel. Pers. Commun., 2021

A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2021

Efficient Privacy-Preserving Authentication Scheme With Fine-Grained Error Location for Cloud-Based VANET.
IEEE Trans. Veh. Technol., 2021

Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid.
ACM Trans. Sens. Networks, 2021

EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System.
ACM Trans. Internet Techn., 2021

A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography.
J. Supercomput., 2021

Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems.
IEEE Trans. Ind. Informatics, 2021

Importance of telecommunications in the times of COVID-19.
Telecommun. Syst., 2021

Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC".
IEEE Syst. J., 2021

Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV.
IEEE Syst. J., 2021

Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication".
IEEE Syst. J., 2021

Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones.
IEEE Syst. J., 2021

A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things.
Peer-to-Peer Netw. Appl., 2021

Verifiable dynamic ranked search with forward privacy over encrypted cloud data.
Peer-to-Peer Netw. Appl., 2021

Hand-based multibiometric systems: state-of-the-art and future challenges.
PeerJ Comput. Sci., 2021

Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis.
J. Sensors, 2021

Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009-2020).
J. Netw. Comput. Appl., 2021

From smart parking towards autonomous valet parking: A survey, challenges and future Works.
J. Netw. Comput. Appl., 2021

Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function.
IEEE Internet Things J., 2021

Trust Management in Social Internet of Things: Architectures, Recent Advancements, and Future Challenges.
IEEE Internet Things J., 2021

Security and Privacy in IoT Smart Healthcare.
IEEE Internet Comput., 2021

SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing.
Int. J. Commun. Syst., 2021

Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios.
IEEE Commun. Lett., 2021

An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network.
Trans. Emerg. Telecommun. Technol., 2021

Secure content-based image retrieval using modified Euclidean distance for encrypted features.
Trans. Emerg. Telecommun. Technol., 2021

A novel authentication and key-agreement scheme for satellite communication network.
Trans. Emerg. Telecommun. Technol., 2021

Ransomware: Recent advances, analysis, challenges and future research directions.
Comput. Secur., 2021

Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT.
Comput. Commun., 2021

Augmenting Cybersecurity in Autonomous Vehicles: Innovative Recommendations for Aspiring Entrepreneurs.
IEEE Consumer Electron. Mag., 2021

Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021.
Big Data, 2021

Optimizing the Lifetime of Software Defined Wireless Sensor Network via Reinforcement Learning.
IEEE Access, 2021

Palmprint-Palmvein Fusion Recognition Based on Deep Hashing Network.
IEEE Access, 2021

A Survey on Blockchain Technology: Evolution, Architecture and Security.
IEEE Access, 2021

WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology Communication between BLE and WiFi.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Digital Labels: Influencing Consumers Trust and Raising Cybersecurity Awareness for Adopting Autonomous Vehicles.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

2020
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing.
Veh. Commun., 2020

DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020

Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance.
IEEE Trans. Emerg. Top. Comput., 2020

Technological advancements and 2020.
Telecommun. Syst., 2020

A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems.
IEEE Syst. J., 2020

Volunteer Computing in Connected Vehicles: Opportunities and Challenges.
IEEE Netw., 2020

Blockchain-based identity management systems: A review.
J. Netw. Comput. Appl., 2020

Bat algorithm-based beamforming for mmWave massive MIMO systems.
Int. J. Commun. Syst., 2020

PoRX: A reputation incentive scheme for blockchain consensus of IIoT.
Future Gener. Comput. Syst., 2020

An efficient certificateless aggregate signature scheme for the Internet of Vehicles.
Trans. Emerg. Telecommun. Technol., 2020

Diagnosing COVID-19 Pneumonia from X-Ray and CT Images using Deep Learning and Transfer Learning Algorithms.
CoRR, 2020

Proof of X-repute blockchain consensus protocol for IoT systems.
Comput. Secur., 2020

Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey.
Comput. Secur., 2020

Joint-learning segmentation in Internet of drones (IoD)-based monitor systems.
Comput. Commun., 2020

