Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Muhammad Khurram Khan
@article{DBLP:journals/apin/HeY0KN0L24, author = {Junpeng He and Lingfeng Yao and Xiong Li and Muhammad Khurram Khan and Weina Niu and Xiaosong Zhang and Fagen Li}, title = {Model-agnostic generation-enhanced technology for few-shot intrusion detection}, journal = {Appl. Intell.}, volume = {54}, number = {4}, pages = {3181--3204}, year = {2024}, url = {https://doi.org/10.1007/s10489-024-05290-8}, doi = {10.1007/S10489-024-05290-8}, timestamp = {Fri, 12 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/HeY0KN0L24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/AdilKFJAJ24, author = {Muhammad Adil and Muhammad Khurram Khan and Ahmed Farouk and Mian Ahmad Jan and Adnan Anwar and Zhanpeng Jin}, title = {AI-Driven {EEC} for Healthcare IoT: Security Challenges and Future Research Directions}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {13}, number = {1}, pages = {39--47}, year = {2024}, url = {https://doi.org/10.1109/MCE.2022.3226585}, doi = {10.1109/MCE.2022.3226585}, timestamp = {Sun, 19 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cem/AdilKFJAJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SethuramanSRRK24, author = {Sibi Chakkaravarthy Sethuraman and Devi Priya V. S and Tarun Reddi and Mulka Sai Tharun Reddy and Muhammad Khurram Khan}, title = {A comprehensive examination of email spoofing: Issues and prospects for email security}, journal = {Comput. Secur.}, volume = {137}, pages = {103600}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103600}, doi = {10.1016/J.COSE.2023.103600}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SethuramanSRRK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/KumarSKKKK24, author = {Sathish Kumar and Velliangiri Sarveshwaran and Periyasami Karthikeyan and Saru Kumari and Sachin Kumar and Muhammad Khurram Khan}, title = {A survey on the blockchain techniques for the Internet of Vehicles security}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {35}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/ett.4317}, doi = {10.1002/ETT.4317}, timestamp = {Tue, 16 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/KumarSKKKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/VaroneBDKKGH24, author = {Giuseppe Varone and Wadii Boulila and Maha Driss and Saru Kumari and Muhammad Khurram Khan and Thippa Reddy Gadekallu and Amir Hussain}, title = {Finger pinching and imagination classification: {A} fusion of {CNN} architectures for IoMT-enabled {BCI} applications}, journal = {Inf. Fusion}, volume = {101}, pages = {102006}, year = {2024}, url = {https://doi.org/10.1016/j.inffus.2023.102006}, doi = {10.1016/J.INFFUS.2023.102006}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/VaroneBDKKGH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangLLHK24, author = {Ruijin Wang and Jinshan Lai and Xiong Li and Donglin He and Muhammad Khurram Khan}, title = {{RPIFL:} Reliable and Privacy-Preserving Federated Learning for the Internet of Things}, journal = {J. Netw. Comput. Appl.}, volume = {221}, pages = {103768}, year = {2024}, url = {https://doi.org/10.1016/j.jnca.2023.103768}, doi = {10.1016/J.JNCA.2023.103768}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WangLLHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AdilSKFJ24, author = {Muhammad Adil and Houbing Song and Muhammad Khurram Khan and Ahmed Farouk and Zhanpeng Jin}, title = {5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions}, journal = {J. Netw. Comput. Appl.}, volume = {223}, pages = {103828}, year = {2024}, url = {https://doi.org/10.1016/j.jnca.2024.103828}, doi = {10.1016/J.JNCA.2024.103828}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AdilSKFJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangZWKF24, author = {Yu Wang and Wenfang Zhang and Xiaomin Wang and Muhammad Khurram Khan and Pingzhi Fan}, title = {Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {25}, number = {1}, pages = {370--385}, year = {2024}, url = {https://doi.org/10.1109/TITS.2023.3307453}, doi = {10.1109/TITS.2023.3307453}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangZWKF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/QinHFKLC24, author = {Hong Qin and Debiao He and Qi Feng and Muhammad Khurram Khan and Min Luo and Kim{-}Kwang Raymond Choo}, title = {Cryptographic Primitives in Privacy-Preserving Machine Learning: {A} Survey}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {36}, number = {5}, pages = {1919--1934}, year = {2024}, url = {https://doi.org/10.1109/TKDE.2023.3321803}, doi = {10.1109/TKDE.2023.3321803}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/QinHFKLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/HuangKWCGHK24, author = {Junqin Huang and Linghe Kong and Jingwei Wang and Guihai Chen and Jianhua Gao and Gang Huang and Muhammad Khurram Khan}, title = {Secure Data Sharing over Vehicular Networks Based on Multi-sharding Blockchain}, journal = {{ACM} Trans. Sens. Networks}, volume = {20}, number = {2}, pages = {31:1--31:23}, year = {2024}, url = {https://doi.org/10.1145/3579035}, doi = {10.1145/3579035}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/HuangKWCGHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-11326, author = {Saif Al{-}Dean Qawasmeh and Ali Abdullah S. AlQahtani and Muhammad Khurram Khan}, title = {Navigating Cybersecurity Training: {A} Comprehensive Review}, journal = {CoRR}, volume = {abs/2401.11326}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.11326}, doi = {10.48550/ARXIV.2401.11326}, eprinttype = {arXiv}, eprint = {2401.11326}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-11326.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/air/WuLK23, author = {Tengfei Wu and Lu Leng and Muhammad Khurram Khan}, title = {A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selection}, journal = {Artif. Intell. Rev.}, volume = {56}, number = {7}, pages = {6169--6186}, year = {2023}, url = {https://doi.org/10.1007/s10462-022-10334-x}, doi = {10.1007/S10462-022-10334-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/air/WuLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdata/ChakrabortyK23, author = {Chinmay Chakraborty and Muhammad Khurram Khan}, title = {Big Data-Driven Futuristic Fabric System in Societal Digital Transformation}, journal = {Big Data}, volume = {11}, number = {5}, pages = {321--322}, year = {2023}, url = {https://doi.org/10.1089/big.2023.29062.editorial}, doi = {10.1089/BIG.2023.29062.EDITORIAL}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bigdata/ChakrabortyK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/KhanKA23, author = {Wazir Zada Khan and Muhammad Khurram Khan and Qurat{-}ul{-}Ain Arshad}, title = {Cybersecurity Digital Labels for Connected and Autonomous Vehicles}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {12}, number = {1}, pages = {87--93}, year = {2023}, url = {https://doi.org/10.1109/MCE.2021.3119857}, doi = {10.1109/MCE.2021.3119857}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cem/KhanKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/GhoshUKRD23, author = {Anay Ghosh and Saiyed Umer and Muhammad Khurram Khan and Ranjeet Kumar Rout and Bibhas Chandra Dhara}, title = {Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework}, journal = {Clust. Comput.}, volume = {26}, number = {1}, pages = {119--135}, year = {2023}, url = {https://doi.org/10.1007/s10586-022-03552-z}, doi = {10.1007/S10586-022-03552-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/GhoshUKRD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChatterjeeRAKD23, author = {Uddalak Chatterjee and Sangram Ray and Sharmistha Adhikari and Muhammad Khurram Khan and Mou Dasgupta}, title = {An improved authentication and key management scheme in context of IoT-based wireless sensor network using {ECC}}, journal = {Comput. Commun.}, volume = {209}, pages = {47--62}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.06.017}, doi = {10.1016/J.COMCOM.2023.06.017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ChatterjeeRAKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangJYWK23, author = {Wenfang Zhang and Heng Jiao and Zhuoqun Yan and Xiaomin Wang and Muhammad Khurram Khan}, title = {Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing}, journal = {Comput. Secur.}, volume = {125}, pages = {103019}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103019}, doi = {10.1016/J.COSE.2022.103019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangJYWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SSK23, author = {Devi Priya V. S and Sibi Chakkaravarthy Sethuraman and Muhammad Khurram Khan}, title = {Container security: Precaution levels, mitigation strategies, and research perspectives}, journal = {Comput. Secur.}, volume = {135}, pages = {103490}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103490}, doi = {10.1016/J.COSE.2023.103490}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/KhanKK23, author = {Suleman Khan and Muhammad Khurram Khan and Rizwan Khan}, title = {Harnessing intelligent technologies to curb {COVID-19} pandemic: taxonomy and open challenges}, journal = {Computing}, volume = {105}, number = {4}, pages = {811--830}, year = {2023}, url = {https://doi.org/10.1007/s00607-021-00983-1}, doi = {10.1007/S00607-021-00983-1}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/KhanKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/SamsamianHHTK23, author = {Somayeh Samsamian and Aliakbar Hasani and Saqib Hakak and Fatemeh Esmaeilnezhad Tanha and Muhammad Khurram Khan}, title = {Comprehensive risk assessment and analysis of blockchain technology implementation using fuzzy cognitive mapping}, journal = {Comput. Sci. Inf. Syst.}, volume = {20}, number = {3}, pages = {977--996}, year = {2023}, url = {https://doi.org/10.2298/csis220308039s}, doi = {10.2298/CSIS220308039S}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/SamsamianHHTK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/ChenWLHZZYK23, author = {Xiang Chen and Chunming Wu and Xuan Liu and Qun Huang and Dong Zhang and Haifeng Zhou and Qiang Yang and Muhammad Khurram Khan}, title = {Empowering Network Security With Programmable Switches: {A} Comprehensive Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {25}, number = {3}, pages = {1653--1704}, year = {2023}, url = {https://doi.org/10.1109/COMST.2023.3265984}, doi = {10.1109/COMST.2023.3265984}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/ChenWLHZZYK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/KongTHCWJZKD23, author = {Linghe Kong and Jinlin Tan and Junqin Huang and Guihai Chen and Shuaitian Wang and Xi Jin and Peng Zeng and Muhammad Khurram Khan and Sajal K. Das}, title = {Edge-computing-driven Internet of Things: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {8}, pages = {174:1--174:41}, year = {2023}, url = {https://doi.org/10.1145/3555308}, doi = {10.1145/3555308}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/KongTHCWJZKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ChenZKKKC23, author = {Li Chen and Ke Zhang and Saru Kumari and Muhammad Khurram Khan and Zhiying Kong and Pradeep Chaudhary}, title = {An efficient certificateless key exchange protocol for heterogeneous networks in human-centered IoT systems}, journal = {Int. J. Commun. Syst.}, volume = {36}, number = {12}, year = {2023}, url = {https://doi.org/10.1002/dac.4093}, doi = {10.1002/DAC.4093}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ChenZKKKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijimai/YangSK23, author = {Jiachen Yang and Houbing Song and Muhammad Khurram Khan}, title = {Editor's Note}, journal = {Int. J. Interact. Multim. Artif. Intell.}, volume = {8}, number = {1}, pages = {4}, year = {2023}, url = {https://doi.org/10.9781/ijimai.2023.02.013}, doi = {10.9781/IJIMAI.2023.02.013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijimai/YangSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChenHKLP23, author = {Xin Chen and Debiao He and Muhammad Khurram Khan and Min Luo and Cong Peng}, title = {A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {10}, pages = {9136--9147}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3233180}, doi = {10.1109/JIOT.2022.3233180}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ChenHKLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CaiLLLGK23, author = {Jiahong Cai and Wei Liang and Xiong Li and Kuan{-}Ching Li and Zhenwen Gui and Muhammad Khurram Khan}, title = {GTxChain: {A} Secure IoT Smart Blockchain Architecture Based on Graph Neural Network}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {24}, pages = {21502--21514}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3296469}, doi = {10.1109/JIOT.2023.3296469}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/CaiLLLGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/BansalCHK23, author = {Gaurang Bansal and Vinay Chamola and Amir Hussain and Muhammad Khurram Khan}, title = {Cracking the Anonymous IoT Routing Networks: {A} Deep Learning Approach}, journal = {{IEEE} Internet Things Mag.}, volume = {6}, number = {1}, pages = {120--126}, year = {2023}, url = {https://doi.org/10.1109/IOTM.001.2200194}, doi = {10.1109/IOTM.001.2200194}, timestamp = {Mon, 20 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotm/BansalCHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/BojjaganiSCKK23, author = {Sriramulu Bojjagani and V. N. Sastry and Chien{-}Ming Chen and Saru Kumari and Muhammad Khurram Khan}, title = {Systematic survey of mobile payments, protocols, and security infrastructure}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {1}, pages = {609--654}, year = {2023}, url = {https://doi.org/10.1007/s12652-021-03316-4}, doi = {10.1007/S12652-021-03316-4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/BojjaganiSCKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdiq/ChakrabortyKKS23, author = {Chinmay Chakraborty and Mohammad Reza Khosravi and Muhammad Khurram Khan and Houbing Herbert Song}, title = {Editorial: Multimodality, Multidimensional Representation, and Multimedia Quality Assessment Toward Information Quality in Social Web of Things}, journal = {{ACM} J. Data Inf. Qual.}, volume = {15}, number = {3}, pages = {30:1--30:3}, year = {2023}, url = {https://doi.org/10.1145/3625102}, doi = {10.1145/3625102}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdiq/ChakrabortyKKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/KhanSKKKA23, author = {Nauman Khan and Rosli Bin Salleh and Anis Koubaa and Zahid Khan and Muhammad Khurram Khan and Ihsan Ali}, title = {Data plane failure and its recovery techniques in {SDN:} {A} systematic literature review}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {35}, number = {3}, pages = {176--201}, year = {2023}, url = {https://doi.org/10.1016/j.jksuci.2023.02.001}, doi = {10.1016/J.JKSUCI.2023.02.001}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/KhanSKKKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/ChatterjeeCIK23, author = {Rajdeep Chatterjee and Ankita Chatterjee and SK Hafizul Islam and Muhammad Khurram Khan}, title = {An object detection-based few-shot learning approach for multimedia quality assessment}, journal = {Multim. Syst.}, volume = {29}, number = {5}, pages = {2899--2912}, year = {2023}, url = {https://doi.org/10.1007/s00530-021-00881-8}, doi = {10.1007/S00530-021-00881-8}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mms/ChatterjeeCIK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SinghGNK23, author = {Ashish Singh and Adnan Gutub and Anand Nayyar and Muhammad Khurram Khan}, title = {Redefining food safety traceability system through blockchain: findings, challenges and open issues}, journal = {Multim. Tools Appl.}, volume = {82}, number = {14}, pages = {21243--21277}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-14006-4}, doi = {10.1007/S11042-022-14006-4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SinghGNK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ChatterjeeRAKD23, author = {Uddalak Chatterjee and Sangram Ray and Sharmistha Adhikari and Muhammad Khurram Khan and Mou Dasgupta}, title = {Efficient and secure e-voting scheme using elliptic curve cryptography}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.283}, doi = {10.1002/SPY2.283}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ChatterjeeRAKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GongLXCX0K23, author = {Yinyan Gong and Kuan{-}Ching Li and Lijun Xiao and Jiahong Cai and Jiahong Xiao and Wei Liang and Muhammad Khurram Khan}, title = {{VASERP:} An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV}, journal = {Sensors}, volume = {23}, number = {11}, pages = {5198}, year = {2023}, url = {https://doi.org/10.3390/s23115198}, doi = {10.3390/S23115198}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/GongLXCX0K23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tai/ArshadKAK23, author = {Qurat{-}ul{-}Ain Arshad and Wazir Zada Khan and Faisal Azam and Muhammad Khurram Khan}, title = {Deep-Learning-Based {COVID-19} Detection: Challenges and Future Directions}, journal = {{IEEE} Trans. Artif. Intell.}, volume = {4}, number = {2}, pages = {210--228}, year = {2023}, url = {https://doi.org/10.1109/TAI.2022.3224097}, doi = {10.1109/TAI.2022.3224097}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tai/ArshadKAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tai/SardarURK23, author = {Alamgir Sardar and Saiyed Umer and Ranjeet Kumar Rout and Muhammad Khurram Khan}, title = {A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System}, journal = {{IEEE} Trans. Artif. Intell.}, volume = {4}, number = {5}, pages = {1051--1063}, year = {2023}, url = {https://doi.org/10.1109/TAI.2022.3188596}, doi = {10.1109/TAI.2022.3188596}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tai/SardarURK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/Khan23, author = {Muhammad Khurram Khan}, title = {AI-enabled transformations in telecommunications industry}, journal = {Telecommun. Syst.}, volume = {82}, number = {1}, pages = {1--2}, year = {2023}, url = {https://doi.org/10.1007/s11235-022-00989-w}, doi = {10.1007/S11235-022-00989-W}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/Khan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenLHZZWLK23, author = {Xiang Chen and Hongyan Liu and Qun Huang and Dong Zhang and Haifeng Zhou and Chunming Wu and Xuan Liu and Muhammad Khurram Khan}, title = {Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5832--5847}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3315128}, doi = {10.1109/TIFS.2023.3315128}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenLHZZWLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/SinghKAK23, author = {Ashish Singh and Abhinav Kumar and Zahid Akhtar and Muhammad Khurram Khan}, title = {Guest Editorial: Cybersecurity Intelligence in the Healthcare System}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {1}, pages = {809--812}, year = {2023}, url = {https://doi.org/10.1109/TII.2022.3202828}, doi = {10.1109/TII.2022.3202828}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/SinghKAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/BaoHKLX23, author = {Zijian Bao and Debiao He and Muhammad Khurram Khan and Min Luo and Qi Xie}, title = {PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {2}, pages = {1524--1534}, year = {2023}, url = {https://doi.org/10.1109/TII.2022.3206798}, doi = {10.1109/TII.2022.3206798}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/BaoHKLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tim/ChengLZTWLBK23, author = {Minghao Cheng and Di Li and Nan Zhou and Hao Tang and Ge Wang and Shipeng Li and Uzair Aslam Bhatti and Muhammad Khurram Khan}, title = {Vision-Motion Codesign for Low-Level Trajectory Generation in Visual Servoing Systems}, journal = {{IEEE} Trans. Instrum. Meas.}, volume = {72}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.1109/TIM.2023.3326234}, doi = {10.1109/TIM.2023.3326234}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tim/ChengLZTWLBK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/DuanHLKLLCK23, author = {Yongshuai Duan and Junqin Huang and Jiale Lei and Linghe Kong and Yibin Lv and Zhiliang Lin and Guihai Chen and Muhammad Khurram Khan}, title = {AISChain: Blockchain-Based {AIS} Data Platform With Dynamic Bloom Filter Tree}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {2}, pages = {2332--2343}, year = {2023}, url = {https://doi.org/10.1109/TITS.2022.3188691}, doi = {10.1109/TITS.2022.3188691}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/DuanHLKLLCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/MahmoodSAGKD23, author = {Khalid Mahmood and Salman Shamshad and Muhammad Faizan Ayub and Zahid Ghaffar and Muhammad Khurram Khan and Ashok Kumar Das}, title = {Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {12}, pages = {14536--14545}, year = {2023}, url = {https://doi.org/10.1109/TITS.2023.3295818}, doi = {10.1109/TITS.2023.3295818}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/MahmoodSAGKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tiv/LiuHBWKC23, author = {Yulin Liu and Debiao He and Zijian Bao and Huaqun Wang and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks}, journal = {{IEEE} Trans. Intell. Veh.}, volume = {8}, number = {4}, pages = {2998--3011}, year = {2023}, url = {https://doi.org/10.1109/TIV.2022.3216949}, doi = {10.1109/TIV.2022.3216949}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tiv/LiuHBWKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/GhaffarSMOKK23, author = {Zahid Ghaffar and Salman Shamshad and Khalid Mahmood and Mohammad S. Obaidat and Saru Kumari and Muhammad Khurram Khan}, title = {A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {1}, pages = {103--112}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3205443}, doi = {10.1109/TNSE.2022.3205443}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/GhaffarSMOKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/AdilKJASF23, author = {Muhammad Adil and Muhammad Khurram Khan and Muhammad Mohsin Jadoon and Muhammad Attique and Houbing Song and Ahmed Farouk}, title = {An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {5}, pages = {2719--2730}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3159526}, doi = {10.1109/TNSE.2022.3159526}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/AdilKJASF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/DwivediAVK23, author = {Sanjeev Kumar Dwivedi and Ruhul Amin and Satyanarayana Vollala and Muhammad Khurram Khan}, title = {{B-HAS:} Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {6}, pages = {3491--3504}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2023.3264829}, doi = {10.1109/TNSE.2023.3264829}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/DwivediAVK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhouHKWC23, author = {Xiaotong Zhou and Debiao He and Muhammad Khurram Khan and Wei Wu and Kim{-}Kwang Raymond Choo}, title = {An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {1}, pages = {81--92}, year = {2023}, url = {https://doi.org/10.1109/TVT.2022.3204582}, doi = {10.1109/TVT.2022.3204582}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/ZhouHKWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icbds/2022, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-3300-6}, doi = {10.1007/978-981-99-3300-6}, isbn = {978-981-99-3299-3}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-16473, author = {Muhammad Adil and Houbing Song and Muhammad Khurram Khan and Ahmed Farouk and Zhanpeng Jin}, title = {5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directions}, journal = {CoRR}, volume = {abs/2305.16473}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.16473}, doi = {10.48550/ARXIV.2305.16473}, eprinttype = {arXiv}, eprint = {2305.16473}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-16473.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-13416, author = {Reem Alrawili and Ali Abdullah S. AlQahtani and Muhammad Khurram Khan}, title = {Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion}, journal = {CoRR}, volume = {abs/2311.13416}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.13416}, doi = {10.48550/ARXIV.2311.13416}, eprinttype = {arXiv}, eprint = {2311.13416}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-13416.