The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Muhammad Khurram Khan" ( http://dblp.L3S.de/Authors/Muhammad_Khurram_Khan )

  Author page on DBLP  Author page in RDF  Community of Muhammad Khurram Khan in ASPL-2

Publication years (Num. hits)
2004-2009 (15) 2010 (19) 2011 (30) 2012 (17) 2013 (24) 2014 (27) 2015 (23) 2016 (32) 2017 (48) 2018 (29) 2019 (16)
Publication types (Num. hits)
article(223) inproceedings(54) proceedings(3)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 14 occurrences of 12 keywords

Results
Found 281 publication records. Showing 280 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ikram Ud Din, Mohsen Guizani, Suhaidi Hassan, Byung-Seo Kim, Muhammad Khurram Khan, Mohammed Atiquzzaman, Syed Hassan Ahmed The Internet of Things: A Review of Enabled Technologies and Future Challenges. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ikram Ud Din, Mohsen Guizani, Byung-Seo Kim, Suhaidi Hassan, Muhammad Khurram Khan Trust Management Techniques for the Internet of Things: A Survey. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Saru Kumari, Pradeep Chaudhary, Chien-Ming Chen, Muhammad Khurram Khan Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Anwar Ghani, Syed Husnain A. Naqvi, Muhammad U. Ilyas, Muhammad Khurram Khan, Ali Hassan Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks Using Collaborative Communication. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shaik Shabana Anjum, Rafidah Md Noor, Mohammad Hossein Anisi, Ismail Bin Ahmedy, Fazidah Othman, Muhammad Alam 0002, Muhammad Khurram Khan Energy Management in RFID-Sensor Networks: Taxonomy and Challenges. Search on Bibsonomy IEEE Internet of Things Journal The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hasan Ali Khattak, Zoobia Ameer, Ikram Ud Din, Muhammad Khurram Khan Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities. Search on Bibsonomy Comput. Sci. Inf. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maryam Asadzadeh Kaljahi, Shivakumara Palaiahnakote, Mohammad Hossein Anisi, Mohd Yamani Idna Idris, Michael Blumenstein, Muhammad Khurram Khan A scene image classification technique for a ubiquitous visual surveillance system. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tanveer Khan, Masoom Alam, Adnan Akhunzada, Ali Hur, Muhammad Asif, Muhammad Khurram Khan Towards augmented proactive cyberthreat intelligence. Search on Bibsonomy J. Parallel Distrib. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mudassar Ali Khan, Ikram Ud Din, Sultan Ullah Jadoon, Muhammad Khurram Khan, Mohsen Guizani, Kamran Ahmad Awan g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices. Search on Bibsonomy IEEE Trans. Consumer Electronics The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan Communal Acts of IoT Consumers: A Potential Threat to Security and Privacy. Search on Bibsonomy IEEE Trans. Consumer Electronics The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, Neeraj Kumar 0001 A survey on privacy protection in blockchain system. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abdelmuttlib Ibrahim Abdallaahmed, Siti Hafizah Ab Hamid, Abdullah Gani, Suleman Khan, Muhammad Khurram Khan Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Muhammad Usman Younus, Saif ul Islam, Ihsan Ali, Suleman Khan, Muhammad Khurram Khan A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Muhammad Khurram Khan A new journey in the new year. Search on Bibsonomy Telecommunication Systems The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan, Quratul-Ain Arshad Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things. Search on Bibsonomy IEEE Consumer Electronics Magazine The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Akande Sheriff Abiodun, Mohammad Hossein Anisi, Muhammad Khurram Khan Cloud-Based Wireless Body Area Networks: Managing Data for Better Health Care. Search on Bibsonomy IEEE Consumer Electronics Magazine The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1JiLiang Li, Kim-Kwang Raymond Choo, WeiGuo Zhang, Saru Kumari, Joel J. P. C. Rodrigues, Muhammad Khurram Khan, Dieter Hogrefe EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Search on Bibsonomy Vehicular Communications The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ghufran Ahmed, Saif ul Islam, Maham Shahid, Adnan Akhunzada, Sohail Jabbar, Muhammad Khurram Khan, Muhammad Riaz, Kijun Han Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zeeshan Siddiqui, Omar Tayan, Muhammad Khurram Khan Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Qiming Zheng, Xiaomin Wang, Muhammad Khurram Khan, Wenfang Zhang, B. B. Gupta, Wei Guo A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hassan Jamil Syed, Abdullah Gani, Fariza Hanum Nasaruddin, Anjum Naveed, Abdelmuttlib Ibrahim Abdallaahmed, Muhammad Khurram Khan CloudProcMon: A Non-Intrusive Cloud Monitoring Framework. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Muhammad Zeeshan, Muhammad Majid, Imran Fareed Nizami, Syed Muhammad Anwar, Ikram Ud Din, Muhammad Khurram Khan A Newly Developed Ground Truth Dataset for Visual Saliency in Videos. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Imran Khan 0004, Shehzad Ashraf Chaudhry, Muhammad Sher, Muhammad Khurram Khan An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data. Search on Bibsonomy The Journal of Supercomputing The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shehzad Ashraf Chaudhry, Husnain Naqvi, Muhammad Khurram Khan An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammed Zakariah, Muhammad Khurram Khan, Hafiz Malik Digital multimedia audio forensics: past, present and future. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ruhul Amin, SK Hafizul Islam, Pandi Vijayakumar, Muhammad Khurram Khan, Victor Chang 0001 A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Saru Kumari, Ashok Kumar Das, Xiong Li 0002, Fan Wu 0003, Muhammad Khurram Khan, Qi Jiang 0001, SK Hafizul Islam A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mimi Ma, Debiao He, Muhammad Khurram Khan, Jianhua Chen Certificateless searchable public key encryption scheme for mobile healthcare system. Search on Bibsonomy Computers & Electrical Engineering The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sravani Challa, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar 0001, Saru Kumari, Muhammad Khurram Khan, Athanasios V. Vasilakos An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Search on Bibsonomy Computers & Electrical Engineering The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Debiao He, Neeraj Kumar 0001, Muhammad Khurram Khan, Lina Wang, Jian Shen 0001 Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services. Search on Bibsonomy IEEE Systems Journal The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ikram Ud Din, Suhaidi Hassan, Muhammad Khurram Khan, Mohsen Guizani, Osman Ghazali, Adib Habbal Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions. Search on Bibsonomy IEEE Communications Surveys and Tutorials The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Junaid Shuja, Abdullah Gani, Kwangman Ko, Kyoungyoung So, Saad Mustafa, Sajjad Ahmad Madani, Muhammad Khurram Khan SIMDOM: A framework for SIMD instruction translation and offloading in heterogeneous mobile architectures. Search on Bibsonomy Trans. Emerging Telecommunications Technologies The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1SK Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor. Search on Bibsonomy IJAHUC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ahsan Saleem, Abid Khan, Furqan Shahid, Masoom Alam, Muhammad Khurram Khan Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Naina Emmanuel, Abid Khan, Masoom Alam, Tanveer Khan, Muhammad Khurram Khan Structures and data preserving homomorphic signatures. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammed Y. Aalsalem, Wazir Zada Khan, Wajeb Gharibi, Muhammad Khurram Khan, Quratul-Ain Arshad Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shidrokh Goudarzi, Wan Haslina Hassan, Mohammad Hossein Anisi, Muhammad Khurram Khan, Seyed Ahmad Soleymani Intelligent Technique for Seamless Vertical Handover in Vehicular Networks. Search on Bibsonomy MONET The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Syed Muhammad Anwar, Muhammad Majid, Adnan Qayyum, Muhammad Awais, Majdi R. Alnowami, Muhammad Khurram Khan Medical Image Analysis using Convolutional Neural Networks: A Review. Search on Bibsonomy J. Medical Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shichao Li, Ning Zhang, Siyu Lin, Linghe Kong, Ajay K. Katangur, Muhammad Khurram Khan, Minming Ni, Gang Zhu Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things. Search on Bibsonomy IEEE Network The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiong Li 0002, Fan Wu 0003, Muhammad Khurram Khan, Lili Xu, Jian Shen 0001, Minho Jo 0001 A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Neeraj Kumar 0001 A robust and anonymous patient monitoring system using wireless medical sensor networks. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar 0001, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, YoungHo Park 0005 Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment. Search on Bibsonomy IEEE J. Biomedical and Health Informatics The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions. Search on Bibsonomy IEEE Consumer Electronics Magazine The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan Five acts of consumer behavior: A potential security and privacy threat to Internet of Things. Search on Bibsonomy ICCE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shiang-Feng Tzeng, Shi-Jinn Horng, Tianrui Li, Xian Wang, Po-Hsian Huang, Muhammad Khurram Khan Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs. Search on Bibsonomy IEEE Trans. Vehicular Technology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, Mohammad Heydari, S. Mohammad-Sajad Sadough, Saru Kumari, Muhammad Khurram Khan A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Search on Bibsonomy Int. J. Communication Systems The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Min Luo, Yunru Zhang, Muhammad Khurram Khan, Debiao He An efficient chaos-based 2-party key agreement protocol with provable security. Search on Bibsonomy Int. J. Communication Systems The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Min Luo, Yunru Zhang, Muhammad Khurram Khan, Debiao He A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography. Search on Bibsonomy Int. J. Communication Systems The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dheerendra Mishra, Saru Kumari, Muhammad Khurram Khan, Sourav Mukhopadhyay An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems. Search on Bibsonomy Int. J. Communication Systems The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiong Li 0002, Arun Kumar Sangaiah, Saru Kumari, Fan Wu 0003, Jian Shen 0001, Muhammad Khurram Khan An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city. Search on Bibsonomy Personal and Ubiquitous Computing The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1SK Hafizul Islam, Mohammad Sabzinejad Farash, G. P. Biswas, Muhammad Khurram Khan, Mohammad S. Obaidat A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography. Search on Bibsonomy Int. J. Comput. Math. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Xiong Li 0002, Fan Wu 0003, Kim-Kwang Raymond Choo, Muhammad Khurram Khan On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Search on Bibsonomy Concurrency and Computation: Practice and Experience The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Libing Wu, Jing Wang 0036, Debiao He, Muhammad Khurram Khan Cryptanalysis of an identity-based public auditing protocol for cloud storage. Search on Bibsonomy Frontiers of IT & EE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Adnan Akhunzada, Muhammad Khurram Khan Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues. Search on Bibsonomy IEEE Communications Magazine The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Linghe Kong, Kui Ren 0001, Muhammad Khurram Khan, Qi Li 0002, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1. Search on Bibsonomy IEEE Communications Magazine The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Linghe Kong, Kui Ren 0001, Muhammad Khurram Khan, Qi Li 0002, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2. Search on Bibsonomy IEEE Communications Magazine The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Linghe Kong, Muhammad Khurram Khan, Fan Wu 0006, Guihai Chen, Peng Zeng 0001 Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges. Search on Bibsonomy IEEE Communications Magazine The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seyed Ahmad Soleymani, Abdul Hanan Abdullah, Mahdi Zareei, Mohammad Hossein Anisi, César Vargas Rosales, Muhammad Khurram Khan, Shidrokh Goudarzi A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Samman Zahra, Masoom Alam, Qaisar Javaid, Abdul Wahid, Nadeem Javaid, Saif Ur Rehman Malik, Muhammad Khurram Khan Fog Computing Over IoT: A Secure Deployment and Formal Verification. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Minho Jo 0001 Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Junaid Shuja, Saad Mustafa, Raja Wasim Ahmad, Sajjad Ahmad Madani, Abdullah Gani, Muhammad Khurram Khan Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan, Abdulatif Al-Dhawailie Al-Ghaiheb, Neeraj Kumar 0001, Athanasios V. Vasilakos Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment. Search on Bibsonomy IEEE Internet of Things Journal The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhiyan Xu, Libing Wu, Debiao He, Muhammad Khurram Khan Security analysis of a publicly verifiable data possession scheme for remote storage. Search on Bibsonomy The Journal of Supercomputing The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhiyan Xu, Libing Wu, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Debiao He A secure and efficient public auditing scheme using RSA algorithm for cloud storage. Search on Bibsonomy The Journal of Supercomputing The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Masoom Alam, Saif Ur Rehman Malik, Qaisar Javed, Abid Khan, Shamaila Bisma Khan, Adeel Anjum, Nadeem Javed, Adnan Akhunzada, Muhammad Khurram Khan Formal modeling and verification of security controls for multimedia systems in the cloud. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abdullah Yousafzai, Abdullah Gani, Rafidah Md Noor, Mehdi Sookhak, Hamid Talebian, Muhammad Shiraz, Muhammad Khurram Khan Cloud resource allocation schemes: review, taxonomy, and opportunities. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan, Quratul-Ain Arshad When social objects collaborate: Concepts, processing elements, attacks and challenges. Search on Bibsonomy Computers & Electrical Engineering The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vanga Odelu, Ashok Kumar Das, Y. Sreenivasa Rao, Saru Kumari, Muhammad Khurram Khan, Kim-Kwang Raymond Choo Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Search on Bibsonomy Computer Standards & Interfaces The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shidrokh Goudarzi, Wan Haslina Hassan, Mohammad Hossein Anisi, Seyed Ahmad Soleymani, Mehdi Sookhak, Muhammad Khurram Khan, Aisha-Hassan A. Hashim, Mahdi Zareei ABC-PSO for vertical handover in heterogeneous wireless networks. Search on Bibsonomy Neurocomputing The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mohsen Guizani, Muhammad Khurram Khan Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art. Search on Bibsonomy IEEE Communications Surveys and Tutorials The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Siyu Lin, Linghe Kong, Qian Gao 0004, Muhammad Khurram Khan, Zhangdui Zhong, Xi Jin, Peng Zeng 0001 Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G Systems. Search on Bibsonomy IEEE Wireless Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Han Shen, Jian Shen 0001, Muhammad Khurram Khan, Jong-Hyouk Lee Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things. Search on Bibsonomy Wireless Personal Communications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shehzad Ashraf Chaudhry, Husnain Naqvi, Khalid Mahmood 0002, Hafiz Farooq Ahmad, Muhammad Khurram Khan An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography. Search on Bibsonomy Wireless Personal Communications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marimuthu Karuppiah, Saru Kumari, Xiong Li 0002, Fan Wu 0003, Ashok Kumar Das, Muhammad Khurram Khan, R. Saravanan 0001, Sayantani Basu A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Search on Bibsonomy Wireless Personal Communications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ruhul Amin, R. Simon Sherratt, Debasis Giri, SK Hafizul Islam, Muhammad Khurram Khan A software agent enabled biometric security algorithm for secure file access in consumer storage devices. Search on Bibsonomy IEEE Trans. Consumer Electronics The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hassan Jamil Syed, Abdullah Gani, Raja Wasim Ahmad, Muhammad Khurram Khan, Abdelmuttlib Ibrahim Abdallaahmed Cloud monitoring: A review, taxonomy, and open research issues. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Muhammad Habib Ur Rehman, Chee Sun Liew, Teh Ying Wah, Muhammad Khurram Khan Towards next-generation heterogeneous mobile data stream mining applications: Opportunities, challenges, and future research directions. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shahid Anwar, Zakira Inayat, Mohamed Fadli Bin Zolkipli, Jasni Mohamad Zain, Abdullah Gani, Nor Badrul Anuar, Muhammad Khurram Khan, Victor Chang 0001 Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Suleman Khan, Muhammad Shiraz, Laleh Boroumand, Abdullah Gani, Muhammad Khurram Khan Towards port-knocking authentication methods for mobile cloud computing. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sidra Aslam, Saif ul Islam, Abid Khan, Mansoor Ahmed, Adnan Akhunzada, Muhammad Khurram Khan Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Prerna Mohit, Ruhul Amin, Arijit Karati, G. P. Biswas, Muhammad Khurram Khan A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System. Search on Bibsonomy J. Medical Systems The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mehdi Sookhak, F. Richard Yu, Muhammad Khurram Khan, Yang Xiang 0001, Rajkumar Buyya Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ruhul Amin, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, Saru Kumari A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. Search on Bibsonomy Security and Communication Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saru Kumari, Shehzad Ashraf Chaudhry, Fan Wu 0003, Xiong Li 0002, Mohammad Sabzinejad Farash, Muhammad Khurram Khan An improved smart card based authentication scheme for session initiation protocol. Search on Bibsonomy Peer-to-Peer Networking and Applications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anam Nazir, Masoom Alam, Saif Ur Rehman Malik, Adnan Akhunzada, Muhammad Nadeem Cheema, Muhammad Khurram Khan, Yang Ziang, Tanveer Khan, Abid Khan A high-level domain-specific language for SIEM (design, development and formal verification). Search on Bibsonomy Cluster Computing The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmed Abdelaziz, Tan Fong Ang, Abdullah Gani, Suleman Khan, Faiz Alotaibi, Muhammad Khurram Khan On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues. Search on Bibsonomy Comput. J. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Akande Sheriff Abiodun, Mohammad Hossein Anisi, Ihsan Ali, Adnan Akhunzada, Muhammad Khurram Khan Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique. Search on Bibsonomy IEEE Consumer Electronics Magazine The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mouzna Tahir, Abid Khan, Abdul Hameed, Masoom Alam, Muhammad Khurram Khan, Farhana Jabeen Towards a set aggregation-based data integrity scheme for smart grids. Search on Bibsonomy Annales des Télécommunications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fan Wu 0003, Lili Xu, Saru Kumari, Xiong Li 0002, Muhammad Khurram Khan, Ashok Kumar Das An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Search on Bibsonomy Annales des Télécommunications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhe Liu 0001, Xinyi Huang, Zhi Hu, Muhammad Khurram Khan, Hwajeong Seo, Lu Zhou On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram M. Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". Search on Bibsonomy ICIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Muhammad Khurram Khan, Zeeshan Siddiqui, Omar Tayan A secure framework for digital Quran certification. Search on Bibsonomy ICCE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saru Kumari, Muhammad Khurram Khan, Xiong Li 0002, Fan Wu 0003 Design of a user anonymous password authentication scheme without smart card. Search on Bibsonomy Int. J. Communication Systems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1SK Hafizul Islam, Muhammad Khurram Khan Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. Search on Bibsonomy Int. J. Communication Systems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Lu Leng, Neeraj Kumar 0001 Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Search on Bibsonomy Computer Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mahdi Zareei, Ehab Mahmoud Mohamed, Mohammad Hossein Anisi, César Vargas Rosales, Kazuya Tsukamoto, Muhammad Khurram Khan On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc Network. Search on Bibsonomy IEEE Access The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Salman Iqbal, Ahmed Abdelaziz, Omar Adil Mahdi, Abdelmuttlib Ibrahim Abdallaahmed, Muhammad Shiraz, Yusor Rafid Bahar Al-Mayouf, Ziar Khan, Kwangman Ko, Muhammad Khurram Khan, Victor Chang 0001 Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis. Search on Bibsonomy IEEE Access The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qi Jiang 0001, Muhammad Khurram Khan, Xiang Lu, Jianfeng Ma, Debiao He A privacy preserving three-factor authentication protocol for e-Health clouds. Search on Bibsonomy The Journal of Supercomputing The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Saru Kumari, Fan Wu 0003, Xiong Li 0002, Mohammad Sabzinejad Farash, Qi Jiang 0001, Muhammad Khurram Khan, Ashok Kumar Das Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 280 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license