An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET.
Sci. China Inf. Sci., 2020

Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks.
IEEE Access, 2020

IEEE Access Special Section Editorial: Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Compute and Network Resources.
IEEE Access, 2020

Comprehensive Survey on Big Data Privacy Protection.
IEEE Access, 2020

Comprehensive Review of Cybercrime Detection Techniques.
IEEE Access, 2020

2019
A new journey in the new year.
Telecommun. Syst., 2019

g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices.
IEEE Trans. Consumer Electron., 2019

Communal Acts of IoT Consumers: A Potential Threat to Security and Privacy.
IEEE Trans. Consumer Electron., 2019

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment.
Soft Comput., 2019

A scene image classification technique for a ubiquitous visual surveillance system.
Multim. Tools Appl., 2019

Towards augmented proactive cyberthreat intelligence.
J. Parallel Distributed Comput., 2019

A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases.
J. Netw. Comput. Appl., 2019

A survey on privacy protection in blockchain system.
J. Netw. Comput. Appl., 2019

Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges.
J. Netw. Comput. Appl., 2019

Energy Management in RFID-Sensor Networks: Taxonomy and Challenges.
IEEE Internet Things J., 2019

Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities.
Comput. Sci. Inf. Syst., 2019

Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things.
IEEE Consumer Electron. Mag., 2019

Cloud-Based Wireless Body Area Networks: Managing Data for Better Health Care.
IEEE Consumer Electron. Mag., 2019

SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm.
IEEE Access, 2019

Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique.
IEEE Access, 2019

Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications.
IEEE Access, 2019

Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks Using Collaborative Communication.
IEEE Access, 2019

Trust Management Techniques for the Internet of Things: A Survey.
IEEE Access, 2019

The Internet of Things: A Review of Enabled Technologies and Future Challenges.
IEEE Access, 2019

CrowdSwitch: Crowdsensing Based Switch between Multiple Cellular Operators in Subways.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Understanding Multi-Path Routing Algorithms in Datacenter Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Veh. Commun., 2018

An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data.
J. Supercomput., 2018

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomed. Health Informatics, 2018

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services.
IEEE Syst. J., 2018

Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things.
IEEE Netw., 2018

Digital multimedia audio forensics: past, present and future.
Multim. Tools Appl., 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018

An enhanced lightweight anonymous biometric based authentication scheme for TMIS.
Multim. Tools Appl., 2018

A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multim. Tools Appl., 2018

Intelligent Technique for Seamless Vertical Handover in Vehicular Networks.
Mob. Networks Appl., 2018

Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits.
J. Netw. Comput. Appl., 2018

Structures and data preserving homomorphic signatures.
J. Netw. Comput. Appl., 2018

Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges.
J. Netw. Comput. Appl., 2018

Medical Image Analysis using Convolutional Neural Networks: A Review.
J. Medical Syst., 2018

A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor.
Int. J. Ad Hoc Ubiquitous Comput., 2018

A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018

A secure chaotic map-based remote authentication scheme for telecare medicine information systems.
Future Gener. Comput. Syst., 2018

SIMDOM: A framework for SIMD instruction translation and offloading in heterogeneous mobile architectures.
Trans. Emerg. Telecommun. Technol., 2018

Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions.
IEEE Commun. Surv. Tutorials, 2018

Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions.
IEEE Consumer Electron. Mag., 2018

Certificateless searchable public key encryption scheme for mobile healthcare system.
Comput. Electr. Eng., 2018

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks.
Comput. Electr. Eng., 2018

A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.
IEEE Access, 2018

A Newly Developed Ground Truth Dataset for Visual Saliency in Videos.
IEEE Access, 2018

CloudProcMon: A Non-Intrusive Cloud Monitoring Framework.
IEEE Access, 2018

Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols.
IEEE Access, 2018

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018

Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare.
IEEE Access, 2018

Five acts of consumer behavior: A potential security and privacy threat to Internet of Things.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