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WazidSDSKR22, author = {Mohammad Wazid and Jaskaran Singh and Ashok Kumar Das and Sachin Shetty and Muhammad Khurram Khan and Joel J. P. C. Rodrigues}, title = {ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things}, journal = {{IEEE} Access}, volume = {10}, pages = {57990--58004}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3179418}, doi = {10.1109/ACCESS.2022.3179418}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WazidSDSKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/GoudarziSAAMKRK22, author = {Shidrokh Goudarzi and Seyed Ahmad Soleymani and Mohammad Hossein Anisi and Mohammad Abdollahi Azgomi and Zeinab Movahedi and Nazri Kama and Hazlifah Mohd Rusli and Muhammad Khurram Khan}, title = {A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled {VANET}}, journal = {Ad Hoc Networks}, volume = {128}, pages = {102782}, year = {2022}, url = {https://doi.org/10.1016/j.adhoc.2022.102782}, doi = {10.1016/J.ADHOC.2022.102782}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/GoudarziSAAMKRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdata/ChakrabortyKA22, author = {Chinmay Chakraborty and Muhammad Khurram Khan and Ishfaq Ahmad}, title = {Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: March 31, 2022}, journal = {Big Data}, volume = {10}, number = {1}, pages = {81--82}, year = {2022}, url = {https://doi.org/10.1089/big.2021.29045.cfp4}, doi = {10.1089/BIG.2021.29045.CFP4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bigdata/ChakrabortyKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/ChatterjeeRKDC22, author = {Uddalak Chatterjee and Sangram Ray and Muhammad Khurram Khan and Mou Dasgupta and Chien{-}Ming Chen}, title = {An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing}, journal = {Computing}, volume = {104}, number = {6}, pages = {1359--1395}, year = {2022}, url = {https://doi.org/10.1007/s00607-022-01055-8}, doi = {10.1007/S00607-022-01055-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/ChatterjeeRKDC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/HussainMKCAC22, author = {Sajid Hussain and Khalid Mahmood and Muhammad Khurram Khan and Chien{-}Ming Chen and Bander A. Alzahrani and Shehzad Ashraf Chaudhry}, title = {Designing secure and lightweight user access to drone for smart city surveillance}, journal = {Comput. Stand. Interfaces}, volume = {80}, pages = {103566}, year = {2022}, url = {https://doi.org/10.1016/j.csi.2021.103566}, doi = {10.1016/J.CSI.2021.103566}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/HussainMKCAC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/BeraVDLK22, author = {Basudeb Bera and Anusha Vangala and Ashok Kumar Das and Pascal Lorenz and Muhammad Khurram Khan}, title = {Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment}, journal = {Comput. Stand. Interfaces}, volume = {80}, pages = {103567}, year = {2022}, url = {https://doi.org/10.1016/j.csi.2021.103567}, doi = {10.1016/J.CSI.2021.103567}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/BeraVDLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/MajumderRSKD22, author = {Suman Majumder and Sangram Ray and Dipanwita Sadhukhan and Muhammad Khurram Khan and Mou Dasgupta}, title = {{ESOTP:} ECC-based secure object tracking protocol for IoT communication}, journal = {Int. J. Commun. Syst.}, volume = {35}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/dac.5026}, doi = {10.1002/DAC.5026}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/MajumderRSKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ManzoorSKDK22, author = {Awais Manzoor and Munam Ali Shah and Hasan Ali Khattak and Ikram Ud Din and Muhammad Khurram Khan}, title = {Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges}, journal = {Int. J. Commun. Syst.}, volume = {35}, number = {12}, year = {2022}, url = {https://doi.org/10.1002/dac.4033}, doi = {10.1002/DAC.4033}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ManzoorSKDK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XenofontosZKJKC22, author = {Christos Xenofontos and Ioannis Zografopoulos and Charalambos Konstantinou and Alireza Jolfaei and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {1}, pages = {199--221}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3079916}, doi = {10.1109/JIOT.2021.3079916}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/XenofontosZKJKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/PengLWKH22, author = {Cong Peng and Min Luo and Huaqun Wang and Muhammad Khurram Khan and Debiao He}, title = {An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {1}, pages = {589--600}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3083136}, doi = {10.1109/JIOT.2021.3083136}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/PengLWKH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YounusKB22, author = {Muhammad Usman Younus and Muhammad Khurram Khan and Abdul Rauf Bhatti}, title = {Improving the Software-Defined Wireless Sensor Networks Routing Performance Using Reinforcement Learning}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {5}, pages = {3495--3508}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3102130}, doi = {10.1109/JIOT.2021.3102130}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YounusKB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SiddiquiGK22, author = {Zeeshan Siddiqui and Jiechao Gao and Muhammad Khurram Khan}, title = {An Improved Lightweight {PUF-PKI} Digital Certificate Authentication Scheme for the Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {20}, pages = {19744--19756}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3168726}, doi = {10.1109/JIOT.2022.3168726}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/SiddiquiGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DongKLT22, author = {Xingbo Dong and Muhammad Khurram Khan and Lu Leng and Andrew Beng Jin Teoh}, title = {Co-Learning to Hash Palm Biometrics for Flexible IoT Deployment}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {23}, pages = {23786--23794}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3190020}, doi = {10.1109/JIOT.2022.3190020}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/DongKLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangJXKH22, author = {Yifan Wang and Xiaoying Jia and Yongbo Xia and Muhammad Khurram Khan and Debiao He}, title = {A blockchain-based conditional privacy-preserving authentication scheme for edge computing services}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103334}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103334}, doi = {10.1016/J.JISA.2022.103334}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangJXKH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/AdilKJF22, author = {Muhammad Adil and Muhammad Khurram Khan and Mona Jamjoom and Ahmed Farouk}, title = {{MHADBOR:} AI-Enabled Administrative-Distance-Based Opportunistic Load Balancing Scheme for an Agriculture Internet of Things Network}, journal = {{IEEE} Micro}, volume = {42}, number = {1}, pages = {41--50}, year = {2022}, url = {https://doi.org/10.1109/MM.2021.3112264}, doi = {10.1109/MM.2021.3112264}, timestamp = {Fri, 02 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/micro/AdilKJF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KumarPPIK22, author = {Sumit Kumar and Jitesh Pradhan and Arup Kumar Pal and SK Hafizul Islam and Muhammad Khurram Khan}, title = {Radiological image retrieval technique using multi-resolution texture and shape features}, journal = {Multim. Tools Appl.}, volume = {81}, number = {10}, pages = {13633--13660}, year = {2022}, url = {https://doi.org/10.1007/s11042-021-10525-8}, doi = {10.1007/S11042-021-10525-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KumarPPIK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MajhiPPIK22, author = {Mukul Majhi and Arup Kumar Pal and Jitesh Pradhan and SK Hafizul Islam and Muhammad Khurram Khan}, title = {Computational intelligence based secure three-party {CBIR} scheme for medical data for cloud-assisted healthcare applications}, journal = {Multim. Tools Appl.}, volume = {81}, number = {29}, pages = {41545--41577}, year = {2022}, url = {https://doi.org/10.1007/s11042-020-10483-7}, doi = {10.1007/S11042-020-10483-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/MajhiPPIK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/Khan22, author = {Muhammad Khurram Khan}, title = {Technology and telecommunications: a panacea in the {COVID-19} crisis}, journal = {Telecommun. Syst.}, volume = {79}, number = {1}, pages = {1--2}, year = {2022}, url = {https://doi.org/10.1007/s11235-022-00880-8}, doi = {10.1007/S11235-022-00880-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/Khan22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/RazzakXK22, author = {Imran Razzak and Guandong Xu and Muhammad Khurram Khan}, title = {Guest Editorial: Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {5}, pages = {3449--3451}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3128962}, doi = {10.1109/TII.2021.3128962}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/RazzakXK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/AnsariMGKCM22, author = {Aman Ahmad Ansari and Bharavi Mishra and Poonam Gera and Muhammad Khurram Khan and Chinmay Chakraborty and Dheerendra Mishra}, title = {Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {11}, pages = {8316--8325}, year = {2022}, url = {https://doi.org/10.1109/TII.2022.3170148}, doi = {10.1109/TII.2022.3170148}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/AnsariMGKCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/LiLLKGZ22, author = {Xiong Li and Shanpeng Liu and Rongxing Lu and Muhammad Khurram Khan and Ke Gu and Xiaosong Zhang}, title = {An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {26}, number = {5}, pages = {2020--2031}, year = {2022}, url = {https://doi.org/10.1109/JBHI.2022.3140831}, doi = {10.1109/JBHI.2022.3140831}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/LiLLKGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangZWGKF22, author = {Yu Wang and Wenfang Zhang and Xiaomin Wang and Wei Guo and Muhammad Khurram Khan and Pingzhi Fan}, title = {Improving the Security of {LTE-R} for High-Speed Railway: From the Access Authentication View}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {2}, pages = {1332--1346}, year = {2022}, url = {https://doi.org/10.1109/TITS.2020.3024684}, doi = {10.1109/TITS.2020.3024684}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangZWGKF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/DerhabBMKK22, author = {Abdelouahid Derhab and Mohamed Belaoued and Irfan Mohiuddin and Fajri Kurniawan and Muhammad Khurram Khan}, title = {Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {3}, pages = {2366--2379}, year = {2022}, url = {https://doi.org/10.1109/TITS.2021.3088998}, doi = {10.1109/TITS.2021.3088998}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/DerhabBMKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/LeiHKCK22, author = {Jiale Lei and Junqin Huang and Linghe Kong and Guihai Chen and Muhammad Khurram Khan}, title = {DeFLoc: Deep Learning Assisted Indoor Vehicle Localization Atop {FM} Fingerprint Map}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {10}, pages = {19795--19806}, year = {2022}, url = {https://doi.org/10.1109/TITS.2022.3163539}, doi = {10.1109/TITS.2022.3163539}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/LeiHKCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/BojjaganiRARRK22, author = {Sriramulu Bojjagani and Y. C. A. Padmanabha Reddy and Thati Anuradha and P. V. Venkateswara Rao and B. Ramachandra Reddy and Muhammad Khurram Khan}, title = {Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {12}, pages = {24698--24713}, year = {2022}, url = {https://doi.org/10.1109/TITS.2022.3207593}, doi = {10.1109/TITS.2022.3207593}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/BojjaganiRARRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/MeherADK22, author = {Bimal Kumar Meher and Ruhul Amin and Ashok Kumar Das and Muhammad Khurram Khan}, title = {{KL-RAP:} An Efficient Key-Less {RFID} Authentication Protocol Based on {ECDLP} for Consumer Warehouse Management System}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {5}, pages = {3411--3420}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2022.3179830}, doi = {10.1109/TNSE.2022.3179830}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/MeherADK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/HuangHCKL22, author = {Jun Huang and Debiao He and Yitao Chen and Muhammad Khurram Khan and Min Luo}, title = {A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {5}, pages = {3808--3820}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2022.3190909}, doi = {10.1109/TNSE.2022.3190909}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/HuangHCKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/BibiAMKD22, author = {Iram Bibi and Adnan Akhunzada and Jahanzaib Malik and Muhammad Khurram Khan and Muhammad Dawood}, title = {Secure Distributed Mobile Volunteer Computing with Android}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {1}, pages = {2:1--2:21}, year = {2022}, url = {https://doi.org/10.1145/3428151}, doi = {10.1145/3428151}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/BibiAMKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ShamshadRMKO22, author = {Salman Shamshad and Minahil Rana and Khalid Mahmood and Muhammad Khurram Khan and Mohammad S. Obaidat}, title = {On the Security of {A} Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing}, journal = {Wirel. Pers. Commun.}, volume = {124}, number = {1}, pages = {283--292}, year = {2022}, url = {https://doi.org/10.1007/s11277-021-09338-7}, doi = {10.1007/S11277-021-09338-7}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ShamshadRMKO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaai/LinLK22, author = {Qizhou Lin and Lu Leng and Muhammad Khurram Khan}, title = {Deep Ternary Hashing Code for Palmprint Retrieval and Recognition}, booktitle = {2022 The 6th International Conference on Advances in Artificial Intelligence, {ICAAI} 2022, Birmingham, United Kingdom, October 21-23, 2022}, pages = {88--93}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3571560.3571573}, doi = {10.1145/3571560.3571573}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaai/LinLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dsaa/2022, editor = {Joshua Zhexue Huang and Yi Pan and Barbara Hammer and Muhammad Khurram Khan and Xing Xie and Laizhong Cui and Yulin He}, title = {9th {IEEE} International Conference on Data Science and Advanced Analytics, {DSAA} 2022, Shenzhen, China, October 13-16, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSAA54385.2022}, doi = {10.1109/DSAA54385.2022}, isbn = {978-1-6654-7330-9}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsaa/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icbds/2021, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-0852-1}, doi = {10.1007/978-981-19-0852-1}, isbn = {978-981-19-0851-4}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YounusKAAAJ21, author = {Muhammad Usman Younus and Muhammad Khurram Khan and Muhammad Rizwan Anjum and Sharjeel Afridi and Zulfiqar Ali Arain and Abdul Aleem Jamali}, title = {Optimizing the Lifetime of Software Defined Wireless Sensor Network via Reinforcement Learning}, journal = {{IEEE} Access}, volume = {9}, pages = {259--272}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2020.3046693}, doi = {10.1109/ACCESS.2020.3046693}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/YounusKAAAJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BhuttaKNAKHSAC21, author = {Muhammad Nasir Mumtaz Bhutta and Amir A. Khwaja and Adnan Nadeem and Hafiz Farooq Ahmad and Muhammad Khurram Khan and Moataz Hanif and Houbing Song and Mohsen A. Rashwan and Yue Cao}, title = {A Survey on Blockchain Technology: Evolution, Architecture and Security}, journal = {{IEEE} Access}, volume = {9}, pages = {61048--61073}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3072849}, doi = {10.1109/ACCESS.2021.3072849}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BhuttaKNAKHSAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WuLKK21, author = {Tengfei Wu and Lu Leng and Muhammad Khurram Khan and Farrukh Aslam Khan}, title = {Palmprint-Palmvein Fusion Recognition Based on Deep Hashing Network}, journal = {{IEEE} Access}, volume = {9}, pages = {135816--135827}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3112513}, doi = {10.1109/ACCESS.2021.3112513}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WuLKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdata/ChakrabortyKA21, author = {Chinmay Chakraborty and Muhammad Khurram Khan and Ishfaq Ahmad}, title = {Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021}, journal = {Big Data}, volume = {9}, number = {3}, pages = {151--152}, year = {2021}, url = {https://doi.org/10.1089/big.2021.29045.cfp}, doi = {10.1089/BIG.2021.29045.CFP}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bigdata/ChakrabortyKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdata/ChakrabortyKA21a, author = {Chinmay Chakraborty and Muhammad Khurram Khan and Ishfaq Ahmad}, title = {Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021}, journal = {Big Data}, volume = {9}, number = {4}, pages = {324--325}, year = {2021}, url = {https://doi.org/10.1089/big.2021.29045.cfp2}, doi = {10.1089/BIG.2021.29045.CFP2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bigdata/ChakrabortyKA21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdata/ChakrabortyKA21b, author = {Chinmay Chakraborty and Muhammad Khurram Khan and Ishfaq Ahmad}, title = {Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021}, journal = {Big Data}, volume = {9}, number = {5}, pages = {402--403}, year = {2021}, url = {https://doi.org/10.1089/big.2021.29045.cfp3}, doi = {10.1089/BIG.2021.29045.CFP3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bigdata/ChakrabortyKA21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/KhanQ21, author = {Muhammad Khurram Khan and Amanullah Quadri}, title = {Augmenting Cybersecurity in Autonomous Vehicles: Innovative Recommendations for Aspiring Entrepreneurs}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {10}, number = {3}, pages = {111--116}, year = {2021}, url = {https://doi.org/10.1109/MCE.2020.3024513}, doi = {10.1109/MCE.2020.3024513}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/KhanQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/BanerjeeBDCKR21, author = {Soumya Banerjee and Basudeb Bera and Ashok Kumar Das and Samiran Chattopadhyay and Muhammad Khurram Khan and Joel J. P. C. Rodrigues}, title = {Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT}, journal = {Comput. Commun.}, volume = {169}, pages = {99--113}, year = {2021}, url = {https://doi.org/10.1016/j.comcom.2021.01.023}, doi = {10.1016/J.COMCOM.2021.01.023}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/BanerjeeBDCKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BeamanBAHK21, author = {Craig Beaman and Ashley Barkworth and Toluwalope David Akande and Saqib Hakak and Muhammad Khurram Khan}, title = {Ransomware: Recent advances, analysis, challenges and future research directions}, journal = {Comput. Secur.}, volume = {111}, pages = {102490}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102490}, doi = {10.1016/J.COSE.2021.102490}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BeamanBAHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/MajhiPIK21, author = {Mukul Majhi and Arup Kumar Pal and SK Hafizul Islam and Muhammad Khurram Khan}, title = {Secure content-based image retrieval using modified Euclidean distance for encrypted features}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/ett.4013}, doi = {10.1002/ETT.4013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/MajhiPIK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/RangwaniSRKD21, author = {Diksha Rangwani and Dipanwita Sadhukhan and Sangram Ray and Muhammad Khurram Khan and Mou Dasgupta}, title = {An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {3}, year = {2021}, url = {https://doi.org/10.1002/ett.4218}, doi = {10.1002/ETT.4218}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/RangwaniSRKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/AltafAMKXK21, author = {Izwa Altaf and Muhammad Arslan Akram and Khalid Mahmood and Saru Kumari and Hu Xiong and Muhammad Khurram Khan}, title = {A novel authentication and key-agreement scheme for satellite communication network}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {7}, year = {2021}, url = {https://doi.org/10.1002/ett.3894}, doi = {10.1002/ETT.3894}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/AltafAMKXK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/XuLKCH21, author = {Zhiyan Xu and Min Luo and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo and Debiao He}, title = {Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios}, journal = {{IEEE} Commun. Lett.}, volume = {25}, number = {4}, pages = {1074--1078}, year = {2021}, url = {https://doi.org/10.1109/LCOMM.2020.3042648}, doi = {10.1109/LCOMM.2020.3042648}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/XuLKCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/KumarAKKK21, author = {Vinod Kumar and Musheer Ahmad and Adesh Kumari and Saru Kumari and Muhammad Khurram Khan}, title = {{SEBAP:} {A} secure and efficient biometric-assisted authentication protocol using {ECC} for vehicular cloud computing}, journal = {Int. J. Commun. Syst.}, volume = {34}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/dac.4103}, doi = {10.1002/DAC.4103}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/KumarAKKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/KarunarathneSK21, author = {Sivanarayani M. Karunarathne and Neetesh Saxena and Muhammad Khurram Khan}, title = {Security and Privacy in IoT Smart Healthcare}, journal = {{IEEE} Internet Comput.}, volume = {25}, number = {4}, pages = {37--48}, year = {2021}, url = {https://doi.org/10.1109/MIC.2021.3051675}, doi = {10.1109/MIC.2021.3051675}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/KarunarathneSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KhanAHKS21, author = {Wazir Zada Khan and Quratul{-}Ain Arshad and Saqib Hakak and Muhammad Khurram Khan and Saeed Ur Rehman}, title = {Trust Management in Social Internet of Things: Architectures, Recent Advancements, and Future Challenges}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {10}, pages = {7768--7788}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3039296}, doi = {10.1109/JIOT.2020.3039296}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/KhanAHKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SaleemGMDRK21, author = {Muhammad Asad Saleem and Zahid Ghaffar and Khalid Mahmood and Ashok Kumar Das and Joel J. P. C. Rodrigues and Muhammad Khurram Khan}, title = {Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {22}, pages = {16613--16622}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2021.3075158}, doi = {10.1109/JIOT.2021.3075158}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/SaleemGMDRK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KhalidWACAK21, author = {Muhammad Khalid and Kezhi Wang and Nauman Aslam and Yue Cao and Naveed Ahmad and Muhammad Khurram Khan}, title = {From smart parking towards autonomous valet parking: {A} survey, challenges and future Works}, journal = {J. Netw. Comput. Appl.}, volume = {175}, pages = {102935}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2020.102935}, doi = {10.1016/J.JNCA.2020.102935}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KhalidWACAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NerurkarPBLKK21, author = {Pranav Nerurkar and Dhiren R. Patel and Yann Busnel and Romaric Ludinard and Saru Kumari and Muhammad Khurram Khan}, title = {Dissecting bitcoin blockchain: Empirical analysis of bitcoin network {(2009-2020)}}, journal = {J. Netw. Comput. Appl.}, volume = {177}, pages = {102940}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2020.102940}, doi = {10.1016/J.JNCA.2020.102940}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/NerurkarPBLKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/KhanSSBAKC21, author = {Muhammad Khurram Khan and Muhammad Shiraz and Qaisar Shaheen and Shariq Aziz Butt and Rizwan Akhtar and Muazzam Ali Khan Khattak and Wang Changda}, title = {Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis}, journal = {J. Sensors}, volume = {2021}, pages = {7459368:1--7459368:18}, year = {2021}, url = {https://doi.org/10.1155/2021/7459368}, doi = {10.1155/2021/7459368}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/js/KhanSSBAKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/AftabKKAIR21, author = {Anum Aftab and Farrukh Aslam Khan and Muhammad Khurram Khan and Haider Abbas and Waseem Iqbal and Farhan Riaz}, title = {Hand-based multibiometric systems: state-of-the-art and future challenges}, journal = {PeerJ Comput. Sci.