Muhammad Sher
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2023
Assessment of Runoff Components of River Flow in the Karakoram Mountains, Pakistan, during 1995-2010.
Remote. Sens., January, 2023
Integrating Copernicus Satellite Products and Ground-Truthing for Documenting and Monitoring the Impact of the 2022 Extreme Floods in Pakistan on Cultural Heritage.
Remote. Sens., 2023
2021
QR Digital Payment System Adoption by Retailers: The Moderating Role of COVID-19 Knowledge.
Inf. Resour. Manag. J., 2021
2020
Peer-to-Peer Netw. Appl., 2020
2019
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre.
IEEE Syst. J., 2019
Fisher score and Matthews correlation coefficient-based feature subset selection for heart disease diagnosis using support vector machines.
Knowl. Inf. Syst., 2019
2018
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data.
J. Supercomput., 2018
An improved and robust biometrics-based three factor authentication scheme for multiserver environments.
J. Supercomput., 2018
An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multim. Tools Appl., 2018
A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multim. Tools Appl., 2018
KSII Trans. Internet Inf. Syst., 2018
Entropy Generation on Nanofluid Thin Film Flow of Eyring-Powell Fluid with Thermal Radiation and MHD Effect on an Unsteady Porous Stretching Sheet.
Entropy, 2018
Comput. Ind., 2018
2017
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
Wirel. Pers. Commun., 2017
Wirel. Commun. Mob. Comput., 2017
Peer-to-Peer Netw. Appl., 2017
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme.
Multim. Tools Appl., 2017
Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network.
J. Comput. Networks Commun., 2017
Applying One-Class Classification Techniques to IP Flow Records for Intrusion Detection.
Balt. J. Mod. Comput., 2017
2016
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre.
J. Supercomput., 2016
Energy efficient communication in body area networks using collaborative communication in Rayleigh fading channel.
Telecommun. Syst., 2016
Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks.
Sensors, 2016
J. Sensors, 2016
An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services.
KSII Trans. Internet Inf. Syst., 2016
An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture.
KSII Trans. Internet Inf. Syst., 2016
Conversion of Legal Text to a Logical Rules Set from Medical Law Using the Medical Relational Model and the World Rule Model for a Medical Decision Support System.
Informatics, 2016
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography.
Electron. Commer. Res., 2016
2015
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2015
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography.
Multim. Tools Appl., 2015
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems.
J. Medical Syst., 2015
Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks.
Int. J. Distributed Sens. Networks, 2015
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 12th International Conference on Information Technology, 2015
Proceedings of the Enterprise Security - Second International Workshop, 2015
A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Attack containment in mobile ad-hoc networks through fair distribution of processing resources.
Telecommun. Syst., 2014
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme.
Secur. Commun. Networks, 2014
Appl. Soft Comput., 2014
Workload management: a technology perspective with respect to self-* characteristics.
Artif. Intell. Rev., 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
2013
Multim. Tools Appl., 2013
Comparison of glacier change detection using pixel based and object based classification techniques.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013
2012
A survey of dynamic replication strategies for improving data availability in data grids.
Future Gener. Comput. Syst., 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem.
Proceedings of the Information Systems, Technology and Management, 2012
2011
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
2010
HMM and fuzzy logic: A hybrid approach for online Urdu script-based languages' character recognition.
Knowl. Based Syst., 2010
Int. J. Comput. Commun. Control, 2010
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the International Conference on Data Storage and Data Engineering, 2010
2009
A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging.
Inf. Secur. J. A Glob. Perspect., 2009
Proceedings of the FIT '09, 2009
Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture.
Proceedings of the High Performance Computing and Applications, 2009
2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the 16th International Conference on Networks, 2008
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
2007
PhD thesis, 2007
A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications.
Comput. Networks, 2007
Mobile multimedia broadcasting vulnerability threats, attacks and security solutions.
Proceedings of the 9th IFIP International Conference on Mobile Wireless Communications Networks, 2007
Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Handbook of Mobile Middleware., 2006
J. Networks, 2006
J. Mobile Multimedia, 2006
Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks.
Proceedings of the Q2SWinet'06, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Network Access Security Management (NASM) Model for Next Generation Mobile Telecommunication Networks.
Proceedings of the Mobility Aware Technologies and Applications, 2005
Proceedings of the Network Control and Engineering for QoS, 2005
2004
Face Identification based on Biological Trait using Infrared Images after Cold Effect Enhancement and Sunglasses Filtering.
Proceedings of the 12-th International Conference in Central Europe on Computer Graphics, 2004