2017
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things.
Wirel. Pers. Commun., 2017

A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2017

Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G Systems.
IEEE Wirel. Commun., 2017

Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing.
IEEE Veh. Technol. Mag., 2017

Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs.
IEEE Trans. Veh. Technol., 2017

A secure and efficient public auditing scheme using RSA algorithm for cloud storage.
J. Supercomput., 2017

Security analysis of a publicly verifiable data possession scheme for remote storage.
J. Supercomput., 2017

On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Secur. Comput., 2017

A software agent enabled biometric security algorithm for secure file access in consumer storage devices.
IEEE Trans. Consumer Electron., 2017

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments.
Secur. Commun. Networks, 2017

An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Pers. Ubiquitous Comput., 2017

An improved smart card based authentication scheme for session initiation protocol.
Peer-to-Peer Netw. Appl., 2017

Formal modeling and verification of security controls for multimedia systems in the cloud.
Multim. Tools Appl., 2017

Cloud resource allocation schemes: review, taxonomy, and opportunities.
Knowl. Inf. Syst., 2017

Cryptanalysis of an identity-based public auditing protocol for cloud storage.
Frontiers Inf. Technol. Electron. Eng., 2017

Cloud monitoring: A review, taxonomy, and open research issues.
J. Netw. Comput. Appl., 2017

Towards next-generation heterogeneous mobile data stream mining applications: Opportunities, challenges, and future research directions.
J. Netw. Comput. Appl., 2017

Towards port-knocking authentication methods for mobile cloud computing.
J. Netw. Comput. Appl., 2017

Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.
J. Netw. Comput. Appl., 2017

Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey.
J. Netw. Comput. Appl., 2017

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
J. Medical Syst., 2017

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.
IEEE Internet Things J., 2017

ABC-PSO for vertical handover in heterogeneous wireless networks.
Neurocomputing, 2017

An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems.
Int. J. Commun. Syst., 2017

A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography.
Int. J. Commun. Syst., 2017

An efficient chaos-based 2-party key agreement protocol with provable security.
Int. J. Commun. Syst., 2017

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.
Int. J. Commun. Syst., 2017

A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017

Attribute-based data access control in mobile cloud computing: Taxonomy and open issues.
Future Gener. Comput. Syst., 2017

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017

Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art.
IEEE Commun. Surv. Tutorials, 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2.
IEEE Commun. Mag., 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1.
IEEE Commun. Mag., 2017

Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges.
IEEE Commun. Mag., 2017

Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues.
IEEE Commun. Mag., 2017

A high-level domain-specific language for SIEM (design, development and formal verification).
Clust. Comput., 2017

On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues.
Comput. J., 2017

Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique.
IEEE Consumer Electron. Mag., 2017

When social objects collaborate: Concepts, processing elements, attacks and challenges.
Comput. Electr. Eng., 2017

An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Ann. des Télécommunications, 2017

Towards a set aggregation-based data integrity scheme for smart grids.
Ann. des Télécommunications, 2017

Fog Computing Over IoT: A Secure Deployment and Formal Verification.
IEEE Access, 2017

A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing.
IEEE Access, 2017

Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures.
IEEE Access, 2017

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017

Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

A secure framework for digital Quran certification.
Proceedings of the IEEE International Conference on Consumer Electronics, 2017

2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wirel. Pers. Commun., 2016

A privacy preserving three-factor authentication protocol for e-Health clouds.
J. Supercomput., 2016

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Secur. Commun. Networks, 2016

Robust three-factor remote user authentication scheme with key agreement for multimedia systems.
Secur. Commun. Networks, 2016

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Secur. Commun. Networks, 2016

Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
Secur. Commun. Networks, 2016

A provably secure anonymous authentication scheme for Session Initiation Protocol.
Secur. Commun. Networks, 2016

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Secur. Commun. Networks, 2016

Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification.
Peer-to-Peer Netw. Appl., 2016

Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges.
IEEE Netw., 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016

A more secure digital rights management authentication scheme based on smart card.
Multim. Tools Appl., 2016