}, volume = {7}, pages = {e707}, year = {2021}, url = {https://doi.org/10.7717/peerj-cs.707}, doi = {10.7717/PEERJ-CS.707}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/peerj-cs/AftabKKAIR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/RangwaniSRKD21, author = {Diksha Rangwani and Dipanwita Sadhukhan and Sangram Ray and Muhammad Khurram Khan and Mou Dasgupta}, title = {A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {3}, pages = {1548--1571}, year = {2021}, url = {https://doi.org/10.1007/s12083-020-01063-5}, doi = {10.1007/S12083-020-01063-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/RangwaniSRKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/ChenTWKKK21, author = {Chien{-}Ming Chen and Zhuoyu Tie and Eric Ke Wang and Muhammad Khurram Khan and Sachin Kumar and Saru Kumari}, title = {Verifiable dynamic ranked search with forward privacy over encrypted cloud data}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {5}, pages = {2977--2991}, year = {2021}, url = {https://doi.org/10.1007/s12083-021-01132-3}, doi = {10.1007/S12083-021-01132-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/ChenTWKKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/MeiXCYKK21, author = {Qian Mei and Hu Xiong and Jinhao Chen and Minghao Yang and Saru Kumari and Muhammad Khurram Khan}, title = {Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {1}, pages = {245--256}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.2966526}, doi = {10.1109/JSYST.2020.2966526}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/MeiXCYKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ShamshadMKK21, author = {Salman Shamshad and Khalid Mahmood and Saru Kumari and Muhammad Khurram Khan}, title = {Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC"}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {1}, pages = {877--880}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.2986377}, doi = {10.1109/JSYST.2020.2986377}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ShamshadMKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/MahmoodSKKO21, author = {Khalid Mahmood and Salman Shamshad and Saru Kumari and Muhammad Khurram Khan and Mohammad S. Obaidat}, title = {Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication"}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {1}, pages = {1366--1368}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.3029895}, doi = {10.1109/JSYST.2020.3029895}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/MahmoodSKKO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/HussainCAAK021, author = {Sajid Hussain and Shehzad Ashraf Chaudhry and Osama Ahmad Alomari and Mohammed H. Alsharif and Muhammad Khurram Khan and Neeraj Kumar}, title = {Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {3}, pages = {4431--4438}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2021.3057047}, doi = {10.1109/JSYST.2021.3057047}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/HussainCAAK021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/Khan21, author = {Muhammad Khurram Khan}, title = {Importance of telecommunications in the times of {COVID-19}}, journal = {Telecommun. Syst.}, volume = {76}, number = {1}, pages = {1--2}, year = {2021}, url = {https://doi.org/10.1007/s11235-020-00749-8}, doi = {10.1007/S11235-020-00749-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/Khan21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/SrinivasDLKJ21, author = {Jangirala Srinivas and Ashok Kumar Das and Xiong Li and Muhammad Khurram Khan and Minho Jo}, title = {Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {7}, pages = {4425--4436}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3011849}, doi = {10.1109/TII.2020.3011849}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/SrinivasDLKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/SadhukhanRBKD21, author = {Dipanwita Sadhukhan and Sangram Ray and G. P. Biswas and Muhammad Khurram Khan and Mou Dasgupta}, title = {A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography}, journal = {J. Supercomput.}, volume = {77}, number = {2}, pages = {1114--1151}, year = {2021}, url = {https://doi.org/10.1007/s11227-020-03318-7}, doi = {10.1007/S11227-020-03318-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/SadhukhanRBKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/PengHCKK21, author = {Cong Peng and Debiao He and Jianhua Chen and Neeraj Kumar and Muhammad Khurram Khan}, title = {{EPRT:} An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System}, journal = {{ACM} Trans. Internet Techn.}, volume = {21}, number = {3}, pages = {61:1--61:24}, year = {2021}, url = {https://doi.org/10.1145/3397678}, doi = {10.1145/3397678}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/PengHCKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/0036WZKH21, author = {Jing Wang and Libing Wu and Sherali Zeadally and Muhammad Khurram Khan and Debiao He}, title = {Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid}, journal = {{ACM} Trans. Sens. Networks}, volume = {17}, number = {3}, pages = {25:1--25:25}, year = {2021}, url = {https://doi.org/10.1145/3440249}, doi = {10.1145/3440249}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/0036WZKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WangZWKF21, author = {Yu Wang and Wenfang Zhang and Xiaomin Wang and Muhammad Khurram Khan and Pingzhi Fan}, title = {Efficient Privacy-Preserving Authentication Scheme With Fine-Grained Error Location for Cloud-Based {VANET}}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {10}, pages = {10436--10449}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3107524}, doi = {10.1109/TVT.2021.3107524}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/WangZWKF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MajumderRSKD21, author = {Suman Majumder and Sangram Ray and Dipanwita Sadhukhan and Muhammad Khurram Khan and Mou Dasgupta}, title = {ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things}, journal = {Wirel. Pers. Commun.}, volume = {116}, number = {3}, pages = {1867--1896}, year = {2021}, url = {https://doi.org/10.1007/s11277-020-07769-2}, doi = {10.1007/S11277-020-07769-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/MajumderRSKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Toral-CruzHMCK21, author = {Homero Toral{-}Cruz and Debiao He and Albena Dimitrova Mihovska and Kim{-}Kwang Raymond Choo and Muhammad Khurram Khan}, title = {Reliable and Secure e-Health Networks}, journal = {Wirel. Pers. Commun.}, volume = {117}, number = {1}, pages = {1--6}, year = {2021}, url = {https://doi.org/10.1007/s11277-021-08104-z}, doi = {10.1007/S11277-021-08104-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/Toral-CruzHMCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/KumarRDK21, author = {Vivek Kumar and Sangram Ray and Mou Dasgupta and Muhammad Khurram Khan}, title = {A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended {ASCII} Elliptic Curve Cryptography}, journal = {Wirel. Pers. Commun.}, volume = {118}, number = {4}, pages = {3045--3061}, year = {2021}, url = {https://doi.org/10.1007/s11277-021-08168-x}, doi = {10.1007/S11277-021-08168-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/KumarRDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccel/KhanKAMA21, author = {Wazir Zada Khan and Muhammad Khurram Khan and Qurat{-}ul{-}Ain Arshad and Hafiz Malik and Jalal Al{-}Muhtadi}, title = {Digital Labels: Influencing Consumers Trust and Raising Cybersecurity Awareness for Adopting Autonomous Vehicles}, booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2021, Las Vegas, NV, USA, January 10-12, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCE50685.2021.9427684}, doi = {10.1109/ICCE50685.2021.9427684}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccel/KhanKAMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ShuWKYYCWK21, author = {Yuanhe Shu and Jingwei Wang and Linghe Kong and Jiadi Yu and Guisong Yang and Yueping Cai and Zhen Wang and Muhammad Khurram Khan}, title = {WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology Communication between {BLE} and WiFi}, booktitle = {27th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2021, Beijing, China, December 14-16, 2021}, pages = {356--363}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICPADS53394.2021.00050}, doi = {10.1109/ICPADS53394.2021.00050}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpads/ShuWKYYCWK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icbds/2020, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-3150-4}, doi = {10.1007/978-981-16-3150-4}, isbn = {978-981-16-3149-8}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-06612, author = {Christos Xenofontos and Ioannis Zografopoulos and Charalambos Konstantinou and Alireza Jolfaei and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies}, journal = {CoRR}, volume = {abs/2105.06612}, year = {2021}, url = {https://arxiv.org/abs/2105.06612}, eprinttype = {arXiv}, eprint = {2105.06612}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-06612.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LimAJK20, author = {Marcus Lim and Azween B. Abdullah and N. Z. Jhanjhi and Muhammad Khurram Khan}, title = {Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {16550--16559}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2961805}, doi = {10.1109/ACCESS.2019.2961805}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LimAJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BinjubeirAISK20, author = {Mohammed Binjubeir and Abdulghani Ali Ahmed and Mohd Arfian Ismail and Ali Safaa Sadiq and Muhammad Khurram Khan}, title = {Comprehensive Survey on Big Data Privacy Protection}, journal = {{IEEE} Access}, volume = {8}, pages = {20067--20079}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2962368}, doi = {10.1109/ACCESS.2019.2962368}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/BinjubeirAISK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Al-KhaterAASK20, author = {Wadha Abdullah Al{-}Khater and Somaya Al{-}M{\'{a}}adeed and Abdulghani Ali Ahmed and Ali Safaa Sadiq and Muhammad Khurram Khan}, title = {Comprehensive Review of Cybercrime Detection Techniques}, journal = {{IEEE} Access}, volume = {8}, pages = {137293--137311}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3011259}, doi = {10.1109/ACCESS.2020.3011259}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Al-KhaterAASK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanSJYGVA20, author = {Muhammad Khurram Khan and Junaid Shuja and Yaser Jararweh and Guanding Yu and Mohsen Guizani and Christos V. Verikoukis and Raja Wasim Ahmad}, title = {{IEEE} Access Special Section Editorial: Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Compute and Network Resources}, journal = {{IEEE} Access}, volume = {8}, pages = {163769--163774}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3019975}, doi = {10.1109/ACCESS.2020.3019975}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanSJYGVA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/SoleymaniAANGKK20, author = {Seyed Ahmad Soleymani and Mohammad Hossein Anisi and Abdul Hanan Abdullah and Md. Asri Ngadi and Shidrokh Goudarzi and Muhammad Khurram Khan and Mohd Nazri Kama}, title = {An authentication and plausibility model for big data analytic under {LOS} and {NLOS} conditions in 5G-VANET}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {12}, year = {2020}, url = {https://doi.org/10.1007/s11432-019-2835-4}, doi = {10.1007/S11432-019-2835-4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/SoleymaniAANGKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangCWKK20, author = {Eric Ke Wang and Chien{-}Ming Chen and Fan Wang and Muhammad Khurram Khan and Saru Kumari}, title = {Joint-learning segmentation in Internet of drones (IoD)-based monitor systems}, journal = {Comput. Commun.}, volume = {152}, pages = {54--62}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.01.027}, doi = {10.1016/J.COMCOM.2020.01.027}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/WangCWKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangSCLKK20, author = {Eric Ke Wang and RuiPei Sun and Chien{-}Ming Chen and Zuodong Liang and Saru Kumari and Muhammad Khurram Khan}, title = {Proof of X-repute blockchain consensus protocol for IoT systems}, journal = {Comput. Secur.}, volume = {95}, pages = {101871}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101871}, doi = {10.1016/J.COSE.2020.101871}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangSCLKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShiHLKKC20, author = {Shuyun Shi and Debiao He and Li Li and Neeraj Kumar and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {Applications of blockchain in ensuring the security and privacy of electronic health record systems: {A} survey}, journal = {Comput. Secur.}, volume = {97}, pages = {101966}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101966}, doi = {10.1016/J.COSE.2020.101966}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ShiHLKKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/ZhaoHWKKX20, author = {Yanan Zhao and Yingzhe Hou and Lili Wang and Saru Kumari and Muhammad Khurram Khan and Hu Xiong}, title = {An efficient certificateless aggregate signature scheme for the Internet of Vehicles}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {31}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/ett.3708}, doi = {10.1002/ETT.3708}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/ZhaoHWKKX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangLCKK20, author = {Eric Ke Wang and Zuodong Liang and Chien{-}Ming Chen and Saru Kumari and Muhammad Khurram Khan}, title = {PoRX: {A} reputation incentive scheme for blockchain consensus of IIoT}, journal = {Future Gener. Comput. Syst.}, volume = {102}, pages = {140--151}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.08.005}, doi = {10.1016/J.FUTURE.2019.08.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangLCKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ShahjehanRKSKK20, author = {Waleed Shahjehan and Asad Riaz and Imran Khan and Ali Safaa Sadiq and Suleman Khan and Muhammad Khurram Khan}, title = {Bat algorithm-based beamforming for mmWave massive {MIMO} systems}, journal = {Int. J. Commun. Syst.}, volume = {33}, number = {2}, year = {2020}, url = {https://doi.org/10.1002/dac.4182}, doi = {10.1002/DAC.4182}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ShahjehanRKSKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiuHOKKC20, author = {Yang Liu and Debiao He and Mohammad S. Obaidat and Neeraj Kumar and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {Blockchain-based identity management systems: {A} review}, journal = {J. Netw. Comput. Appl.}, volume = {166}, pages = {102731}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2020.102731}, doi = {10.1016/J.JNCA.2020.102731}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiuHOKKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/WaheedSKIKMK20, author = {Abdul Waheed and Munam Ali Shah and Abid Khan and Saif ul Islam and Suleman Khan and Carsten Maple and Muhammad Khurram Khan}, title = {Volunteer Computing in Connected Vehicles: Opportunities and Challenges}, journal = {{IEEE} Netw.}, volume = {34}, number = {5}, pages = {212--218}, year = {2020}, url = {https://doi.org/10.1109/MNET.011.1900603}, doi = {10.1109/MNET.011.1900603}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/WaheedSKIKMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/LiPOWKC20, author = {Xiong Li and Jieyao Peng and Mohammad S. Obaidat and Fan Wu and Muhammad Khurram Khan and Chaoyang Chen}, title = {A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems}, journal = {{IEEE} Syst. J.}, volume = {14}, number = {1}, pages = {39--50}, year = {2020}, url = {https://doi.org/10.1109/JSYST.2019.2899580}, doi = {10.1109/JSYST.2019.2899580}, timestamp = {Thu, 29 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/LiPOWKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/Khan20, author = {Muhammad Khurram Khan}, title = {Technological advancements and 2020}, journal = {Telecommun. Syst.}, volume = {73}, number = {1}, pages = {1--2}, year = {2020}, url = {https://doi.org/10.1007/s11235-019-00647-8}, doi = {10.1007/S11235-019-00647-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/Khan20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/LiuCLK20, author = {Zhe Liu and Kim{-}Kwang Raymond Choo and Weiqiang Liu and Muhammad Khurram Khan}, title = {Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {8}, number = {2}, pages = {264--266}, year = {2020}, url = {https://doi.org/10.1109/TETC.2020.2995250}, doi = {10.1109/TETC.2020.2995250}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/LiuCLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinHHKC20, author = {Chao Lin and Debiao He and Xinyi Huang and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {{DCAP:} {A} Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2440--2452}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2969565}, doi = {10.1109/TIFS.2020.2969565}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LinHHKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/KumarAMKK20, author = {Vinod Kumar and Musheer Ahmad and Dheerendra Mishra and Saru Kumari and Muhammad Khurram Khan}, title = {{RSEAP:} {RFID} based secure and efficient authentication protocol for vehicular cloud computing}, journal = {Veh. Commun.}, volume = {22}, pages = {100213}, year = {2020}, url = {https://doi.org/10.1016/j.vehcom.2019.100213}, doi = {10.1016/J.VEHCOM.2019.100213}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/KumarAMKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icbds/2019, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-7530-3}, doi = {10.1007/978-981-15-7530-3}, isbn = {978-981-15-7529-7}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-00038, author = {Halgurd S. Maghdid and Aras T. Asaad and Kayhan Zrar Ghafoor and Ali Safaa Sadiq and Muhammad Khurram Khan}, title = {Diagnosing {COVID-19} Pneumonia from X-Ray and {CT} Images using Deep Learning and Transfer Learning Algorithms}, journal = {CoRR}, volume = {abs/2004.00038}, year = {2020}, url = {https://arxiv.org/abs/2004.00038}, eprinttype = {arXiv}, eprint = {2004.00038}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-00038.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DinGHKKAA19, author = {Ikram Ud Din and Mohsen Guizani and Suhaidi Hassan and Byung{-}Seo Kim and Muhammad Khurram Khan and Mohammed Atiquzzaman and Syed Hassan Ahmed}, title = {The Internet of Things: {A} Review of Enabled Technologies and Future Challenges}, journal = {{IEEE} Access}, volume = {7}, pages = {7606--7640}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2018.2886601}, doi = {10.1109/ACCESS.2018.2886601}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DinGHKKAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GhaniNIKH19, author = {Anwar Ghani and Syed Husnain Abbas Naqvi and Muhammad U. Ilyas and Muhammad Khurram Khan and Ali Hassan}, title = {Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks Using Collaborative Communication}, journal = {{IEEE} Access}, volume = {7}, pages = {26558--26570}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2898565}, doi = {10.1109/ACCESS.2019.2898565}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GhaniNIKH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DinGKHK19, author = {Ikram Ud Din and Mohsen Guizani and Byung{-}Seo Kim and Suhaidi Hassan and Muhammad Khurram Khan}, title = {Trust Management Techniques for the Internet of Things: {A} Survey}, journal = {{IEEE} Access}, volume = {7}, pages = {29763--29787}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2018.2880838}, doi = {10.1109/ACCESS.2018.2880838}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DinGKHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KumariCCK19, author = {Saru Kumari and Pradeep Chaudhary and Chien{-}Ming Chen and Muhammad Khurram Khan}, title = {Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications}, journal = {{IEEE} Access}, volume = {7}, pages = {39717--39720}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2905731}, doi = {10.1109/ACCESS.2019.2905731}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KumariCCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangZKKHL19, author = {Mengli Zhang and Gang Zhou and Muhammad Khurram Khan and Saru Kumari and Xuexian Hu and Wenfen Liu}, title = {{SPSR-FSPG:} {A} Fast Simulative Password Set Generation Algorithm}, journal = {{IEEE} Access}, volume = {7}, pages = {155107--155119}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2948975}, doi = {10.1109/ACCESS.2019.2948975}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangZKKHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LimAJKS19, author = {Marcus Lim and Azween B. Abdullah and N. Z. Jhanjhi and Muhammad Khurram Khan and Mahadevan Supramaniam}, title = {Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique}, journal = {{IEEE} Access}, volume = {7}, pages = {184797--184807}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2958873}, doi = {10.1109/ACCESS.2019.2958873}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LimAJKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/KhanAKA19, author = {Wazir Zada Khan and Mohammed Y. Aalsalem and Muhammad Khurram Khan and Quratul{-}Ain Arshad}, title = {Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {8}, number = {2}, pages = {35--38}, year = {2019}, url = {https://doi.org/10.1109/MCE.2018.2880807}, doi = {10.1109/MCE.2018.2880807}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cem/KhanAKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/AbiodunAK19, author = {Akande Sheriff Abiodun and Mohammad Hossein Anisi and Muhammad Khurram Khan}, title = {Cloud-Based Wireless Body Area Networks: Managing Data for Better Health Care}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {8}, number = {3}, pages = {55--59}, year = {2019}, url = {https://doi.org/10.1109/MCE.2019.2892244}, doi = {10.1109/MCE.2019.2892244}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/AbiodunAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/KhattakADK19, author = {Hasan Ali Khattak and Zoobia Ameer and Ikram Ud Din and Muhammad Khurram Khan}, title = {Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities}, journal = {Comput. Sci. Inf. Syst.}, volume = {16}, number = {1}, pages = {1--17}, year = {2019}, url = {https://doi.org/10.2298/CSIS181115004K}, doi = {10.2298/CSIS181115004K}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/KhattakADK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/AnjumNAAOAK19, author = {Shaik Shabana Anjum and Rafidah Md Noor and Mohammad Hossein Anisi and Ismail Bin Ahmedy and Fazidah Othman and Muhammad Alam and Muhammad Khurram Khan}, title = {Energy Management in RFID-Sensor Networks: Taxonomy and Challenges}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {1}, pages = {250--266}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2017.2728000}, doi = {10.1109/JIOT.2017.2728000}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/AnjumNAAOAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FengHZKK19, author = {Qi Feng and Debiao He and Sherali Zeadally and Muhammad Khurram Khan and Neeraj Kumar}, title = {A survey on privacy protection in blockchain system}, journal = {J. Netw. Comput. Appl.}, volume = {126}, pages = {45--58}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2018.10.020}, doi = {10.1016/J.JNCA.2018.10.020}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/FengHZKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YounusIAKK19, author = {Muhammad Usman Younus and Saif ul Islam and Ihsan Ali and Suleman Khan and Muhammad Khurram Khan}, title = {A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases}, journal = {J. Netw. Comput. Appl.}, volume = {137}, pages = {62--77}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.04.002}, doi = {10.1016/J.JNCA.2019.04.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/YounusIAKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AbdallaahmedHGK19, author = {Abdelmuttlib Ibrahim Abdallaahmed and Siti Hafizah Ab Hamid and Abdullah Gani and Suleman Khan and Muhammad Khurram Khan}, title = {Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges}, journal = {J. Netw. Comput. Appl.}, volume = {145}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.102409}, doi = {10.1016/J.JNCA.2019.102409}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AbdallaahmedHGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/KhanAAHAK19, author = {Tanveer Khan and Masoom Alam and Adnan Akhunzada and Ali Hur and Muhammad Asif and Muhammad Khurram Khan}, title = {Towards augmented proactive cyberthreat intelligence}, journal = {J. Parallel Distributed Comput.}, volume = {124}, pages = {47--59}, year = {2019}, url = {https://doi.org/10.1016/j.jpdc.2018.10.006}, doi = {10.1016/J.JPDC.2018.10.006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/KhanAAHAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KaljahiPAIBK19, author = {Maryam Asadzadeh Kaljahi and Shivakumara Palaiahnakote and Mohammad Hossein Anisi and Mohd Yamani Idna Bin Idris and Michael Blumenstein and Muhammad Khurram Khan}, title = {A scene image classification technique for a ubiquitous visual surveillance system}, journal = {Multim. Tools Appl.}, volume = {78}, number = {5}, pages = {5791--5818}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6151-x}, doi = {10.1007/S11042-018-6151-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KaljahiPAIBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/MeshramLMK19, author = {Chandrashekhar Meshram and Cheng{-}Chi Lee and Sarita Gajbhiye Meshram and Muhammad Khurram Khan}, title = {An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment}, journal = {Soft Comput.