Cloud-assisted Industrial Systems and Applications.
Mob. Networks Appl., 2016

On the Analysis and Detection of Mobile Botnet Applications.
J. Univers. Comput. Sci., 2016

Towards native code offloading based MCC frameworks for multimedia applications: A survey.
J. Netw. Comput. Appl., 2016

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.
J. Netw. Comput. Appl., 2016

Intrusion response systems: Foundations, design, and challenges.
J. Netw. Comput. Appl., 2016

Secure and dependable software defined networks.
J. Netw. Comput. Appl., 2016

A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
J. Medical Syst., 2016

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2016

A User Anonymous Mutual Authentication Protocol.
KSII Trans. Internet Inf. Syst., 2016

Design of a user anonymous password authentication scheme without smart card.
Int. J. Commun. Syst., 2016

Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks.
Int. J. Commun. Syst., 2016

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Commun., 2016

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016

SNKnock: A free security tool for Facebook users.
CoRR, 2016

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Comput. Networks, 2016

On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc Network.
IEEE Access, 2016

Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis.
IEEE Access, 2016

EHR: Routing Protocol for Energy Harvesting Wireless Sensor Networks.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

2015
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wirel. Pers. Commun., 2015

Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wirel. Pers. Commun., 2015

An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2015

A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems.
Secur. Commun. Networks, 2015

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing.
Secur. Commun. Networks, 2015

An enhanced privacy preserving remote user authentication scheme with provable security.
Secur. Commun. Networks, 2015

Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code.
Multim. Tools Appl., 2015

Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions.
J. Netw. Comput. Appl., 2015

Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges.
J. Netw. Comput. Appl., 2015

An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.
J. Medical Syst., 2015

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Syst., 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Syst., 2015

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2015

An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks.
Inf. Sci., 2015

Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014.
Int. J. Distributed Sens. Networks, 2015

A new handover authentication protocol based on bilinear pairing functions for wireless networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015

A Comprehensive Study of Email Spam Botnet Detection.
IEEE Commun. Surv. Tutorials, 2015

On the security enhancement of integrated electronic patient records information systems.
Comput. Sci. Inf. Syst., 2015

Securing software defined networks: taxonomy, requirements, and open issues.
IEEE Commun. Mag., 2015

A framework to address inconstant user requirements in cloud SLAs management.
Clust. Comput., 2015

User authentication schemes for wireless sensor networks: A review.
Ad Hoc Networks, 2015

A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.
Proceedings of the Security and Privacy in Communication Networks, 2015

An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs.
Wirel. Pers. Commun., 2014

Attack containment in mobile ad-hoc networks through fair distribution of processing resources.
Telecommun. Syst., 2014

Interactive Artificial Bee Colony Supported Passive Continuous Authentication System.
IEEE Syst. J., 2014

A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion.
Secur. Commun. Networks, 2014

More secure smart card-based remote user password authentication scheme with user anonymity.
Secur. Commun. Networks, 2014

An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.
Secur. Commun. Networks, 2014

Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems".
Secur. Commun. Networks, 2014

An adaptive watermarking scheme for e-government document images.
Multim. Tools Appl., 2014

A review on remote data auditing in single cloud server: Taxonomy and open issues.
J. Netw. Comput. Appl., 2014

Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System.
J. Medical Syst., 2014

Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce.
J. Medical Syst., 2014

Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014

Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems.
J. Medical Syst., 2014

Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition.
Neurocomputing, 2014

On the Security of a RSA-based Certificateless Signature Scheme.
Int. J. Netw. Secur., 2014

An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'.
Int. J. Commun. Syst., 2014

More efficient key-hash based fingerprint remote authentication scheme using mobile device.
Computing, 2014

An improved remote user authentication scheme with key agreement.
Comput. Electr. Eng., 2014

Binary Artificial Bee Colony optimization using bitwise operation.
Comput. Ind. Eng., 2014

Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint Preprocessing.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

DWT+LSB-based fragile watermarking method for digital Quran images.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Notes on "a password-based remote user authentication scheme without smart card".
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Spam Trapping System: Novel security framework to fight against spam botnets.
Proceedings of the 21st International Conference on Telecommunications, 2014

Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

2013
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET.
IEEE Trans. Inf. Forensics Secur., 2013

Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network.
Telecommun. Syst., 2013

Editorial - Chaotic cryptography and its applications in telecommunication systems.
Telecommun. Syst., 2013

Anonymous two-factor authentication for consumer roaming service in global mobility networks.
IEEE Trans. Consumer Electron., 2013

A blind image copyright protection scheme for e-government.
J. Vis. Commun. Image Represent., 2013

Using Sorted Switching Median Filter to remove high-density impulse noises.
J. Vis. Commun. Image Represent., 2013

A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata.
J. Netw. Comput. Appl., 2013

An enhanced smart card based remote user password authentication scheme.
J. Netw. Comput. Appl., 2013

Temporal, Delegable and Cheap Update Access control to published XML Documents.
J. Comput. Sci., 2013

Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles.
KSII Trans. Internet Inf. Syst., 2013

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'.
KSII Trans. Internet Inf. Syst., 2013

Cryptanalysis of a key agreement protocol based on chaotic Hash.
Int. J. Electron. Secur. Digit. Forensics, 2013

On the security of an authentication scheme for multi-server architecture.
Int. J. Electron. Secur. Digit. Forensics, 2013

Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

An Efficient Binary Differential Evolution with Parameter Adaptation.
Int. J. Comput. Intell. Syst., 2013

Cyber security using arabic captcha scheme.
Int. Arab J. Inf. Technol., 2013

Lattice-based signcryption.
Concurr. Comput. Pract. Exp., 2013

Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard".
Proceedings of the 12th IEEE International Conference on Trust, 2013

Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Authentication and Tamper Detection of Digital Holy Quran Images.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Core-Point Detection on Camera-Based Fingerprint Image.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme".
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2013

2012
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography.
Secur. Commun. Networks, 2012

Mobile one-time passwords: two-factor authentication using mobile phones.
Secur. Commun. Networks, 2012

Analysis of existing remote attestation techniques.
Secur. Commun. Networks, 2012

Identity-based online/offline signcryption for low power devices.
J. Netw. Comput. Appl., 2012

Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'.
J. Medical Syst., 2012

An Authentication Scheme for Secure Access to Healthcare Services.
J. Medical Syst., 2012

Study on the common criteria methodology for secure ubiquitous environment construction.
J. Intell. Manuf., 2012

Copyright Protection for E-Government Document Images.
IEEE Multim., 2012

Intrinsic authentication of multimedia objects using biometric data manipulation.
Int. Arab J. Inf. Technol., 2012

Adaptively weighted sub-directional two-dimensional linear discriminant analysis for face recognition.
Future Gener. Comput. Syst., 2012

A biometric identity-based signcryption scheme.
Future Gener. Comput. Syst., 2012

High performance biometrics recognition algorithms and systems.
Future Gener. Comput. Syst., 2012

A blind reversible method for watermarking relational databases based on a time-stamping protocol.
Expert Syst. Appl., 2012

Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

Detecting counterfeit-money using RFID-enabled mobile devices.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol".
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

Further cryptanalysis of 'A remote authentication scheme using mobile device'.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
Energy Efficient Distributed Face Recognition in Wireless Sensor Network.
Wirel. Pers. Commun., 2011

Privacy-preserving and tokenless chaotic revocable face authentication scheme.
Telecommun. Syst., 2011

Guest editorial for special issue on biometric systems and applications.
Telecommun. Syst., 2011

Steganalysis for palette-based images using generalized difference image and color correlogram.
Signal Process., 2011

Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks.
Sensors, 2011

Statistical analysis of several reversible data hiding algorithms.
Multim. Tools Appl., 2011

Research advances in data hiding for multimedia security.
Multim. Tools Appl., 2011