}, volume = {23}, number = {24}, pages = {13127--13138}, year = {2019}, url = {https://doi.org/10.1007/s00500-019-03855-1}, doi = {10.1007/S00500-019-03855-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/MeshramLMK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/KhanAK19, author = {Wazir Zada Khan and Mohammed Y. Aalsalem and Muhammad Khurram Khan}, title = {Communal Acts of IoT Consumers: {A} Potential Threat to Security and Privacy}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {65}, number = {1}, pages = {64--72}, year = {2019}, url = {https://doi.org/10.1109/TCE.2018.2880338}, doi = {10.1109/TCE.2018.2880338}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tce/KhanAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/KhanDJKGA19, author = {Mudassar Ali Khan and Ikram Ud Din and Sultan Ullah Jadoon and Muhammad Khurram Khan and Mohsen Guizani and Kamran Ahmad Awan}, title = {g-RAT {\(\vert\)} {A} Novel Graphical Randomized Authentication Technique for Consumer Smart Devices}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {65}, number = {2}, pages = {215--223}, year = {2019}, url = {https://doi.org/10.1109/TCE.2019.2895715}, doi = {10.1109/TCE.2019.2895715}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/KhanDJKGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/Khan19, author = {Muhammad Khurram Khan}, title = {A new journey in the new year}, journal = {Telecommun. Syst.}, volume = {70}, number = {1}, pages = {1}, year = {2019}, url = {https://doi.org/10.1007/s11235-018-00545-5}, doi = {10.1007/S11235-018-00545-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/Khan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WenKCKMR19, author = {Zhenzao Wen and Linghe Kong and Guihai Chen and Muhammad Khurram Khan and Shahid Mumtaz and Joel J. P. C. Rodrigues}, title = {Understanding Multi-Path Routing Algorithms in Datacenter Networks}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9013819}, doi = {10.1109/GLOBECOM38437.2019.9013819}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WenKCKMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WuKCKMR19, author = {Zucheng Wu and Linghe Kong and Guihai Chen and Muhammad Khurram Khan and Shahid Mumtaz and Joel J. P. C. Rodrigues}, title = {CrowdSwitch: Crowdsensing Based Switch between Multiple Cellular Operators in Subways}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9013821}, doi = {10.1109/GLOBECOM38437.2019.9013821}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WuKCKMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhengWKZGG18, author = {Qiming Zheng and Xiaomin Wang and Muhammad Khurram Khan and Wenfang Zhang and Brij B. Gupta and Wei Guo}, title = {A Lightweight Authenticated Encryption Scheme Based on Chaotic {SCML} for Railway Cloud Service}, journal = {{IEEE} Access}, volume = {6}, pages = {711--722}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2017.2775038}, doi = {10.1109/ACCESS.2017.2775038}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhengWKZGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZeeshanMNADK18, author = {Muhammad Zeeshan and Muhammad Majid and Imran Fareed Nizami and Syed Muhammad Anwar and Ikram Ud Din and Muhammad Khurram Khan}, title = {A Newly Developed Ground Truth Dataset for Visual Saliency in Videos}, journal = {{IEEE} Access}, volume = {6}, pages = {20855--20867}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2826562}, doi = {10.1109/ACCESS.2018.2826562}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZeeshanMNADK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LinHHKC18, author = {Chao Lin and Debiao He and Xinyi Huang and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems}, journal = {{IEEE} Access}, volume = {6}, pages = {28203--28212}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2837650}, doi = {10.1109/ACCESS.2018.2837650}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LinHHKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AhmedISAJKRH18, author = {Ghufran Ahmed and Saif ul Islam and Maham Shahid and Adnan Akhunzada and Sohail Jabbar and Muhammad Khurram Khan and Muhammad Riaz and Kijun Han}, title = {Rigorous Analysis and Evaluation of Specific Absorption Rate {(SAR)} for Mobile Multimedia Healthcare}, journal = {{IEEE} Access}, volume = {6}, pages = {29602--29610}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2839909}, doi = {10.1109/ACCESS.2018.2839909}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AhmedISAJKRH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SiddiquiTK18, author = {Zeeshan Siddiqui and Omar Tayan and Muhammad Khurram Khan}, title = {Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols}, journal = {{IEEE} Access}, volume = {6}, pages = {34527--34542}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2845299}, doi = {10.1109/ACCESS.2018.2845299}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SiddiquiTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SyedGNNAK18, author = {Hassan Jamil Syed and Abdullah Gani and Fariza Hanum Nasaruddin and Anjum Naveed and Abdelmuttlib Ibrahim Abdallaahmed and Muhammad Khurram Khan}, title = {CloudProcMon: {A} Non-Intrusive Cloud Monitoring Framework}, journal = {{IEEE} Access}, volume = {6}, pages = {44591--44606}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2864573}, doi = {10.1109/ACCESS.2018.2864573}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SyedGNNAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/MaHKC18, author = {Mimi Ma and Debiao He and Muhammad Khurram Khan and Jianhua Chen}, title = {Certificateless searchable public key encryption scheme for mobile healthcare system}, journal = {Comput. Electr. Eng.}, volume = {65}, pages = {413--424}, year = {2018}, url = {https://doi.org/10.1016/j.compeleceng.2017.05.014}, doi = {10.1016/J.COMPELECENG.2017.05.014}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/MaHKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ChallaDOKKKV18, author = {Sravani Challa and Ashok Kumar Das and Vanga Odelu and Neeraj Kumar and Saru Kumari and Muhammad Khurram Khan and Athanasios V. Vasilakos}, title = {An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks}, journal = {Comput. Electr. Eng.}, volume = {69}, pages = {534--554}, year = {2018}, url = {https://doi.org/10.1016/j.compeleceng.2017.08.003}, doi = {10.1016/J.COMPELECENG.2017.08.003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/ChallaDOKKKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/ChallaWDK18, author = {Sravani Challa and Mohammad Wazid and Ashok Kumar Das and Muhammad Khurram Khan}, title = {Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {7}, number = {1}, pages = {57--65}, year = {2018}, url = {https://doi.org/10.1109/MCE.2017.2720193}, doi = {10.1109/MCE.2017.2720193}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/ChallaWDK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/DinHKGGH18, author = {Ikram Ud Din and Suhaidi Hassan and Muhammad Khurram Khan and Mohsen Guizani and Osman Ghazali and Adib Habbal}, title = {Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {20}, number = {2}, pages = {1443--1474}, year = {2018}, url = {https://doi.org/10.1109/COMST.2017.2787609}, doi = {10.1109/COMST.2017.2787609}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/DinHKGGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/ShujaGKSMMK18, author = {Junaid Shuja and Abdullah Gani and Kwangman Ko and Kyoungyoung So and Saad Mustafa and Sajjad Ahmad Madani and Muhammad Khurram Khan}, title = {{SIMDOM:} {A} framework for {SIMD} instruction translation and offloading in heterogeneous mobile architectures}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {29}, number = {4}, year = {2018}, url = {https://doi.org/10.1002/ett.3174}, doi = {10.1002/ETT.3174}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/ShujaGKSMMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AminIBKK18, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan and Neeraj Kumar}, title = {A robust and anonymous patient monitoring system using wireless medical sensor networks}, journal = {Future Gener. Comput. Syst.}, volume = {80}, pages = {483--495}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.05.032}, doi = {10.1016/J.FUTURE.2016.05.032}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AminIBKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/00020KX0018, author = {Xiong Li and Fan Wu and Muhammad Khurram Khan and Lili Xu and Jian Shen and Minho Jo}, title = {A secure chaotic map-based remote authentication scheme for telecare medicine information systems}, journal = {Future Gener. Comput. Syst.}, volume = {84}, pages = {149--159}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.08.029}, doi = {10.1016/J.FUTURE.2017.08.029}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/00020KX0018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/IslamDK18, author = {SK Hafizul Islam and Ashok Kumar Das and Muhammad Khurram Khan}, title = {A novel biometric-based password authentication scheme for client-server environment using {ECC} and fuzzy extractor}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {27}, number = {2}, pages = {138--155}, year = {2018}, url = {https://doi.org/10.1504/IJAHUC.2015.10001794}, doi = {10.1504/IJAHUC.2015.10001794}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/IslamDK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/AnwarMQAAK18, author = {Syed Muhammad Anwar and Muhammad Majid and Adnan Qayyum and Muhammad Awais and Majdi R. Alnowami and Muhammad Khurram Khan}, title = {Medical Image Analysis using Convolutional Neural Networks: {A} Review}, journal = {J. Medical Syst.}, volume = {42}, number = {11}, pages = {226}, year = {2018}, url = {https://doi.org/10.1007/s10916-018-1088-1}, doi = {10.1007/S10916-018-1088-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/AnwarMQAAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/EmmanuelKAKK18, author = {Naina Emmanuel and Abid Khan and Masoom Alam and Tanveer Khan and Muhammad Khurram Khan}, title = {Structures and data preserving homomorphic signatures}, journal = {J. Netw. Comput. Appl.}, volume = {102}, pages = {58--70}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2017.11.005}, doi = {10.1016/J.JNCA.2017.11.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/EmmanuelKAKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SaleemKSAK18, author = {Ahsan Saleem and Abid Khan and Furqan Shahid and Masoom Alam and Muhammad Khurram Khan}, title = {Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits}, journal = {J. Netw. Comput. Appl.}, volume = {108}, pages = {1--19}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.02.006}, doi = {10.1016/J.JNCA.2018.02.006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SaleemKSAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AalsalemKGKA18, author = {Mohammed Y. Aalsalem and Wazir Zada Khan and Wajeb Gharibi and Muhammad Khurram Khan and Quratul{-}Ain Arshad}, title = {Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges}, journal = {J. Netw. Comput. Appl.}, volume = {113}, pages = {87--97}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.04.004}, doi = {10.1016/J.JNCA.2018.04.004}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AalsalemKGKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/GoudarziHAKS18, author = {Shidrokh Goudarzi and Wan Haslina Hassan and Mohammad Hossein Anisi and Muhammad Khurram Khan and Seyed Ahmad Soleymani}, title = {Intelligent Technique for Seamless Vertical Handover in Vehicular Networks}, journal = {Mob. Networks Appl.}, volume = {23}, number = {6}, pages = {1462--1477}, year = {2018}, url = {https://doi.org/10.1007/s11036-017-0979-6}, doi = {10.1007/S11036-017-0979-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/GoudarziHAKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZakariahKM18, author = {Mohammed Zakariah and Muhammad Khurram Khan and Hafiz Malik}, title = {Digital multimedia audio forensics: past, present and future}, journal = {Multim. Tools Appl.}, volume = {77}, number = {1}, pages = {1009--1040}, year = {2018}, url = {https://doi.org/10.1007/s11042-016-4277-2}, doi = {10.1007/S11042-016-4277-2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/ZakariahKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KumariDLWKJI18, author = {Saru Kumari and Ashok Kumar Das and Xiong Li and Fan Wu and Muhammad Khurram Khan and Qi Jiang and SK Hafizul Islam}, title = {A provably secure biometrics-based authenticated key agreement scheme for multi-server environments}, journal = {Multim. Tools Appl.}, volume = {77}, number = {2}, pages = {2359--2389}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4390-x}, doi = {10.1007/S11042-017-4390-X}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KumariDLWKJI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChaudhryNK18, author = {Shehzad Ashraf Chaudhry and Husnain Naqvi and Muhammad Khurram Khan}, title = {An enhanced lightweight anonymous biometric based authentication scheme for {TMIS}}, journal = {Multim. Tools Appl.}, volume = {77}, number = {5}, pages = {5503--5524}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4464-9}, doi = {10.1007/S11042-017-4464-9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChaudhryNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AminIVK018, author = {Ruhul Amin and SK Hafizul Islam and Pandi Vijayakumar and Muhammad Khurram Khan and Victor Chang}, title = {A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication}, journal = {Multim. Tools Appl.}, volume = {77}, number = {9}, pages = {11041--11066}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4996-z}, doi = {10.1007/S11042-017-4996-Z}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/AminIVK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/LiZLKKKNZ18, author = {Shichao Li and Ning Zhang and Siyu Lin and Linghe Kong and Ajay K. Katangur and Muhammad Khurram Khan and Minming Ni and Gang Zhu}, title = {Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things}, journal = {{IEEE} Netw.}, volume = {32}, number = {1}, pages = {72--79}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700163}, doi = {10.1109/MNET.2018.1700163}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/LiZLKKKNZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/He0KW018, author = {Debiao He and Neeraj Kumar and Muhammad Khurram Khan and Lina Wang and Jian Shen}, title = {Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services}, journal = {{IEEE} Syst. J.}, volume = {12}, number = {2}, pages = {1621--1631}, year = {2018}, url = {https://doi.org/10.1109/JSYST.2016.2633809}, doi = {10.1109/JSYST.2016.2633809}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/He0KW018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/DasWKKCP18, author = {Ashok Kumar Das and Mohammad Wazid and Neeraj Kumar and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo and YoungHo Park}, title = {Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {22}, number = {4}, pages = {1310--1322}, year = {2018}, url = {https://doi.org/10.1109/JBHI.2017.2753464}, doi = {10.1109/JBHI.2017.2753464}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/titb/DasWKKCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KhanCSKK18, author = {Imran Khan and Shehzad Ashraf Chaudhry and Muhammad Sher and Muhammad Khurram Khan}, title = {An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data}, journal = {J. Supercomput.}, volume = {74}, number = {8}, pages = {3685--3703}, year = {2018}, url = {https://doi.org/10.1007/s11227-016-1886-5}, doi = {10.1007/S11227-016-1886-5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KhanCSKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/LiCZKRKH18, author = {JiLiang Li and Kim{-}Kwang Raymond Choo and WeiGuo Zhang and Saru Kumari and Joel J. P. C. Rodrigues and Muhammad Khurram Khan and Dieter Hogrefe}, title = {{EPA-CPPA:} An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks}, journal = {Veh. Commun.}, volume = {13}, pages = {104--113}, year = {2018}, url = {https://doi.org/10.1016/j.vehcom.2018.07.001}, doi = {10.1016/J.VEHCOM.2018.07.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/LiCZKRKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccel/KhanAK18, author = {Wazir Zada Khan and Mohammed Y. Aalsalem and Muhammad Khurram Khan}, title = {Five acts of consumer behavior: {A} potential security and privacy threat to Internet of Things}, booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2018, Las Vegas, NV, USA, January 12-14, 2018}, pages = {1--3}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCE.2018.8326124}, doi = {10.1109/ICCE.2018.8326124}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccel/KhanAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/OdeluDKCJ17, author = {Vanga Odelu and Ashok Kumar Das and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo and Minho Jo}, title = {Expressive {CP-ABE} Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts}, journal = {{IEEE} Access}, volume = {5}, pages = {3273--3283}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2669940}, doi = {10.1109/ACCESS.2017.2669940}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/OdeluDKCJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SoleymaniAZAVKG17, author = {Seyed Ahmad Soleymani and Abdul Hanan Abdullah and Mahdi Zareei and Mohammad Hossein Anisi and C{\'{e}}sar Vargas Rosales and Muhammad Khurram Khan and Shidrokh Goudarzi}, title = {A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing}, journal = {{IEEE} Access}, volume = {5}, pages = {15619--15629}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2733225}, doi = {10.1109/ACCESS.2017.2733225}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SoleymaniAZAVKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShujaMAMGK17, author = {Junaid Shuja and Saad Mustafa and Raja Wasim Ahmad and Sajjad Ahmad Madani and Abdullah Gani and Muhammad Khurram Khan}, title = {Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures}, journal = {{IEEE} Access}, volume = {5}, pages = {24542--24554}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2713818}, doi = {10.1109/ACCESS.2017.2713818}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShujaMAMGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZahraAJWJMK17, author = {Samman Zahra and Masoom Alam and Qaisar Javaid and Abdul Wahid and Nadeem Javaid and Saif Ur Rehman Malik and Muhammad Khurram Khan}, title = {Fog Computing Over IoT: {A} Secure Deployment and Formal Verification}, journal = {{IEEE} Access}, volume = {5}, pages = {27132--27144}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2766180}, doi = {10.1109/ACCESS.2017.2766180}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZahraAJWJMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/WuXKLKD17, author = {Fan Wu and Lili Xu and Saru Kumari and Xiong Li and Muhammad Khurram Khan and Ashok Kumar Das}, title = {An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {72}, number = {3-4}, pages = {131--144}, year = {2017}, url = {https://doi.org/10.1007/s12243-016-0547-2}, doi = {10.1007/S12243-016-0547-2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/WuXKLKD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/TahirKHAKJ17, author = {Mouzna Tahir and Abid Khan and Abdul Hameed and Masoom Alam and Muhammad Khurram Khan and Farhana Jabeen}, title = {Towards a set aggregation-based data integrity scheme for smart grids}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {72}, number = {9-10}, pages = {551--561}, year = {2017}, url = {https://doi.org/10.1007/s12243-017-0602-7}, doi = {10.1007/S12243-017-0602-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/TahirKHAKJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/KhanAKA17, author = {Wazir Zada Khan and Mohammed Y. Aalsalem and Muhammad Khurram Khan and Quratul{-}Ain Arshad}, title = {When social objects collaborate: Concepts, processing elements, attacks and challenges}, journal = {Comput. Electr. Eng.}, volume = {58}, pages = {397--411}, year = {2017}, url = {https://doi.org/10.1016/j.compeleceng.2016.11.014}, doi = {10.1016/J.COMPELECENG.2016.11.014}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/KhanAKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/AbiodunAAAK17, author = {Akande Sheriff Abiodun and Mohammad Hossein Anisi and Ihsan Ali and Adnan Akhunzada and Muhammad Khurram Khan}, title = {Reducing Power Consumption in Wireless Body Area Networks: {A} Novel Data Segregation and Classification Technique}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {6}, number = {4}, pages = {38--47}, year = {2017}, url = {https://doi.org/10.1109/MCE.2017.2715518}, doi = {10.1109/MCE.2017.2715518}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/AbiodunAAAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AbdelazizFGKAK17, author = {Ahmed Abdelaziz and Tan Fong Ang and Abdullah Gani and Suleman Khan and Faiz Alotaibi and Muhammad Khurram Khan}, title = {On Software-Defined Wireless Network {(SDWN)} Network Virtualization: Challenges and Open Issues}, journal = {Comput. J.}, volume = {60}, number = {10}, pages = {1510--1519}, year = {2017}, url = {https://doi.org/10.1093/comjnl/bxx063}, doi = {10.1093/COMJNL/BXX063}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AbdelazizFGKAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/NazirAMACKZKK17, author = {Anam Nazir and Masoom Alam and Saif Ur Rehman Malik and Adnan Akhunzada and Muhammad Nadeem Cheema and Muhammad Khurram Khan and Yang Ziang and Tanveer Khan and Abid Khan}, title = {A high-level domain-specific language for {SIEM} (design, development and formal verification)}, journal = {Clust. Comput.}, volume = {20}, number = {3}, pages = {2423--2437}, year = {2017}, url = {https://doi.org/10.1007/s10586-017-0819-2}, doi = {10.1007/S10586-017-0819-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/NazirAMACKZKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/KongKWCZ17, author = {Linghe Kong and Muhammad Khurram Khan and Fan Wu and Guihai Chen and Peng Zeng}, title = {Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {1}, pages = {62--68}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.1600422CM}, doi = {10.1109/MCOM.2017.1600422CM}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/KongKWCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/KongRKLRDN17, author = {Linghe Kong and Kui Ren and Muhammad Khurram Khan and Qi Li and Ammar Rayes and M{\'{e}}rouane Debbah and Yuichi Nakamura}, title = {Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {3}, pages = {60--61}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.7876958}, doi = {10.1109/MCOM.2017.7876958}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/KongRKLRDN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/KongRKLRDN17a, author = {Linghe Kong and Kui Ren and Muhammad Khurram Khan and Qi Li and Ammar Rayes and M{\'{e}}rouane Debbah and Yuichi Nakamura}, title = {Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {6}, pages = {118--119}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.7946931}, doi = {10.1109/MCOM.2017.7946931}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/KongRKLRDN17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AkhunzadaK17, author = {Adnan Akhunzada and Muhammad Khurram Khan}, title = {Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {7}, pages = {110--118}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.1601158}, doi = {10.1109/MCOM.2017.1601158}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AkhunzadaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KhanGWGK17, author = {Suleman Khan and Abdullah Gani and Ainuddin Wahid Abdul Wahab and Mohsen Guizani and Muhammad Khurram Khan}, title = {Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {19}, number = {1}, pages = {303--324}, year = {2017}, url = {https://doi.org/10.1109/COMST.2016.2597193}, doi = {10.1109/COMST.2016.2597193}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KhanGWGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/KumariDWL0CK17, author = {Saru Kumari and Ashok Kumar Das and Mohammad Wazid and Xiong Li and Fan Wu and Kim{-}Kwang Raymond Choo and Muhammad Khurram Khan}, title = {On the design of a secure user authentication and key agreement scheme for wireless sensor networks}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {23}, year = {2017}, url = {https://doi.org/10.1002/cpe.3930}, doi = {10.1002/CPE.3930}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/KumariDWL0CK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/OdeluDRKKC17, author = {Vanga Odelu and Ashok Kumar Das and Y. Sreenivasa Rao and Saru Kumari and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {Pairing-based {CP-ABE} with constant-size ciphertexts and secret keys for cloud environment}, journal = {Comput. Stand. Interfaces}, volume = {54}, pages = {3--9}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2016.05.002}, doi = {10.1016/J.CSI.2016.05.002}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/OdeluDRKKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/SookhakYKXB17, author = {Mehdi Sookhak and F. Richard Yu and Muhammad Khurram Khan and Yang Xiang and Rajkumar Buyya}, title = {Attribute-based data access control in mobile cloud computing: Taxonomy and open issues}, journal = {Future Gener. Comput. Syst.}, volume = {72}, pages = {273--287}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.08.018}, doi = {10.1016/J.FUTURE.2016.08.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/SookhakYKXB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/IslamFBKO17, author = {SK Hafizul Islam and Mohammad Sabzinejad Farash and G. P. Biswas and Muhammad Khurram Khan and Mohammad S. Obaidat}, title = {A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography}, journal = {Int. J. Comput. Math.}, volume = {94}, number = {1}, pages = {39--55}, year = {2017}, url = {https://doi.org/10.1080/00207160.2015.1088148}, doi = {10.1080/00207160.2015.1088148}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/IslamFBKO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/MishraKKM17, author = {Dheerendra Mishra and Saru Kumari and Muhammad Khurram Khan and Sourav Mukhopadhyay}, title = {An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems}, journal = {Int. J. Commun. Syst.}, volume = {30}, number = {1}, year = {2017}, url = {https://doi.org/10.1002/dac.2946}, doi = {10.1002/DAC.2946}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/MishraKKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/FarashCHSKK17, author = {Mohammad Sabzinejad Farash and Shehzad Ashraf Chaudhry and Mohammad Heydari and Seyed Mohammad Sajad Sadough and Saru Kumari and Muhammad Khurram Khan}, title = {A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security}, journal = {Int. J. Commun. Syst.}, volume = {30}, number = {4}, year = {2017}, url = {https://doi.org/10.1002/dac.3019}, doi = {10.1002/DAC.3019}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcomsys/FarashCHSKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/LuoZKH17, author = {Min Luo and Yunru Zhang and Muhammad Khurram Khan and Debiao He}, title = {An efficient chaos-based 2-party key agreement protocol with provable security}, journal = {Int. J. Commun. Syst.}, volume = {30}, number = {14}, year = {2017}, url = {https://doi.org/10.1002/dac.3288}, doi = {10.1002/DAC.3288}, timestamp = {Thu, 10 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcomsys/LuoZKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/LuoZKH17a, author = {Min Luo and Yunru Zhang and Muhammad Khurram Khan and Debiao He}, title = {A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography}, journal = {Int. J. Commun. Syst.}, volume = {30}, number = {16}, year = {2017}, url = {https://doi.org/10.1002/dac.3333}, doi = {10.1002/DAC.3333}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/LuoZKH17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/GoudarziHASSKHZ17, author = {Shidrokh Goudarzi and Wan Haslina Hassan and Mohammad Hossein Anisi and Seyed Ahmad Soleymani and Mehdi Sookhak and Muhammad Khurram Khan and Aisha{-}Hassan A. Hashim and Mahdi Zareei}, title = {{ABC-PSO} for vertical handover in heterogeneous wireless networks}, journal = {Neurocomputing}, volume = {256}, pages = {63--81}, year = {2017}, url = {https://doi.org/10.1016/j.neucom.2016.08.136}, doi = {10.1016/J.NEUCOM.2016.08.136}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/GoudarziHASSKHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WazidDKAKV17, author = {Mohammad Wazid and Ashok Kumar Das and Muhammad Khurram Khan and Abdulatif Al{-}Dhawailie Al{-}Ghaiheb and Neeraj Kumar and Athanasios V. Vasilakos}, title = {Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment}, journal = {{IEEE} Internet Things J.}, volume = {4}, number = {5}, pages = {1634--1646}, year = {2017}, url = {https://doi.org/10.1109/JIOT.2017.2706752}, doi = {10.1109/JIOT.2017.2706752}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WazidDKAKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/MohitAKBK17, author = {Prerna Mohit and Ruhul Amin and Arijit Karati and G. P. Biswas and Muhammad Khurram Khan}, title = {A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System}, journal = {J. Medical Syst.}, volume = {41}, number = {4}, pages = {50:1--50:13}, year = {2017}, url = {https://doi.org/10.1007/s10916-017-0699-2}, doi = {10.1007/S10916-017-0699-2}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/MohitAKBK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/RehmanLWK17, author = {Muhammad Habib Ur Rehman and Chee Sun Liew and Teh Ying Wah and Muhammad Khurram Khan}, title = {Towards next-generation heterogeneous mobile data stream mining applications: Opportunities, challenges, and future research directions}, journal = {J. Netw. Comput. Appl.}, volume = {79}, pages = {1--24}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.11.031}, doi = {10.1016/J.JNCA.2016.11.031}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/RehmanLWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AnwarIZZGAKC17, author = {Shahid Anwar and Zakira Inayat and Mohamed Fadli Bin Zolkipli and Jasni Mohamad Zain and Abdullah Gani and Nor Badrul Anuar and Muhammad Khurram Khan and Victor Chang}, title = {Cross-VM cache-based side channel attacks and proposed prevention mechanisms: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {93}, pages = {259--279}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2017.06.001}, doi = {10.1016/J.JNCA.2017.06.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AnwarIZZGAKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KhanSBGK17, author = {Suleman Khan and Muhammad Shiraz and Laleh Boroumand and Abdullah Gani and Muhammad Khurram Khan}, title = {Towards port-knocking authentication methods for mobile cloud computing}, journal = {J. Netw. Comput. Appl.}, volume = {97}, pages = {66--78}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2017.08.018}, doi = {10.1016/J.JNCA.2017.08.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KhanSBGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SyedGAKA17, author = {Hassan Jamil Syed and Abdullah Gani and Raja Wasim Ahmad and Muhammad Khurram Khan and Abdelmuttlib Ibrahim Abdallaahmed}, title = {Cloud monitoring: {A} review, taxonomy, and open research issues}, journal = {J. Netw. Comput. Appl.}, volume = {98}, pages = {11--26}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2017.08.021}, doi = {10.1016/J.JNCA.2017.08.021}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SyedGAKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AslamIKAAK17, author = {Sidra Aslam and Saif ul Islam and Abid Khan and Mansoor Ahmed and Adnan Akhunzada and Muhammad Khurram Khan}, title = {Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges}, journal = {J. Netw. Comput. Appl.}, volume = {100}, pages = {80--94}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2017.10.021}, doi = {10.1016/J.JNCA.2017.10.021}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AslamIKAAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/WuWHK17, author = {Libing Wu and Jing Wang and Debiao He and Muhammad Khurram Khan}, title = {Cryptanalysis of an identity-based public auditing protocol for cloud storage}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {18}, number = {12}, pages = {1972--1977}, year = {2017}, url = {https://doi.org/10.1631/FITEE.1601530}, doi = {10.1631/FITEE.1601530}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/WuWHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/YousafzaiGNSTSK17, author = {Abdullah Yousafzai and Abdullah Gani and Rafidah Md Noor and Mehdi Sookhak and Hamid Talebian and Muhammad Shiraz and Muhammad Khurram Khan}, title = {Cloud resource allocation schemes: review, taxonomy, and opportunities}, journal = {Knowl. Inf. Syst.}, volume = {50}, number = {2}, pages = {347--381}, year = {2017}, url = {https://doi.org/10.1007/s10115-016-0951-y}, doi = {10.1007/S10115-016-0951-Y}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/YousafzaiGNSTSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AlamMJKKAJAK17, author = {Masoom Alam and Saif Ur Rehman Malik and Qaisar Javed and Abid Khan and Shamaila Bisma Khan and Adeel Anjum and Nadeem Javed and Adnan Akhunzada and Muhammad Khurram Khan}, title = {Formal modeling and verification of security controls for multimedia systems in the cloud}, journal = {Multim. Tools Appl.}, volume = {76}, number = {21}, pages = {22845--22870}, year = {2017}, url = {https://doi.org/10.1007/s11042-017-4853-0}, doi = {10.1007/S11042-017-4853-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/AlamMJKKAJAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/KumariCWLFK17, author = {Saru Kumari and Shehzad Ashraf Chaudhry and Fan Wu and Xiong Li and Mohammad Sabzinejad Farash and Muhammad Khurram Khan}, title = {An improved smart card based authentication scheme for session initiation protocol}, journal = {Peer-to-Peer Netw. Appl.}, volume = {10}, number = {1}, pages = {92--105}, year = {2017}, url = {https://doi.org/10.1007/s12083-015-0409-0}, doi = {10.1007/S12083-015-0409-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/KumariCWLFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/LiSKWSK17, author = {Xiong Li and Arun Kumar Sangaiah and Saru Kumari and Fan Wu and Jian Shen and Muhammad Khurram Khan}, title = {An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city}, journal = {Pers. Ubiquitous Comput.}, volume = {21}, number = {5}, pages = {791--805}, year = {2017}, url = {https://doi.org/10.1007/s00779-017-1054-9}, doi = {10.1007/S00779-017-1054-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/LiSKWSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AminIKKGK17, author = {Ruhul Amin and SK Hafizul Islam and Muhammad Khurram Khan and Arijit Karati and Debasis Giri and Saru Kumari}, title = {A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {5989151:1--5989151:15}, year = {2017}, url = {https://doi.org/10.1155/2017/5989151}, doi = {10.1155/2017/5989151}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/AminIKKGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/AminSGIK17, author = {Ruhul Amin and R. Simon Sherratt and Debasis Giri and SK Hafizul Islam and Muhammad Khurram Khan}, title = {A software agent enabled biometric security algorithm for secure file access in consumer storage devices}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {63}, number = {1}, pages = {53--61}, year = {2017}, url = {https://doi.org/10.1109/TCE.2017.014735}, doi = {10.1109/TCE.2017.014735}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tce/AminSGIK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0001HHKSZ17, author = {Zhe Liu and Xinyi Huang and Zhi Hu and Muhammad Khurram Khan and Hwajeong Seo and Lu Zhou}, title = {On Emerging Family of Elliptic Curves to Secure Internet of Things: {ECC} Comes of Age}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {237--248}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2577022}, doi = {10.1109/TDSC.2016.2577022}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0001HHKSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/XuWHK17, author = {Zhiyan Xu and Libing Wu and Debiao He and Muhammad Khurram Khan}, title = {Security analysis of a publicly verifiable data possession scheme for remote storage}, journal = {J. Supercomput.}, volume = {73}, number = {11}, pages = {4923--4930}, year = {2017}, url = {https://doi.org/10.1007/s11227-017-2061-3}, doi = {10.1007/S11227-017-2061-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/XuWHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/XuWKCH17, author = {Zhiyan Xu and Libing Wu and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo and Debiao He}, title = {A secure and efficient public auditing scheme using {RSA} algorithm for cloud storage}, journal = {J. Supercomput.}, volume = {73}, number = {12}, pages = {5285--5309}, year = {2017}, url = {https://doi.org/10.1007/s11227-017-2085-8}, doi = {10.1007/S11227-017-2085-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/XuWKCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/TzengHLWHK17, author = {Shiang{-}Feng Tzeng and Shi{-}Jinn Horng and Tianrui Li and Xian Wang and Po{-}Hsian Huang and Muhammad Khurram Khan}, title = {Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {66}, number = {4}, pages = {3235--3248}, year = {2017}, url = {https://doi.org/10.1109/TVT.2015.2406877}, doi = {10.1109/TVT.2015.2406877}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/TzengHLWHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vtm/SookhakYHTSZKK17, author = {Mehdi Sookhak and F. Richard Yu and Ying He and Hamid Talebian and Nader Sohrabi Safa and Nan Zhao and Muhammad Khurram Khan and Neeraj Kumar}, title = {Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing}, journal = {{IEEE} Veh. Technol. Mag.}, volume = {12}, number = {3}, pages = {55--64}, year = {2017}, url = {https://doi.org/10.1109/MVT.2017.2667499}, doi = {10.1109/MVT.2017.2667499}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vtm/SookhakYHTSZKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/LinKGKZJZ17, author = {Siyu Lin and Linghe Kong and Qian Gao and Muhammad Khurram Khan and Zhangdui Zhong and Xi Jin and Peng Zeng}, title = {Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G Systems}, journal = {{IEEE} Wirel. Commun.}, volume = {24}, number = {5}, pages = {74--80}, year = {2017}, url = {https://doi.org/10.1109/MWC.2017.1700091}, doi = {10.1109/MWC.2017.1700091}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/LinKGKZJZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/KaruppiahKLWDKS17, author = {Marimuthu Karuppiah and Saru Kumari and Xiong Li and Fan Wu and Ashok Kumar Das and Muhammad Khurram Khan and R. Saravanan and Sayantani Basu}, title = {A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks}, journal = {Wirel. Pers. Commun.}, volume = {93}, number = {2}, pages = {383--407}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3672-3}, doi = {10.1007/S11277-016-3672-3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/KaruppiahKLWDKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ShenSKL17, author = {Han Shen and Jian Shen and Muhammad Khurram Khan and Jong{-}Hyouk Lee}, title = {Efficient {RFID} Authentication Using Elliptic Curve Cryptography for the Internet of Things}, journal = {Wirel. Pers. Commun.}, volume = {96}, number = {4}, pages = {5253--5266}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3739-1}, doi = {10.1007/S11277-016-3739-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ShenSKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ChaudhryNMAK17, author = {Shehzad Ashraf Chaudhry and Husnain Naqvi and Khalid Mahmood and Hafiz Farooq Ahmad and Muhammad Khurram Khan}, title = {An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography}, journal = {Wirel. Pers. Commun.}, volume = {96}, number = {4}, pages = {5355--5373}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3745-3}, doi = {10.1007/S11277-016-3745-3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ChaudhryNMAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccel/KhanST17, author = {Muhammad Khurram Khan and Zeeshan Siddiqui and Omar Tayan}, title = {A secure framework for digital Quran certification}, booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2017, Las Vegas, NV, USA, January 8-10, 2017}, pages = {59--60}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICCE.2017.7889229}, doi = {10.1109/ICCE.2017.7889229}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccel/KhanST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icin/AlizadehTSBAZZC17, author = {Mojtaba Alizadeh and Mohammad Hesam Tadayon and Kouichi Sakurai and Sabariah Baharun and Hiroaki Anada and Mazdak Zamani and Akram M. Zeki and Shehzad Ashraf Chaudhry and Muhammad Khurram Khan}, editor = {No{\"{e}}l Crespi and Antonio Manzalini and Stefano Secci}, title = {Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management"}, booktitle = {20th Conference on Innovations in Clouds, Internet and Networks, {ICIN} 2017, Paris, France, March 7-9, 2017}, pages = {112--116}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICIN.2017.7899399}, doi = {10.1109/ICIN.2017.7899399}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icin/AlizadehTSBAZZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZareeiMARTK16, author = {Mahdi Zareei and Ehab Mahmoud Mohamed and Mohammad Hossein Anisi and C{\'{e}}sar Vargas Rosales and Kazuya Tsukamoto and Muhammad Khurram Khan}, title = {On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc Network}, journal = {{IEEE} Access}, volume = {4}, pages = {8294--8302}, year = {2016}, url = {https://doi.org/10.1109/ACCESS.2016.2626721}, doi = {10.1109/ACCESS.2016.2626721}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZareeiMARTK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanGWIAMASAKKK16, author = {Suleman Khan and Abdullah Gani and Ainuddin Wahid Abdul Wahab and Salman Iqbal and Ahmed Abdelaziz and Omar Adil Mahdi and Abdelmuttlib Ibrahim Abdallaahmed and Muhammad Shiraz and Yusor Rafid Bahar Al{-}Mayouf and Ziar Khan and Kwangman Ko and Muhammad Khurram Khan and Victor Chang}, title = {Towards an Applicability of Current Network Forensics for Cloud Networks: {A} {SWOT} Analysis}, journal = {{IEEE} Access}, volume = {4}, pages = {9800--9820}, year = {2016}, url = {https://doi.org/10.1109/ACCESS.2016.2631543}, doi = {10.1109/ACCESS.2016.2631543}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanGWIAMASAKKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AminIBKLK16, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan and Lu Leng and Neeraj Kumar}, title = {Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks}, journal = {Comput. Networks}, volume = {101}, pages = {42--62}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.01.006}, doi = {10.1016/J.COMNET.2016.01.006}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AminIBKLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/KumariLWDAK16, author = {Saru Kumari and Xiong Li and Fan Wu and Ashok Kumar Das and Hamed Arshad and Muhammad Khurram Khan}, title = {A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps}, journal = {Future Gener. Comput. Syst.}, volume = {63}, pages = {56--75}, year = {2016}, url = {https://doi.org/10.1016/j.future.2016.04.016}, doi = {10.1016/J.FUTURE.2016.04.016}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/KumariLWDAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/HeWKW16, author = {Debiao He and Huaqun Wang and Muhammad Khurram Khan and Lina Wang}, title = {Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography}, journal = {{IET} Commun.}, volume = {10}, number = {14}, pages = {1795--1802}, year = {2016}, url = {https://doi.org/10.1049/iet-com.2016.0091}, doi = {10.1049/IET-COM.2016.0091}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/HeWKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/KumariKLW16, author = {Saru Kumari and Muhammad Khurram Khan and Xiong Li and Fan Wu}, title = {Design of a user anonymous password authentication scheme without smart card}, journal = {Int. J. Commun. Syst.}, volume = {29}, number = {3}, pages = {441--458}, year = {2016}, url = {https://doi.org/10.1002/dac.2853}, doi = {10.1002/DAC.2853}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/KumariKLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/IslamK16, author = {SK Hafizul Islam and Muhammad Khurram Khan}, title = {Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks}, journal = {Int. J. Commun. Syst.}, volume = {29}, number = {17}, pages = {2442--2456}, year = {2016}, url = {https://doi.org/10.1002/dac.2847}, doi = {10.1002/DAC.2847}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/IslamK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KumariL0DOK16, author = {Saru Kumari and Xiong Li and Fan Wu and Ashok Kumar Das and Vanga Odelu and Muhammad Khurram Khan}, title = {A User Anonymous Mutual Authentication Protocol}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {10}, number = {9}, pages = {4508--4528}, year = {2016}, url = {https://doi.org/10.3837/tiis.2016.09.026}, doi = {10.3837/TIIS.2016.09.026}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/KumariL0DOK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/FarashNMCK16, author = {Mohammad Sabzinejad Farash and Omer Nawaz and Khalid Mahmood and Shehzad Ashraf Chaudhry and Muhammad Khurram Khan}, title = {A Provably Secure {RFID} Authentication Protocol Based on Elliptic Curve for Healthcare Environments}, journal = {J. Medical Syst.}, volume = {40}, number = {7}, pages = {165:1--165:7}, year = {2016}, url = {https://doi.org/10.1007/s10916-016-0521-6}, doi = {10.1007/S10916-016-0521-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/FarashNMCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/ChaudhryKKS16, author = {Shehzad Ashraf Chaudhry and Muhammad Tawab Khan and Muhammad Khurram Khan and Taeshik Shon}, title = {A Multiserver Biometric Authentication Scheme for {TMIS} using Elliptic Curve Cryptography}, journal = {J. Medical Syst.}, volume = {40}, number = {11}, pages = {230:1--230:13}, year = {2016}, url = {https://doi.org/10.1007/s10916-016-0592-4}, doi = {10.1007/S10916-016-0592-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/ChaudhryKKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AkhunzadaGAAKHK16, author = {Adnan Akhunzada and Abdullah Gani and Nor Badrul Anuar and Ahmed Abdelaziz and Muhammad Khurram Khan and Amir Hayat and Samee U. Khan}, title = {Secure and dependable software defined networks}, journal = {J. Netw. Comput. Appl.}, volume = {61}, pages = {199--221}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2015.11.012}, doi = {10.1016/J.JNCA.2015.11.012}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AkhunzadaGAAKHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/InayatGAKA16, author = {Zakira Inayat and Abdullah Gani and Nor Badrul Anuar and Muhammad Khurram Khan and Shahid Anwar}, title = {Intrusion response systems: Foundations, design, and challenges}, journal = {J. Netw. Comput. Appl.}, volume = {62}, pages = {53--74}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2015.12.006}, doi = {10.1016/J.JNCA.2015.12.006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/InayatGAKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/IqbalKDHKKC16, author = {Salman Iqbal and Miss Laiha Mat Kiah and Babak Dhaghighi and Muzammil Hussain and Suleman Khan and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {On cloud security attacks: {A} taxonomy and intrusion detection and prevention as a service}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {98--120}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.016}, doi = {10.1016/J.JNCA.2016.08.016}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/IqbalKDHKKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ShujaGRAMKK16, author = {Junaid Shuja and Abdullah Gani and Muhammad Habib Ur Rehman and Ejaz Ahmed and Sajjad Ahmad Madani and Muhammad Khurram Khan and Kwangman Ko}, title = {Towards native code offloading based {MCC} frameworks for multimedia applications: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {75}, pages = {335--354}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.021}, doi = {10.1016/J.JNCA.2016.08.021}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ShujaGRAMKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/KarimSKSC16, author = {Ahmad Karim and Rosli Salleh and Muhammad Khurram Khan and Aisha Siddiqa and Kim{-}Kwang Raymond Choo}, title = {On the Analysis and Detection of Mobile Botnet Applications}, journal = {J. Univers. Comput. Sci.}, volume = {22}, number = {4}, pages = {567--588}, year = {2016}, url = {http://www.jucs.org/jucs\_22\_4/on\_the\_analysis\_and}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/KarimSKSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/WanKQZ16, author = {Jiafu Wan and Muhammad Khurram Khan and Meikang Qiu and Daqiang Zhang}, title = {Cloud-assisted Industrial Systems and Applications}, journal = {Mob. Networks Appl.}, volume = {21}, number = {5}, pages = {822--824}, year = {2016}, url = {https://doi.org/10.1007/s11036-016-0744-2}, doi = {10.1007/S11036-016-0744-2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/WanKQZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KumariKL16, author = {Saru Kumari and Muhammad Khurram Khan and Xiong Li}, title = {A more secure digital rights management authentication scheme based on smart card}, journal = {Multim. Tools Appl.}, volume = {75}, number = {2}, pages = {1135--1158}, year = {2016}, url = {https://doi.org/10.1007/s11042-014-2361-z}, doi = {10.1007/S11042-014-2361-Z}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KumariKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KumariWLFJKD16, author = {Saru Kumari and Fan Wu and Xiong Li and Mohammad Sabzinejad Farash and Qi Jiang and Muhammad Khurram Khan and Ashok Kumar Das}, title = {Single round-trip {SIP} authentication scheme with provable security for Voice over Internet Protocol using smart card}, journal = {Multim. Tools Appl.}, volume = {75}, number = {24}, pages = {17215--17245}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2988-4}, doi = {10.1007/S11042-015-2988-4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KumariWLFJKD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/KhanGWAKKG16, author = {Suleman Khan and Abdullah Gani and Ainuddin Wahid Abdul Wahab and Ahmed Abdelaziz and Kwangman Ko and Muhammad Khurram Khan and Mohsen Guizani}, title = {Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges}, journal = {{IEEE} Netw.