3D block-based medial axis transform and chessboard distance transform based on dominance.
Image Vis. Comput., 2011

An effective memetic differential evolution algorithm based on chaotic local search.
Inf. Sci., 2011

Challenge-response-based biometric image scrambling for secure personal identification.
Future Gener. Comput. Syst., 2011

An efficient wavelet-tree-based watermarking method.
Expert Syst. Appl., 2011

A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization.
Expert Syst. Appl., 2011

Mutual funds trading strategy based on particle swarm optimization.
Expert Syst. Appl., 2011

MTPSO algorithm for solving planar graph coloring problem.
Expert Syst. Appl., 2011

An efficient phishing webpage detector.
Expert Syst. Appl., 2011

A fast RFID tag identification algorithm based on counter and stack.
Expert Syst. Appl., 2011

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'.
Comput. Commun., 2011

A hybrid particle swarm optimization algorithm for high-dimensional problems.
Comput. Ind. Eng., 2011

A Framework for Detecting Malformed SMS Attack.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Embedding High Capacity Covert Channels in Short Message Service (SMS).
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Information Security Awareness Campaign: An Alternate Approach.
Proceedings of the Information Security and Assurance - International Conference, 2011

Secure Instant Messaging Protocol for Centralized Communication Group.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

OTP-Based Two-Factor Authentication Using Mobile Phones.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Application of evolutionary algorithms in detecting SMS spam at access layer.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

Polymorphic Malware Detection Using Hierarchical Hidden Markov Model.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Biometric driven initiative system for passive continuous authentication.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'.
Sensors, 2010

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem.
Sensors, 2010

Performance evaluation of score level fusion in multimodal biometric systems.
Pattern Recognit., 2010

Special issue on: Recent advances and future directions in biometrics personal identification.
J. Netw. Comput. Appl., 2010

Information Sharing in Vehicular AdHoc Network.
Int. J. Comput. Commun. Control, 2010

Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing.
IEICE Trans. Inf. Syst., 2010

Improvement of the Efficient Secret Broadcast Scheme.
IEICE Trans. Inf. Syst., 2010

Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals.
Digit. Signal Process., 2010

Fingerprint verification using statistical descriptors.
Digit. Signal Process., 2010

Chaos-based secure satellite imagery cryptosystem.
Comput. Math. Appl., 2010

Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Security Analysis of Firewall Rule Sets in Computer Networks.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010

Contactless Biometrics in Wireless Sensor Network: A Survey.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Using Arabic CAPTCHA for Cyber Security.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

One-Time Password System with Infinite Nested Hash Chains.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Face Recognition using Layered Linear Discriminant Analysis and Small Subspace.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'.
Proceedings of the Third International Conference on Network and System Security, 2009

Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding).
Proceedings of the Bio-Science and Bio-Technology, 2009

Bio-chaotic Stream Cipher-Based Iris Image Encryption.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Multimodal face and fingerprint biometrics authentication on space-limited tokens.
Neurocomputing, 2008

2007
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards.
Comput. Stand. Interfaces, 2007

Improving the security of 'a flexible biometrics remote user authentication scheme'.
Comput. Stand. Interfaces, 2007

An Intelligent Fingerprint-Biometric Image Scrambling Scheme.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007

Robust Hiding of Fingerprint-Biometric Data into Audio Signals.
Proceedings of the Advances in Biometrics, International Conference, 2007

2006
Intelligent Transportation Systems.
IEEE Pervasive Comput., 2006

Pointing a Finger toward Standardized and Automated Biometrics.
IEEE Multim., 2006

An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards.
Proceedings of the Information Security Practice and Experience, 2006

Enhancing the Transmission Security of Content-Based Hidden Biometric Data.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

2005
Securing Biometric Templates for Reliable Identity Authentication.
Proceedings of the Advances in Intelligent Computing, 2005

2004
Protecting Biometric Data for Personal Identification.
Proceedings of the Advances in Biometric Person Authentication, 2004


  Loading...