}, volume = {30}, number = {6}, pages = {6--13}, year = {2016}, url = {https://doi.org/10.1109/MNET.2016.1600051NM}, doi = {10.1109/MNET.2016.1600051NM}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/KhanGWAKKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/SiddiquiAKA16, author = {Zeeshan Siddiqui and Abdul Hanan Abdullah and Muhammad Khurram Khan and Abdullah Sharaf Alghamdi}, title = {Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification}, journal = {Peer-to-Peer Netw. Appl.}, volume = {9}, number = {5}, pages = {841--853}, year = {2016}, url = {https://doi.org/10.1007/s12083-015-0364-9}, doi = {10.1007/S12083-015-0364-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/SiddiquiAKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiNKLZ16, author = {Xiong Li and Jianwei Niu and Muhammad Khurram Khan and Junguo Liao and Xiaoke Zhao}, title = {Robust three-factor remote user authentication scheme with key agreement for multimedia systems}, journal = {Secur. Commun. Networks}, volume = {9}, number = {13}, pages = {1916--1927}, year = {2016}, url = {https://doi.org/10.1002/sec.961}, doi = {10.1002/SEC.961}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiNKLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiNKLLK16, author = {Xiong Li and Jianwei Niu and Saru Kumari and Junguo Liao and Wei Liang and Muhammad Khurram Khan}, title = {A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity}, journal = {Secur. Commun. Networks}, volume = {9}, number = {15}, pages = {2643--2655}, year = {2016}, url = {https://doi.org/10.1002/sec.1214}, doi = {10.1002/SEC.1214}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiNKLLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/IslamDK16, author = {SK Hafizul Islam and Ashok Kumar Das and Muhammad Khurram Khan}, title = {Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3229--3238}, year = {2016}, url = {https://doi.org/10.1002/sec.1528}, doi = {10.1002/SEC.1528}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/IslamDK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuXKLDKKB16, author = {Fan Wu and Lili Xu and Saru Kumari and Xiong Li and Ashok Kumar Das and Muhammad Khurram Khan and Marimuthu Karuppiah and Renuka Baliyan}, title = {A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3527--3542}, year = {2016}, url = {https://doi.org/10.1002/sec.1558}, doi = {10.1002/SEC.1558}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WuXKLDKKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WazidDKK16, author = {Mohammad Wazid and Ashok Kumar Das and Saru Kumari and Muhammad Khurram Khan}, title = {Design of sinkhole node detection mechanism for hierarchical wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {9}, number = {17}, pages = {4596--4614}, year = {2016}, url = {https://doi.org/10.1002/sec.1652}, doi = {10.1002/SEC.1652}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WazidDKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaitraIAGKK16, author = {Tanmoy Maitra and SK Hafizul Islam and Ruhul Amin and Debasis Giri and Muhammad Khurram Khan and Neeraj Kumar}, title = {An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design}, journal = {Secur. Commun. Networks}, volume = {9}, number = {17}, pages = {4615--4638}, year = {2016}, url = {https://doi.org/10.1002/sec.1653}, doi = {10.1002/SEC.1653}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MaitraIAGKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AminIBGKK16, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Debasis Giri and Muhammad Khurram Khan and Neeraj Kumar}, title = {A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments}, journal = {Secur. Commun. Networks}, volume = {9}, number = {17}, pages = {4650--4666}, year = {2016}, url = {https://doi.org/10.1002/sec.1655}, doi = {10.1002/SEC.1655}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/AminIBGKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChaudhryKIAKA16, author = {Shehzad Ashraf Chaudhry and Imran Khan and Azeem Irshad and Muhammad Usman Ashraf and Muhammad Khurram Khan and Hafiz Farooq Ahmad}, title = {A provably secure anonymous authentication scheme for Session Initiation Protocol}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {5016--5027}, year = {2016}, url = {https://doi.org/10.1002/sec.1672}, doi = {10.1002/SEC.1672}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ChaudhryKIAKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/0001KLMH16, author = {Qi Jiang and Muhammad Khurram Khan and Xiang Lu and Jianfeng Ma and Debiao He}, title = {A privacy preserving three-factor authentication protocol for e-Health clouds}, journal = {J. Supercomput.}, volume = {72}, number = {10}, pages = {3826--3849}, year = {2016}, url = {https://doi.org/10.1007/s11227-015-1610-x}, doi = {10.1007/S11227-015-1610-X}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/0001KLMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LiNKIWKD16, author = {Xiong Li and Jianwei Niu and Saru Kumari and SK Hafizul Islam and Fan Wu and Muhammad Khurram Khan and Ashok Kumar Das}, title = {A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security}, journal = {Wirel. Pers. Commun.}, volume = {89}, number = {2}, pages = {569--597}, year = {2016}, url = {https://doi.org/10.1007/s11277-016-3293-x}, doi = {10.1007/S11277-016-3293-X}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LiNKIWKD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/CaoLKWK16, author = {Yifeng Cao and Xiao{-}Yang Liu and Linghe Kong and Min{-}You Wu and Muhammad Khurram Khan}, title = {{EHR:} Routing Protocol for Energy Harvesting Wireless Sensor Networks}, booktitle = {22nd {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2016, Wuhan, China, December 13-16, 2016}, pages = {56--63}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICPADS.2016.0017}, doi = {10.1109/ICPADS.2016.0017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpads/CaoLKWK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FayedK16a, author = {Mahmoud Samir Fayed and Muhammad Khurram Khan}, title = {SNKnock: {A} free security tool for Facebook users}, journal = {CoRR}, volume = {abs/1612.05923}, year = {2016}, url = {http://arxiv.org/abs/1612.05923}, eprinttype = {arXiv}, eprint = {1612.05923}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FayedK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/KumariKA15, author = {Saru Kumari and Muhammad Khurram Khan and Mohammed Atiquzzaman}, title = {User authentication schemes for wireless sensor networks: {A} review}, journal = {Ad Hoc Networks}, volume = {27}, pages = {159--194}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2014.11.018}, doi = {10.1016/J.ADHOC.2014.11.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/KumariKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/HalboobAKKP15, author = {Waleed Halboob and Haider Abbas and Muhammad Khurram Khan and Farrukh Aslam Khan and Maruf Pasha}, title = {A framework to address inconstant user requirements in cloud SLAs management}, journal = {Clust. Comput.}, volume = {18}, number = {1}, pages = {123--133}, year = {2015}, url = {https://doi.org/10.1007/s10586-014-0408-6}, doi = {10.1007/S10586-014-0408-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/HalboobAKKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AkhunzadaAGKRG15, author = {Adnan Akhunzada and Ejaz Ahmed and Abdullah Gani and Muhammad Khurram Khan and Muhammad Imran and Sghaier Guizani}, title = {Securing software defined networks: taxonomy, requirements, and open issues}, journal = {{IEEE} Commun. Mag.}, volume = {53}, number = {4}, pages = {36--44}, year = {2015}, url = {https://doi.org/10.1109/MCOM.2015.7081073}, doi = {10.1109/MCOM.2015.7081073}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AkhunzadaAGKRG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/KhanCMK15, author = {Muhammad Khurram Khan and Ankita Chaturvedi and Dheerendra Mishra and Saru Kumari}, title = {On the security enhancement of integrated electronic patient records information systems}, journal = {Comput. Sci. Inf. Syst.}, volume = {12}, number = {2}, pages = {857--872}, year = {2015}, url = {https://doi.org/10.2298/CSIS141029030K}, doi = {10.2298/CSIS141029030K}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/KhanCMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KhanKMAC15, author = {Wazir Zada Khan and Muhammad Khurram Khan and Fahad T. Bin Muhaya and Mohammed Y. Aalsalem and Han{-}Chieh Chao}, title = {A Comprehensive Study of Email Spam Botnet Detection}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {17}, number = {4}, pages = {2271--2295}, year = {2015}, url = {https://doi.org/10.1109/COMST.2015.2459015}, doi = {10.1109/COMST.2015.2459015}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/KhanKMAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/HeKK15, author = {Debiao He and Muhammad Khurram Khan and Neeraj Kumar}, title = {A new handover authentication protocol based on bilinear pairing functions for wireless networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {18}, number = {1/2}, pages = {67--74}, year = {2015}, url = {https://doi.org/10.1504/IJAHUC.2015.067774}, doi = {10.1504/IJAHUC.2015.067774}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/HeKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KhanXHC15, author = {Muhammad Khurram Khan and Yang Xiang and Shi{-}Jinn Horng and Hsiao{-}Hwa Chen}, title = {Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {958190:1--958190:2}, year = {2015}, url = {https://doi.org/10.1155/2015/958190}, doi = {10.1155/2015/958190}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KhanXHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HorngTHWLK15, author = {Shi{-}Jinn Horng and Shiang{-}Feng Tzeng and Po{-}Hsian Huang and Xian Wang and Tianrui Li and Muhammad Khurram Khan}, title = {An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks}, journal = {Inf. Sci.}, volume = {317}, pages = {48--66}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.04.033}, doi = {10.1016/J.INS.2015.04.033}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HorngTHWLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/AminIBKO15, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan and Mohammad S. Obaidat}, title = {Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System}, journal = {J. Medical Syst.}, volume = {39}, number = {11}, pages = {137:1--137:20}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0307-2}, doi = {10.1007/S10916-015-0307-2}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/AminIBKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/AminIBKL15, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan and Xiong Li}, title = {Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems}, journal = {J. Medical Syst.}, volume = {39}, number = {11}, pages = {140:1--140:21}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0318-z}, doi = {10.1007/S10916-015-0318-Z}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/AminIBKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/ChaudhryMNK15, author = {Shehzad Ashraf Chaudhry and Khalid Mahmood and Husnain Naqvi and Muhammad Khurram Khan}, title = {An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography}, journal = {J. Medical Syst.}, volume = {39}, number = {11}, pages = {175}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0335-y}, doi = {10.1007/S10916-015-0335-Y}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/ChaudhryMNK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/AminIBKK15, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan and Neeraj Kumar}, title = {An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for {TMIS} using Elliptic Curve Cryptography}, journal = {J. Medical Syst.}, volume = {39}, number = {11}, pages = {180}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0351-y}, doi = {10.1007/S10916-015-0351-Y}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/AminIBKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AkhunzadaSAGASFHK15, author = {Adnan Akhunzada and Mehdi Sookhak and Nor Badrul Anuar and Abdullah Gani and Ejaz Ahmed and Muhammad Shiraz and Steven Furnell and Amir Hayat and Muhammad Khurram Khan}, title = {Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions}, journal = {J. Netw. Comput. Appl.}, volume = {48}, pages = {44--57}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.10.009}, doi = {10.1016/J.JNCA.2014.10.009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AkhunzadaSAGASFHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AhmedGKBK15, author = {Ejaz Ahmed and Abdullah Gani and Muhammad Khurram Khan and Rajkumar Buyya and Samee Ullah Khan}, title = {Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {154--172}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.03.001}, doi = {10.1016/J.JNCA.2015.03.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AhmedGKBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LengTLK15, author = {Lu Leng and Andrew Beng Jin Teoh and Ming Li and Muhammad Khurram Khan}, title = {Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code}, journal = {Multim. Tools Appl.}, volume = {74}, number = {24}, pages = {11683--11701}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-2255-0}, doi = {10.1007/S11042-014-2255-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LengTLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangWK15, author = {Wenfang Zhang and Xiaomin Wang and Muhammad Khurram Khan}, title = {A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {937--951}, year = {2015}, url = {https://doi.org/10.1002/sec.1051}, doi = {10.1002/SEC.1051}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangWK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/IslamKA15, author = {SK Hafizul Islam and Muhammad Khurram Khan and Ali M. Al{-}Khouri}, title = {Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2214--2231}, year = {2015}, url = {https://doi.org/10.1002/sec.1165}, doi = {10.1002/SEC.1165}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/IslamKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChaudhryFNKK15, author = {Shehzad Ashraf Chaudhry and Mohammad Sabzinejad Farash and Husnain Naqvi and Saru Kumari and Muhammad Khurram Khan}, title = {An enhanced privacy preserving remote user authentication scheme with provable security}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3782--3795}, year = {2015}, url = {https://doi.org/10.1002/sec.1299}, doi = {10.1002/SEC.1299}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChaudhryFNKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/IslamKOM15, author = {SK Hafizul Islam and Muhammad Khurram Khan and Mohammad S. Obaidat and Fahad T. Bin Muhaya}, title = {Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps}, journal = {Wirel. Pers. Commun.}, volume = {84}, number = {3}, pages = {2013--2034}, year = {2015}, url = {https://doi.org/10.1007/s11277-015-2542-8}, doi = {10.1007/S11277-015-2542-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/IslamKOM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/HuangKWMH15, author = {Baojun Huang and Muhammad Khurram Khan and Libing Wu and Fahad T. Bin Muhaya and Debiao He}, title = {An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography}, journal = {Wirel. Pers. Commun.}, volume = {85}, number = {1}, pages = {225--240}, year = {2015}, url = {https://doi.org/10.1007/s11277-015-2735-1}, doi = {10.1007/S11277-015-2735-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/HuangKWMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LiLKLWK15, author = {Xiong Li and Junguo Liao and Saru Kumari and Wei Liang and Fan Wu and Muhammad Khurram Khan}, title = {A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design}, journal = {Wirel. Pers. Commun.}, volume = {85}, number = {1}, pages = {263--288}, year = {2015}, url = {https://doi.org/10.1007/s11277-015-2737-z}, doi = {10.1007/S11277-015-2737-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LiLKLWK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/AminIBK15, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan}, title = {An efficient remote mutual authentication scheme using smart mobile phone over insecure networks}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166114}, doi = {10.1109/CYBERSA.2015.7166114}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/AminIBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AburummanS0KC15, author = {Ala' F. A. Aburumman and Wei Jye Seo and Md. Rafiqul Islam and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {A Secure Cross-Domain {SIP} Solution for Mobile Ad Hoc Network Using Dynamic Clustering}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {649--664}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_43}, doi = {10.1007/978-3-319-28865-9\_43}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AburummanS0KC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/candie/JiaDK14, author = {Dongli Jia and Xintao Duan and Muhammad Khurram Khan}, title = {Binary Artificial Bee Colony optimization using bitwise operation}, journal = {Comput. Ind. Eng.}, volume = {76}, pages = {360--365}, year = {2014}, url = {https://doi.org/10.1016/j.cie.2014.08.016}, doi = {10.1016/J.CIE.2014.08.016}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/candie/JiaDK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/KumariKL14, author = {Saru Kumari and Muhammad Khurram Khan and Xiong Li}, title = {An improved remote user authentication scheme with key agreement}, journal = {Comput. Electr. Eng.}, volume = {40}, number = {6}, pages = {1997--2012}, year = {2014}, url = {https://doi.org/10.1016/j.compeleceng.2014.05.007}, doi = {10.1016/J.COMPELECENG.2014.05.007}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/KumariKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/KhanKG14, author = {Muhammad Khurram Khan and Saru Kumari and Mridul Kumar Gupta}, title = {More efficient key-hash based fingerprint remote authentication scheme using mobile device}, journal = {Computing}, volume = {96}, number = {9}, pages = {793--816}, year = {2014}, url = {https://doi.org/10.1007/s00607-013-0308-2}, doi = {10.1007/S00607-013-0308-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/KhanKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/KumariK14, author = {Saru Kumari and Muhammad Khurram Khan}, title = {Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'}, journal = {Int. J. Commun. Syst.}, volume = {27}, number = {12}, pages = {3939--3955}, year = {2014}, url = {https://doi.org/10.1002/dac.2590}, doi = {10.1002/DAC.2590}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/KumariK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KhanK14, author = {Muhammad Khurram Khan and Saru Kumari}, title = {An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/347169}, doi = {10.1155/2014/347169}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KhanK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HeKW14, author = {Debiao He and Muhammad Khurram Khan and Shuhua Wu}, title = {On the Security of a RSA-based Certificateless Signature Scheme}, journal = {Int. J. Netw. Secur.}, volume = {16}, number = {1}, pages = {78--80}, year = {2014}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v16-n1/ijns-2014-v16-n1-p78-80.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HeKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/LengTLK14, author = {Lu Leng and Andrew Beng Jin Teoh and Ming Li and Muhammad Khurram Khan}, title = {Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition}, journal = {Neurocomputing}, volume = {131}, pages = {377--387}, year = {2014}, url = {https://doi.org/10.1016/j.neucom.2013.10.005}, doi = {10.1016/J.NEUCOM.2013.10.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/LengTLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/SiddiquiAKA14, author = {Zeeshan Siddiqui and Abdul Hanan Abdullah and Muhammad Khurram Khan and Abdullah S. Alghamdi}, title = {Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System}, journal = {J. Medical Syst.}, volume = {38}, number = {1}, pages = {9997}, year = {2014}, url = {https://doi.org/10.1007/s10916-013-9997-5}, doi = {10.1007/S10916-013-9997-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/SiddiquiAKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/MishraMKKC14, author = {Dheerendra Mishra and Sourav Mukhopadhyay and Saru Kumari and Muhammad Khurram Khan and Ankita Chaturvedi}, title = {Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce}, journal = {J. Medical Syst.}, volume = {38}, number = {5}, pages = {41}, year = {2014}, url = {https://doi.org/10.1007/s10916-014-0041-1}, doi = {10.1007/S10916-014-0041-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/MishraMKKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/MishraMCKK14, author = {Dheerendra Mishra and Sourav Mukhopadhyay and Ankita Chaturvedi and Saru Kumari and Muhammad Khurram Khan}, title = {Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems}, journal = {J. Medical Syst.}, volume = {38}, number = {6}, pages = {24}, year = {2014}, url = {https://doi.org/10.1007/s10916-014-0024-2}, doi = {10.1007/S10916-014-0024-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/MishraMCKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/IslamK14, author = {SK Hafizul Islam and Muhammad Khurram Khan}, title = {Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems}, journal = {J. Medical Syst.}, volume = {38}, number = {10}, pages = {135}, year = {2014}, url = {https://doi.org/10.1007/s10916-014-0135-9}, doi = {10.1007/S10916-014-0135-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/IslamK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SookhakTAGK14, author = {Mehdi Sookhak and Hamid Talebian and Ejaz Ahmed and Abdullah Gani and Muhammad Khurram Khan}, title = {A review on remote data auditing in single cloud server: Taxonomy and open issues}, journal = {J. Netw. Comput. Appl.}, volume = {43}, pages = {121--141}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2014.04.011}, doi = {10.1016/J.JNCA.2014.04.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SookhakTAGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HorngRFWK14, author = {Shi{-}Jinn Horng and Didi Rosiyadi and Pingzhi Fan and Xian Wang and Muhammad Khurram Khan}, title = {An adaptive watermarking scheme for e-government document images}, journal = {Multim. Tools Appl.}, volume = {72}, number = {3}, pages = {3085--3103}, year = {2014}, url = {https://doi.org/10.1007/s11042-013-1579-5}, doi = {10.1007/S11042-013-1579-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HorngRFWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KhanK14, author = {Muhammad Khurram Khan and Saru Kumari}, title = {Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems"}, journal = {Secur. Commun. Networks}, volume = {7}, number = {2}, pages = {399--408}, year = {2014}, url = {https://doi.org/10.1002/sec.791}, doi = {10.1002/SEC.791}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KhanK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LengTLK14, author = {Lu Leng and Andrew Beng Jin Teoh and Ming Li and Muhammad Khurram Khan}, title = {A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {1860--1871}, year = {2014}, url = {https://doi.org/10.1002/sec.900}, doi = {10.1002/SEC.900}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LengTLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KumariGKL14, author = {Saru Kumari and Mridul Kumar Gupta and Muhammad Khurram Khan and Xiong Li}, title = {An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {1921--1932}, year = {2014}, url = {https://doi.org/10.1002/sec.906}, doi = {10.1002/SEC.906}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KumariGKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KumariK14, author = {Saru Kumari and Muhammad Khurram Khan}, title = {More secure smart card-based remote user password authentication scheme with user anonymity}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {2039--2053}, year = {2014}, url = {https://doi.org/10.1002/sec.916}, doi = {10.1002/SEC.916}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KumariK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/TsaiKPL14, author = {Pei{-}wei Tsai and Muhammad Khurram Khan and Jeng{-}Shyang Pan and Bin{-}Yih Liao}, title = {Interactive Artificial Bee Colony Supported Passive Continuous Authentication System}, journal = {{IEEE} Syst. J.}, volume = {8}, number = {2}, pages = {395--405}, year = {2014}, url = {https://doi.org/10.1109/JSYST.2012.2208153}, doi = {10.1109/JSYST.2012.2208153}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/TsaiKPL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/AzamKSAK14, author = {Farzana Azam and Zeeshan Shafi Khan and Muhammad Sher and Khaled Alghathbar and Muhammad Khurram Khan}, title = {Attack containment in mobile ad-hoc networks through fair distribution of processing resources}, journal = {Telecommun. Syst.}, volume = {55}, number = {1}, pages = {93--103}, year = {2014}, url = {https://doi.org/10.1007/s11235-013-9754-6}, doi = {10.1007/S11235-013-9754-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/AzamKSAK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/HorngTWQGK14, author = {Shi{-}Jinn Horng and Shiang{-}Feng Tzeng and Xian Wang and Shaojie Qiao and Xun Gong and Muhammad Khurram Khan}, title = {Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs}, journal = {Wirel. Pers. Commun.}, volume = {79}, number = {2}, pages = {1445--1454}, year = {2014}, url = {https://doi.org/10.1007/s11277-014-1939-0}, doi = {10.1007/S11277-014-1939-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/HorngTWQGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/KhanKWK14, author = {Muhammad Khurram Khan and Saru Kumari and Xiaomin Wang and Rahul Kumar}, title = {Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme}, booktitle = {{IEEE} 12th International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2014, Dalian, China, August 24-27, 2014}, pages = {125--128}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DASC.2014.31}, doi = {10.1109/DASC.2014.31}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasc/KhanKWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/DerhabBMKX14, author = {Abdelouahid Derhab and Abdelghani Bouras and Fahad Bin Muhaya and Muhammad Khurram Khan and Yang Xiang}, title = {Spam Trapping System: Novel security framework to fight against spam botnets}, booktitle = {21st International Conference on Telecommunications, {ICT} 2014, Lisbon, Portugal, 4-7 May, 2014}, pages = {467--471}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICT.2014.6845160}, doi = {10.1109/ICT.2014.6845160}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict/DerhabBMKX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/KumariKLK14, author = {Saru Kumari and Muhammad Khurram Khan and Xiong Li and Rahul Kumar}, title = {Notes on "a password-based remote user authentication scheme without smart card"}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {116--119}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013105}, doi = {10.1109/ISBAST.2014.7013105}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/KumariKLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LiKKLL14, author = {Xiong Li and Muhammad Khurram Khan and Saru Kumari and Junguo Liao and Wei Liang}, title = {Cryptanalysis of a robust smart card authentication scheme for multi-server architecture}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {120--123}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013106}, doi = {10.1109/ISBAST.2014.7013106}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LiKKLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/KurniawanKKA14, author = {Fajri Kurniawan and Mohammed S. Khalil and Muhammad Khurram Khan and Yasser M. Alginahi}, title = {DWT+LSB-based fragile watermarking method for digital Quran images}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {290--297}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013137}, doi = {10.1109/ISBAST.2014.7013137}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/KurniawanKKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/EldefrawyKE14, author = {Mohamed Hamdy Eldefrawy and Muhammad Khurram Khan and Hassan M. Elkamchouchi}, editor = {Shahram Latifi}, title = {The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices}, booktitle = {11th International Conference on Information Technology: New Generations, {ITNG} 2014, Las Vegas, NV, USA, April 7-9, 2014}, pages = {196--200}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ITNG.2014.13}, doi = {10.1109/ITNG.2014.13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itng/EldefrawyKE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/LengLLKA14, author = {Lu Leng and Gang Liu and Ming Li and Muhammad Khurram Khan and Ali M. Al{-}Khouri}, editor = {Shahram Latifi}, title = {Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint Preprocessing}, booktitle = {11th International Conference on Information Technology: New Generations, {ITNG} 2014, Las Vegas, NV, USA, April 7-9, 2014}, pages = {523--528}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ITNG.2014.18}, doi = {10.1109/ITNG.2014.18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itng/LengLLKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiMKT13, author = {Fagen Li and Fahad Bin Muhaya and Muhammad Khurram Khan and Tsuyoshi Takagi}, title = {Lattice-based signcryption}, journal = {Concurr. Comput. Pract. Exp.}, volume = {25}, number = {14}, pages = {2112--2122}, year = {2013}, url = {https://doi.org/10.1002/cpe.2826}, doi = {10.1002/CPE.2826}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/LiMKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/KhanAKAA13, author = {Bilal Khan and Khaled Alghathbar and Muhammad Khurram Khan and Abdullah M. AlKelabi and Abdulaziz Alajaji}, title = {Cyber security using arabic captcha scheme}, journal = {Int. Arab J. Inf. Technol.}, volume = {10}, number = {1}, pages = {76--84}, year = {2013}, url = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=84\&\#38;Itemid=333}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/KhanAKAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcisys/JiaDK13, author = {Dongli Jia and Xintao Duan and Muhammad Khurram Khan}, title = {An Efficient Binary Differential Evolution with Parameter Adaptation}, journal = {Int. J. Comput. Intell. Syst.}, volume = {6}, number = {2}, pages = {328--336}, year = {2013}, url = {https://doi.org/10.1080/18756891.2013.769769}, doi = {10.1080/18756891.2013.769769}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcisys/JiaDK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KhanXHC13, author = {Muhammad Khurram Khan and Yang Xiang and Shi{-}Jinn Horng and Hsiao{-}Hwa Chen}, title = {Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/956736}, doi = {10.1155/2013/956736}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KhanXHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/HeK13, author = {Debiao He and Muhammad Khurram Khan}, title = {Cryptanalysis of a key agreement protocol based on chaotic Hash}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {5}, number = {3/4}, pages = {172--177}, year = {2013}, url = {https://doi.org/10.1504/IJESDF.2013.058650}, doi = {10.1504/IJESDF.2013.058650}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/HeK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/HeCSK13, author = {Debiao He and Jianhua Chen and Wenbo Shi and Muhammad Khurram Khan}, title = {On the security of an authentication scheme for multi-server architecture}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {5}, number = {3/4}, pages = {288--296}, year = {2013}, url = {https://doi.org/10.1504/IJESDF.2013.058669}, doi = {10.1504/IJESDF.2013.058669}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/HeCSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/0003XF13a, author = {Muhammad Khurram Khan and Saru Kumari and Pitam Singh}, title = {Cryptanalysis of an 'Efficient-Strong Authentiction Protocol {(E-SAP)} for Healthcare Applications Using Wireless Medical Sensor Networks'}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {7}, number = {5}, pages = {967--979}, year = {2013}, url = {https://doi.org/10.3837/tiis.2013.05.002}, doi = {10.3837/TIIS.2013.05.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/0003XF13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HorngTFWLK13, author = {Shi{-}Jinn Horng and Shiang{-}Feng Tzeng and Pingzhi Fan and Xian Wang and Tianrui Li and Muhammad Khurram Khan}, title = {Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {7}, number = {6}, pages = {1512--1532}, year = {2013}, url = {https://doi.org/10.3837/tiis.2013.06.010}, doi = {10.3837/TIIS.2013.06.010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/HorngTFWLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsci/HalboobMMK13, author = {Waleed Halboob and Ali Mamat and Ramlan Mahmod and Muhammad Khurram Khan}, title = {Temporal, Delegable and Cheap Update Access control to published {XML} Documents}, journal = {J. Comput. Sci.}, volume = {9}, number = {4}, pages = {427--432}, year = {2013}, url = {https://doi.org/10.3844/jcssp.2013.427.432}, doi = {10.3844/JCSSP.2013.427.432}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsci/HalboobMMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WaqarRAK13, author = {Adeela Waqar and Asad Raza and Haider Abbas and Muhammad Khurram Khan}, title = {A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {235--248}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.09.001}, doi = {10.1016/J.JNCA.2012.09.001}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WaqarRAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiNKL13, author = {Xiong Li and Jianwei Niu and Muhammad Khurram Khan and Junguo Liao}, title = {An enhanced smart card based remote user password authentication scheme}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1365--1371}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.034}, doi = {10.1016/J.JNCA.2013.02.034}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiNKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/HorngHLQGCK13, author = {Shi{-}Jinn Horng and Ling{-}Yuan Hsu and Tianrui Li and Shaojie Qiao and Xun Gong and Hsien{-}Hsin Chou and Muhammad Khurram Khan}, title = {Using Sorted Switching Median Filter to remove high-density impulse noises}, journal = {J. Vis. Commun. Image Represent.}, volume = {24}, number = {7}, pages = {956--967}, year = {2013}, url = {https://doi.org/10.1016/j.jvcir.2013.06.012}, doi = {10.1016/J.JVCIR.2013.06.012}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/HorngHLQGCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/HorngRLTGK13, author = {Shi{-}Jinn Horng and Didi Rosiyadi and Tianrui Li and Takao Terano and Minyi Guo and Muhammad Khurram Khan}, title = {A blind image copyright protection scheme for e-government}, journal = {J. Vis. Commun. Image Represent.}, volume = {24}, number = {7}, pages = {1099--1105}, year = {2013}, url = {https://doi.org/10.1016/j.jvcir.2013.07.008}, doi = {10.1016/J.JVCIR.2013.07.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/HorngRLTGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/HeKKL13, author = {Debiao He and Neeraj Kumar and Muhammad Khurram Khan and Jong{-}Hyouk Lee}, title = {Anonymous two-factor authentication for consumer roaming service in global mobility networks}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {59}, number = {4}, pages = {811--817}, year = {2013}, url = {https://doi.org/10.1109/TCE.2013.6689693}, doi = {10.1109/TCE.2013.6689693}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/HeKKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/Khan13, author = {Muhammad Khurram Khan}, title = {Editorial - Chaotic cryptography and its applications in telecommunication systems}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {513--514}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9456-x}, doi = {10.1007/S11235-011-9456-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/Khan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/WangGZKA13, author = {Xiaomin Wang and Wei Guo and Wenfang Zhang and Muhammad Khurram Khan and Khaled Alghathbar}, title = {Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {515--524}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9457-9}, doi = {10.1007/S11235-011-9457-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/WangGZKA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HorngTPFWLK13, author = {Shi{-}Jinn Horng and Shiang{-}Feng Tzeng and Yi Pan and Pingzhi Fan and Xian Wang and Tianrui Li and Muhammad Khurram Khan}, title = {b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in {VANET}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {11}, pages = {1860--1875}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2277471}, doi = {10.1109/TIFS.2013.2277471}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HorngTPFWLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bics/KhanKGM13, author = {Muhammad Khurram Khan and Saru Kumari and Mridul Kumar Gupta and Fahad Bin Muhaya}, editor = {Derong Liu and Cesare Alippi and Dongbin Zhao and Amir Hussain}, title = {Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device}, booktitle = {Advances in Brain Inspired Cognitive Systems - 6th International Conference, {BICS} 2013, Beijing, China, June 9-11, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7888}, pages = {271--277}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38786-9\_31}, doi = {10.1007/978-3-642-38786-9\_31}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bics/KhanKGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LiNKL13, author = {Xiong Li and Jianwei Niu and Muhammad Khurram Khan and Junguo Liao}, title = {Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {105--110}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.20}, doi = {10.1109/ISBAST.2013.20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LiNKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LengTLK13, author = {Lu Leng and Andrew Beng Jin Teoh and Ming Li and Muhammad Khurram Khan}, title = {Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {230--234}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.40}, doi = {10.1109/ISBAST.2013.40}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LengTLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/KurniawanKK13, author = {Fajri Kurniawan and Mohammed Sayim Khalil and Muhammad Khurram Khan}, title = {Core-Point Detection on Camera-Based Fingerprint Image}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {241--246}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.42}, doi = {10.1109/ISBAST.2013.42}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/KurniawanKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/KumariMKK13, author = {Saru Kumari and Fahad Bin Muhaya and Muhammad Khurram Khan and R. Kumar}, title = {Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme"}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {247--250}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.43}, doi = {10.1109/ISBAST.2013.43}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/KumariMKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/KurniawanKKA13, author = {Fajri Kurniawan and Mohammed Sayim Khalil and Muhammad Khurram Khan and Yasser M. Alginahi}, title = {Authentication and Tamper Detection of Digital Holy Quran Images}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {291--296}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.51}, doi = {10.1109/ISBAST.2013.51}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/KurniawanKKA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LiNKL13a, author = {Xiong Li and Jianwei Niu and Muhammad Khurram Khan and Junguo Liao}, title = {Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.27}, doi = {10.1109/ISBAST.2013.27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LiNKL13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanH13, author = {Muhammad Khurram Khan and Debiao He}, title = {Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard"}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1708--1710}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.212}, doi = {10.1109/TRUSTCOM.2013.212}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KhanH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/FarfouraHLRCK12, author = {Mahmoud E. Farfoura and Shi{-}Jinn Horng and Jui{-}Lin Lai and Ray{-}Shine Run and Rong{-}Jian Chen and Muhammad Khurram Khan}, title = {A blind reversible method for watermarking relational databases based on a time-stamping protocol}, journal = {Expert Syst. Appl.}, volume = {39}, number = {3}, pages = {3185--3196}, year = {2012}, url = {https://doi.org/10.1016/j.eswa.2011.09.005}, doi = {10.1016/J.ESWA.2011.09.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/FarfouraHLRCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Khan12, author = {Muhammad Khurram Khan}, title = {High performance biometrics recognition algorithms and systems}, journal = {Future Gener. Comput. Syst.}, volume = {28}, number = {1}, pages = {210--211}, year = {2012}, url = {https://doi.org/10.1016/j.future.2011.08.010}, doi = {10.1016/J.FUTURE.2011.08.010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/Khan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YanPCK12, author = {Lijun Yan and Jeng{-}Shyang Pan and Shu{-}Chuan Chu and Muhammad Khurram Khan}, title = {Adaptively weighted sub-directional two-dimensional linear discriminant analysis for face recognition}, journal = {Future Gener. Comput. Syst.}, volume = {28}, number = {1}, pages = {232--235}, year = {2012}, url = {https://doi.org/10.1016/j.future.2010.11.010}, doi = {10.1016/J.FUTURE.2010.11.010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/YanPCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiK12, author = {Fagen Li and Muhammad Khurram Khan}, title = {A biometric identity-based signcryption scheme}, journal = {Future Gener. Comput. Syst.}, volume = {28}, number = {1}, pages = {306--310}, year = {2012}, url = {https://doi.org/10.1016/j.future.2010.11.004}, doi = {10.1016/J.FUTURE.2010.11.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/MahmudKAAI12, author = {Maqsood Mahmud and Muhammad Khurram Khan and Khaled Alghathbar and Abdul Hanan Abdullah and Mohammad Yazid Bin Idris}, title = {Intrinsic authentication of multimedia objects using biometric data manipulation}, journal = {Int. Arab J. Inf. Technol.}, volume = {9}, number = {4}, pages = {336--342}, year = {2012}, url = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=81\&\#38;Itemid=327}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/MahmudKAAI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/RosiyadiHFWKP12, author = {Didi Rosiyadi and Shi{-}Jinn Horng and Pingzhi Fan and Xian Wang and Muhammad Khurram Khan and Yi Pan}, title = {Copyright Protection for E-Government Document Images}, journal = {{IEEE} Multim.}, volume = {19}, number = {3}, pages = {62--73}, year = {2012}, url = {https://doi.org/10.1109/MMUL.2011.41}, doi = {10.1109/MMUL.2011.41}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeemm/RosiyadiHFWKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jim/KangPKK12, author = {Soo{-}Young Kang and Jong Hyuk Park and Muhammad Khurram Khan and Jin Kwak}, title = {Study on the common criteria methodology for secure ubiquitous environment construction}, journal = {J. Intell. Manuf.}, volume = {23}, number = {4}, pages = {933--939}, year = {2012}, url = {https://doi.org/10.1007/s10845-009-0363-x}, doi = {10.1007/S10845-009-0363-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jim/KangPKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/KumariKK12, author = {Saru Kumari and Muhammad Khurram Khan and Rahul Kumar}, title = {Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'}, journal = {J. Medical Syst.}, volume = {37}, number = {4}, pages = {9952}, year = {2012}, url = {https://doi.org/10.1007/s10916-013-9952-5}, doi = {10.1007/S10916-013-9952-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/KumariKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/KhanK12, author = {Muhammad Khurram Khan and Saru Kumari}, title = {An Authentication Scheme for Secure Access to Healthcare Services}, journal = {J. Medical Syst.}, volume = {37}, number = {4}, pages = {9954}, year = {2012}, url = {https://doi.org/10.1007/s10916-013-9954-3}, doi = {10.1007/S10916-013-9954-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/KhanK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiKAT12, author = {Fagen Li and Muhammad Khurram Khan and Khaled Alghathbar and Tsuyoshi Takagi}, title = {Identity-based online/offline signcryption for low power devices}, journal = {J. Netw. Comput. Appl.}, volume = {35}, number = {1}, pages = {340--347}, year = {2012}, url = {https://doi.org/10.1016/j.jnca.2011.08.001}, doi = {10.1016/J.JNCA.2011.08.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiKAT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/EldefrawyKAKE12, author = {Mohamed Hamdy Eldefrawy and Muhammad Khurram Khan and Khaled Alghathbar and Tai{-}Hoon Kim and Hassan M. Elkamchouchi}, title = {Mobile one-time passwords: two-factor authentication using mobile phones}, journal = {Secur. Commun. Networks}, volume = {5}, number = {5}, pages = {508--516}, year = {2012}, url = {https://doi.org/10.1002/sec.340}, doi = {10.1002/SEC.340}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/EldefrawyKAKE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AlamAK0ANHKA12, author = {Masoom Alam and Tamleek Ali and Sanaullah Khan and Shahbaz Khan and Muhammad Ali and Mohammad Nauman and Amir Hayat and Muhammad Khurram Khan and Khaled Alghathbar}, title = {Analysis of existing remote attestation techniques}, journal = {Secur. Commun. Networks}, volume = {5}, number = {9}, pages = {1062--1082}, year = {2012}, url = {https://doi.org/10.1002/sec.393}, doi = {10.1002/SEC.393}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AlamAK0ANHKA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KhanH12, author = {Muhammad Khurram Khan and Debiao He}, title = {A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography}, journal = {Secur. Commun. Networks}, volume = {5}, number = {11}, pages = {1260--1266}, year = {2012}, url = {https://doi.org/10.1002/sec.573}, doi = {10.1002/SEC.573}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KhanH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cason/KhanKG12, author = {Muhammad Khurram Khan and Saru Kumari and Mridul Kumar Gupta}, title = {Further cryptanalysis of 'A remote authentication scheme using mobile device'}, booktitle = {Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012}, pages = {234--237}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CASoN.2012.6412408}, doi = {10.1109/CASON.2012.6412408}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cason/KhanKG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdke/KhanH12, author = {Muhammad Khurram Khan and Debiao He}, editor = {Yang Xiang and Mukaddim Pathan and Xiaohui Tao and Hua Wang}, title = {Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol"}, booktitle = {Data and Knowledge Engineering - Third International Conference, {ICDKE} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7696}, pages = {243--249}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34679-8\_22}, doi = {10.1007/978-3-642-34679-8\_22}, timestamp = {Thu, 09 Mar 2023 09:06:09 +0100}, biburl = {https://dblp.org/rec/conf/icdke/KhanH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EldefrawyK12, author = {Mohamed Hamdy Eldefrawy and Muhammad Khurram Khan}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Detecting counterfeit-money using RFID-enabled mobile devices}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {74--79}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470988/}, timestamp = {Thu, 10 Mar 2022 09:31:39 +0100}, biburl = {https://dblp.org/rec/conf/icitst/EldefrawyK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/EldefrawyAK12, author = {Mohamed Hamdy Eldefrawy and Khaled Alghathbar and Muhammad Khurram Khan}, title = {Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes}, booktitle = {2012 International Symposium on Biometrics and Security Technologies, {ISBAST} 2012, Taipei, Taiwan, March 26-29, 2012}, pages = {77--81}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ISBAST.2012.16}, doi = {10.1109/ISBAST.2012.16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/EldefrawyAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/candie/JiaZQK11, author = {Dongli Jia and Guoxin Zheng and Boyang Qu and Muhammad Khurram Khan}, title = {A hybrid particle swarm optimization algorithm for high-dimensional problems}, journal = {Comput. Ind. Eng.}, volume = {61}, number = {4}, pages = {1117--1122}, year = {2011}, url = {https://doi.org/10.1016/j.cie.2011.06.024}, doi = {10.1016/J.CIE.2011.06.024}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/candie/JiaZQK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KhanKA11, author = {Muhammad Khurram Khan and Soo{-}Kyun Kim and Khaled Alghathbar}, title = {Cryptanalysis and security enhancement of a 'more efficient {\&} secure dynamic ID-based remote user authentication scheme'}, journal = {Comput. Commun.}, volume = {34}, number = {3}, pages = {305--309}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.02.011}, doi = {10.1016/J.COMCOM.2010.02.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/KhanKA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/HsuHFKWRLC11, author = {Ling{-}Yuan Hsu and Shi{-}Jinn Horng and Pingzhi Fan and Muhammad Khurram Khan and Yuh{-}Rau Wang and Ray{-}Shine Run and Jui{-}Lin Lai and Rong{-}Jian Chen}, title = {{MTPSO} algorithm for solving planar graph coloring problem}, journal = {Expert Syst. Appl.}, volume = {38}, number = {5}, pages = {5525--5531}, year = {2011}, url = {https://doi.org/10.1016/j.eswa.2010.10.084}, doi = {10.1016/J.ESWA.2010.10.084}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/HsuHFKWRLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/HeHFKRLC11, author = {Mingxing He and Shi{-}Jinn Horng and Pingzhi Fan and Muhammad Khurram Khan and Ray{-}Shine Run and Jui{-}Lin Lai and Rong{-}Jian Chen}, title = {A fast {RFID} tag identification algorithm based on counter and stack}, journal = {Expert Syst. Appl.}, volume = {38}, number = {6}, pages = {6829--6838}, year = {2011}, url = {https://doi.org/10.1016/j.eswa.2010.12.056}, doi = {10.1016/J.ESWA.2010.12.056}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/HeHFKRLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/HsuHHFKKRLC11, author = {Ling{-}Yuan Hsu and Shi{-}Jinn Horng and Mingxing He and Pingzhi Fan and Tzong{-}Wann Kao and Muhammad Khurram Khan and Ray{-}Shine Run and Jui{-}Lin Lai and Rong{-}Jian Chen}, title = {Mutual funds trading strategy based on particle swarm optimization}, journal = {Expert Syst. Appl.}, volume = {38}, number = {6}, pages = {7582--7602}, year = {2011}, url = {https://doi.org/10.1016/j.eswa.2010.12.105}, doi = {10.1016/J.ESWA.2010.12.105}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/HsuHHFKKRLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/HuangHHFKKLK11, author = {Yao{-}Lin Huang and Shi{-}Jinn Horng and Mingxing He and Pingzhi Fan and Tzong{-}Wann Kao and Muhammad Khurram Khan and Jui{-}Lin Lai and I{-}Hong Kuo}, title = {A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization}, journal = {Expert Syst. Appl.}, volume = {38}, number = {7}, pages = {8014--8023}, year = {2011}, url = {https://doi.org/10.1016/j.eswa.2010.12.127}, doi = {10.1016/J.ESWA.2010.12.127}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/HuangHHFKKLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/HeHFKRLCS11, author = {Mingxing He and Shi{-}Jinn Horng and Pingzhi Fan and Muhammad Khurram Khan and Ray{-}Shine Run and Jui{-}Lin Lai and Rong{-}Jian Chen and Adi Sutanto}, title = {An efficient phishing webpage detector}, journal = {Expert Syst. Appl.}, volume = {38}, number = {10}, pages = {12018--12027}, year = {2011}, url = {https://doi.org/10.1016/j.eswa.2011.01.046}, doi = {10.1016/J.ESWA.2011.01.046}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/HeHFKRLCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/RunHLKFK11, author = {Ray{-}Shine Run and Shi{-}Jinn Horng and Wei{-}Hung Lin and Tzong{-}Wann Kao and Pingzhi Fan and Muhammad Khurram Khan}, title = {An efficient wavelet-tree-based watermarking method}, journal = {Expert Syst. Appl.}, volume = {38}, number = {12}, pages = {14357--14366}, year = {2011}, url = {https://doi.org/10.1016/j.eswa.2011.03.024}, doi = {10.1016/J.ESWA.2011.03.024}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/RunHLKFK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/KhanZA11, author = {Muhammad Khurram Khan and Jiashu Zhang and Khaled Alghathbar}, title = {Challenge-response-based biometric image scrambling for secure personal identification}, journal = {Future Gener. Comput. Syst.}, volume = {27}, number = {4}, pages = {411--418}, year = {2011}, url = {https://doi.org/10.1016/j.future.2010.05.019}, doi = {10.1016/J.FUTURE.2010.05.019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/KhanZA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/JiaZK11, author = {Dongli Jia and Guoxin Zheng and Muhammad Khurram Khan}, title = {An effective memetic differential evolution algorithm based on chaotic local search}, journal = {Inf. Sci.}, volume = {181}, number = {15}, pages = {3175--3187}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2011.03.018}, doi = {10.1016/J.INS.2011.03.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/JiaZK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ivc/LinHKFFCKBT11, author = {Shih{-}Ying Lin and Shi{-}Jinn Horng and Tzong{-}Wann Kao and Chin{-}Shyurng Fahn and Pingzhi Fan and Yuan{-}Hsin Chen and Muhammad Khurram Khan and Anu G. Bourgeois and Takao Terano}, title = {3D block-based medial axis transform and chessboard distance transform based on dominance}, journal = {Image Vis. Comput.}, volume = {29}, number = {4}, pages = {272--285}, year = {2011}, url = {https://doi.org/10.1016/j.imavis.2010.11.005}, doi = {10.1016/J.IMAVIS.2010.11.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ivc/LinHKFFCKBT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/Khan11, author = {Muhammad Khurram Khan}, title = {Research advances in data hiding for multimedia security}, journal = {Multim. Tools Appl.}, volume = {52}, number = {2-3}, pages = {257--261}, year = {2011}, url = {https://doi.org/10.1007/s11042-011-0741-1}, doi = {10.1007/S11042-011-0741-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/Khan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhaoWK11, author = {Hong Zhao and Hongxia Wang and Muhammad Khurram Khan}, title = {Statistical analysis of several reversible data hiding algorithms}, journal = {Multim. Tools Appl.}, volume = {52}, number = {2-3}, pages = {277--290}, year = {2011}, url = {https://doi.org/10.1007/s11042-009-0380-y}, doi = {10.1007/S11042-009-0380-Y}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhaoWK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GuoZKA11, author = {Xianfeng Guo and Jiashu Zhang and Muhammad Khurram Khan and Khaled Alghathbar}, title = {Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks}, journal = {Sensors}, volume = {11}, number = {2}, pages = {1607--1619}, year = {2011}, url = {https://doi.org/10.3390/s110201607}, doi = {10.3390/S110201607}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/GuoZKA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/ZhaoWK11, author = {Hong Zhao and Hongxia Wang and Muhammad Khurram Khan}, title = {Steganalysis for palette-based images using generalized difference image and color correlogram}, journal = {Signal Process.}, volume = {91}, number = {11}, pages = {2595--2605}, year = {2011}, url = {https://doi.org/10.1016/j.sigpro.2011.05.015}, doi = {10.1016/J.SIGPRO.2011.05.015}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/ZhaoWK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/Khan11, author = {Muhammad Khurram Khan}, title = {Guest editorial for special issue on biometric systems and applications}, journal = {Telecommun. Syst.}, volume = {47}, number = {3-4}, pages = {183--184}, year = {2011}, url = {https://doi.org/10.1007/s11235-010-9310-6}, doi = {10.1007/S11235-010-9310-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/Khan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/KhanAZ11, author = {Muhammad Khurram Khan and Khaled Alghathbar and Jiashu Zhang}, title = {Privacy-preserving and tokenless chaotic revocable face authentication scheme}, journal = {Telecommun. Syst.}, volume = {47}, number = {3-4}, pages = {227--234}, year = {2011}, url = {https://doi.org/10.1007/s11235-010-9314-2}, doi = {10.1007/S11235-010-9314-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/KhanAZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/RazzakKAP11, author = {Muhammad Imran Razzak and Muhammad Khurram Khan and Khaled Alghathbar and Jong Hyuk Park}, title = {Energy Efficient Distributed Face Recognition in Wireless Sensor Network}, journal = {Wirel. Pers. Commun.}, volume = {60}, number = {3}, pages = {571--582}, year = {2011}, url = {https://doi.org/10.1007/s11277-011-0310-y}, doi = {10.1007/S11277-011-0310-Y}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/RazzakKAP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KhanTPL11, author = {Muhammad Khurram Khan and Pei{-}wei Tsai and Jeng{-}Shyang Pan and Bin{-}Yih Liao}, title = {Biometric driven initiative system for passive continuous authentication}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {139--144}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122809}, doi = {10.1109/ISIAS.2011.6122809}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/KhanTPL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/MuhayaKX11, author = {Fahad Bin Muhaya and Muhammad Khurram Khan and Yang Xiang}, title = {Polymorphic Malware Detection Using Hierarchical Hidden Markov Model}, booktitle = {{IEEE} Ninth International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2011, 12-14 December 2011, Sydney, Australia}, pages = {151--155}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DASC.2011.47}, doi = {10.1109/DASC.2011.47}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasc/MuhayaKX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/RafiqueAK11, author = {M. Zubair Rafique and Nasser Alrayes and Muhammad Khurram Khan}, editor = {Natalio Krasnogor and Pier Luca Lanzi}, title = {Application of evolutionary algorithms in detecting {SMS} spam at access layer}, booktitle = {13th Annual Genetic and Evolutionary Computation Conference, {GECCO} 2011, Proceedings, Dublin, Ireland, July 12-16, 2011}, pages = {1787--1794}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2001576.2001816}, doi = {10.1145/2001576.2001816}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/RafiqueAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/LengZCKA11, author = {Lu Leng and Jiashu Zhang and Gao Chen and Muhammad Khurram Khan and Khaled Alghathbar}, editor = {Beniamino Murgante and Osvaldo Gervasi and Andr{\'{e}}s Iglesias and David Taniar and Bernady O. Apduhan}, title = {Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition}, booktitle = {Computational Science and Its Applications - {ICCSA} 2011 - International Conference, Santander, Spain, June 20-23, 2011. Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {6786}, pages = {458--470}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21934-4\_37}, doi = {10.1007/978-3-642-21934-4\_37}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/LengZCKA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/EldefrawyAK11, author = {Mohamed Hamdy Eldefrawy and Khaled Alghathbar and Muhammad Khurram Khan}, editor = {Shahram Latifi}, title = {OTP-Based Two-Factor Authentication Using Mobile Phones}, booktitle = {Eighth International Conference on Information Technology: New Generations, {ITNG} 2011, Las Vegas, Nevada, USA, 11-13 April 2011}, pages = {327--331}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ITNG.2011.64}, doi = {10.1109/ITNG.2011.64}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itng/EldefrawyAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/RafiqueKKA11, author = {M. Zubair Rafique and Zeeshan Shafi Khan and Muhammad Khurram Khan and Khaled Alghathbar}, editor = {Shahram Latifi}, title = {Securing IP-Multimedia Subsystem {(IMS)} against Anomalous Message Exploits by Using Machine Learning Algorithms}, booktitle = {Eighth International Conference on Information Technology: New Generations, {ITNG} 2011, Las Vegas, Nevada, USA, 11-13 April 2011}, pages = {559--563}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ITNG.2011.102}, doi = {10.1109/ITNG.2011.102}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itng/RafiqueKKA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/EldefrawyAKE11, author = {Mohamed Hamdy Eldefrawy and Khaled Alghathbar and Muhammad Khurram Khan and Hassan M. Elkamchouchi}, title = {Secure Instant Messaging Protocol for Centralized Communication Group}, booktitle = {4th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2011, Paris, France, February 7-10, 2011}, pages = {1--4}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/NTMS.2011.5720590}, doi = {10.1109/NTMS.2011.5720590}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/EldefrawyAKE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/KhanAK11, author = {Bilal Khan and Khaled Alghathbar and Muhammad Khurram Khan}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Rosslin John Robles and Maricel O. Balitanas}, title = {Information Security Awareness Campaign: An Alternate Approach}, booktitle = {Information Security and Assurance - International Conference, {ISA} 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {200}, pages = {1--10}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23141-4\_1}, doi = {10.1007/978-3-642-23141-4\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/KhanAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sta/RafiqueKAF11, author = {M. Zubair Rafique and Muhammad Khurram Khan and Khaled Alghathbar and Muddassar Farooq}, editor = {James J. Park and Javier L{\'{o}}pez and Sang{-}Soo Yeo and Taeshik Shon and David Taniar}, title = {Embedding High Capacity Covert Channels in Short Message Service {(SMS)}}, booktitle = {Secure and Trust Computing, Data Management and Applications - 8th {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June 28-30, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {186}, pages = {1--10}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22339-6\_1}, doi = {10.1007/978-3-642-22339-6\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sta/RafiqueKAF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sta/RafiqueKAF11a, author = {M. Zubair Rafique and Muhammad Khurram Khan and Khaled Alghathbar and Muddassar Farooq}, editor = {James J. Park and Javier L{\'{o}}pez and Sang{-}Soo Yeo and Taeshik Shon and David Taniar}, title = {A Framework for Detecting Malformed {SMS} Attack}, booktitle = {Secure and Trust Computing, Data Management and Applications - 8th {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June 28-30, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {186}, pages = {11--20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22339-6\_2}, doi = {10.1007/978-3-642-22339-6\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sta/RafiqueKAF11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sta/LengZCKB11, author = {Lu Leng and Jiashu Zhang and Gao Chen and Muhammad Khurram Khan and Ping Bai}, editor = {James J. Park and Javier L{\'{o}}pez and Sang{-}Soo Yeo and Taeshik Shon and David Taniar}, title = {Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion}, booktitle = {Secure and Trust Computing, Data Management and Applications - 8th {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June 28-30, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {186}, pages = {122--129}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22339-6\_15}, doi = {10.1007/978-3-642-22339-6\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sta/LengZCKB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fgit/2011sectech, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Wai{-}Chi Fang and L. Javier Garc{\'{\i}}a{-}Villalba and Kirk P. Arnett and Muhammad Khurram Khan}, title = {Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {259}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27189-2}, doi = {10.1007/978-3-642-27189-2}, isbn = {978-3-642-27188-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/2011sectech.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/UsamaKAL10, author = {Muhammad Usama and Muhammad Khurram Khan and Khaled Alghathbar and Changhoon Lee}, title = {Chaos-based secure satellite imagery cryptosystem}, journal = {Comput. Math. Appl.}, volume = {60}, number = {2}, pages = {326--337}, year = {2010}, url = {https://doi.org/10.1016/j.camwa.2009.12.033}, doi = {10.1016/J.CAMWA.2009.12.033}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/UsamaKAL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/KhanXZ10, author = {Muhammad Khurram Khan and Ling Xie and Jiashu Zhang}, title = {Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals}, journal = {Digit. Signal Process.}, volume = {20}, number = {1}, pages = {179--190}, year = {2010}, url = {https://doi.org/10.1016/j.dsp.2009.05.004}, doi = {10.1016/J.DSP.2009.05.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/KhanXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/KhalilMKA10, author = {Mohammed S. Khalil and Dzulkifli Bin Mohamad and Muhammad Khurram Khan and Qais Al{-}Nuzaili}, title = {Fingerprint verification using statistical descriptors}, journal = {Digit. Signal Process.}, volume = {20}, number = {4}, pages = {1264--1273}, year = {2010}, url = {https://doi.org/10.1016/j.dsp.2009.12.002}, doi = {10.1016/J.DSP.2009.12.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/KhalilMKA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoonKY10, author = {Eun{-}Jun Yoon and Muhammad Khurram Khan and Kee{-}Young Yoo}, title = {Improvement of the Efficient Secret Broadcast Scheme}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {12}, pages = {3396--3399}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.3396}, doi = {10.1587/TRANSINF.E93.D.3396}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoonKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoonKY10a, author = {Eun{-}Jun Yoon and Muhammad Khurram Khan and Kee{-}Young Yoo}, title = {Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {12}, pages = {3400--3402}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.3400}, doi = {10.1587/TRANSINF.E93.D.3400}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoonKY10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccc/RahimKMSK10, author = {Aneel Rahim and Zeeshan Shafi Khan and Fahad Bin Muhaya and Muhammad Sher and Muhammad Khurram Khan}, title = {Information Sharing in Vehicular AdHoc Network}, journal = {Int. J. Comput. Commun. Control}, volume = {5}, number = {5}, pages = {892--899}, year = {2010}, url = {https://doi.org/10.15837/ijccc.2010.5.2252}, doi = {10.15837/IJCCC.2010.5.2252}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijccc/RahimKMSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KhanKJ10, author = {Muhammad Khurram Khan and Mohamed Kamel and Xudong Jiang}, title = {Special issue on: Recent advances and future directions in biometrics personal identification}, journal = {J. Netw. Comput. Appl.}, volume = {33}, number = {3}, pages = {205--206}, year = {2010}, url = {https://doi.org/10.1016/j.jnca.2010.03.019}, doi = {10.1016/J.JNCA.2010.03.019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KhanKJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/HeHFRCLKS10, author = {Mingxing He and Shi{-}Jinn Horng and Pingzhi Fan and Ray{-}Shine Run and Rong{-}Jian Chen and Jui{-}Lin Lai and Muhammad Khurram Khan and Kevin Octavius Sentosa}, title = {Performance evaluation of score level fusion in multimodal biometric systems}, journal = {Pattern Recognit.}, volume = {43}, number = {5}, pages = {1789--1800}, year = {2010}, url = {https://doi.org/10.1016/j.patcog.2009.11.018}, doi = {10.1016/J.PATCOG.2009.11.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pr/HeHFRCLKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KhanA10, author = {Muhammad Khurram Khan and Khaled Alghathbar}, title = {Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'}, journal = {Sensors}, volume = {10}, number = {3}, pages = {2450--2459}, year = {2010}, url = {https://doi.org/10.3390/s100302450}, doi = {10.3390/S100302450}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KhanA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/EldefrawyKAC10, author = {Mohamed Hamdy Eldefrawy and Muhammad Khurram Khan and Khaled Alghathbar and Eun{-}suk Cho}, title = {Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem}, journal = {Sensors}, volume = {10}, number = {9}, pages = {8683--8695}, year = {2010}, url = {https://doi.org/10.3390/s100908683}, doi = {10.3390/S100908683}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/EldefrawyKAC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/RazzakKAY10, author = {Muhammad Imran Razzak and Muhammad Khurram Khan and Khaled Alghathbar and Rubiyah Yousaf}, title = {Face Recognition using Layered Linear Discriminant Analysis and Small Subspace}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {1407--1412}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.252}, doi = {10.1109/CIT.2010.252}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/RazzakKAY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KhanAKAA10, author = {Bilal Khan and Khaled Alghathbar and Muhammad Khurram Khan and Abdullah M. AlKelabi and Abdulaziz Alajaji}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Using Arabic {CAPTCHA} for Cyber Security}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {8--17}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_2}, doi = {10.1007/978-3-642-17610-4\_2}, timestamp = {Sat, 30 Sep 2023 09:41:06 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KhanAKAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/EldefrawyKA10, author = {Mohamed Hamdy Eldefrawy and Muhammad Khurram Khan and Khaled Alghathbar}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {One-Time Password System with Infinite Nested Hash Chains}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {161--170}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_18}, doi = {10.1007/978-3-642-17610-4\_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/EldefrawyKA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/RazzakKA10, author = {Muhammad Imran Razzak and Muhammad Khurram Khan and Khaled Alghathbar}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Contactless Biometrics in Wireless Sensor Network: {A} Survey}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {236--243}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_27}, doi = {10.1007/978-3-642-17610-4\_27}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/RazzakKA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/LengZXKA10, author = {Lu Leng and Jiashu Zhang and Jing Xu and Muhammad Khurram Khan and Khaled Alghathbar}, title = {Dynamic weighted discrimination power analysis in {DCT} domain for face and palmprint recognition}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2010, Jeju, South Korea, 17-19 November 2010}, pages = {467--471}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICTC.2010.5674791}, doi = {10.1109/ICTC.2010.5674791}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/LengZXKA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/RazzakKA10, author = {Muhammad Imran Razzak and Muhammad Khurram Khan and Khaled Alghathbar}, editor = {Isao Echizen and Jeng{-}Shyang Pan and Dieter W. Fellner and Alexander Nouak and Arjan Kuijper and Lakhmi C. Jain}, title = {Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset}, booktitle = {Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings}, pages = {384--388}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IIHMSP.2010.99}, doi = {10.1109/IIHMSP.2010.99}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/RazzakKA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/KhanKMA10, author = {Bilal Khan and Muhammad Khurram Khan and Maqsood Mahmud and Khaled Alghathbar}, editor = {Reijo Savola and Masaru Takesue and Rainer Falk and Manuela Popescu}, title = {Security Analysis of Firewall Rule Sets in Computer Networks}, booktitle = {Fourth International Conference on Emerging Security Information Systems and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010}, pages = {51--56}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SECURWARE.2010.16}, doi = {10.1109/SECURWARE.2010.16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securware/KhanKMA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/KhanA10, author = {Muhammad Khurram Khan and Khaled Alghathbar}, editor = {Tai{-}Hoon Kim and Hojjat Adeli}, title = {Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'}, booktitle = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN} 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6059}, pages = {55--60}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13577-4\_5}, doi = {10.1007/978-3-642-13577-4\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/KhanA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acn/2010, editor = {Chin{-}Chen Chang and Thanos Vasilakos and Purnendu Das and Tai{-}Hoon Kim and Byeong{-}Ho Kang and Muhammad Khurram Khan}, title = {Advanced Communication and Networking - Second International Conference, {ACN} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {77}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13405-0}, doi = {10.1007/978-3-642-13405-0}, isbn = {978-3-642-13404-3}, timestamp = {Tue, 12 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acn/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fgit/2010asea, editor = {Tai{-}Hoon Kim and Haeng{-}Kon Kim and Muhammad Khurram Khan and Kiumi Akingbehin and Wai{-}Chi Fang and Dominik Slezak}, title = {Advances in Software Engineering - International Conference, {ASEA} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {117}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17578-7}, doi = {10.1007/978-3-642-17578-7}, isbn = {978-3-642-17577-0}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/2010asea.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fgit/2010sectech, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4}, doi = {10.1007/978-3-642-17610-4}, isbn = {978-3-642-17609-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/2010sectech.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/AlghamdiUMK09, author = {Abdullah Sharaf Alghamdi and Hanif Ullah and Maqsood Mahmud and Muhammad Khurram Khan}, title = {Bio-chaotic Stream Cipher-Based Iris Image Encryption}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {739--744}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.317}, doi = {10.1109/CSE.2009.317}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cse/AlghamdiUMK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/MahmudKA09, author = {Maqsood Mahmud and Muhammad Khurram Khan and Khaled Alghathbar}, editor = {Dominik Slezak and Tughrul Arslan and Wai{-}Chi Fang and Xiaofeng Song and Tai{-}Hoon Kim}, title = {Biometric-Gaussian-Stream {(BGS)} Cipher with New Aspect of Image Encryption (Data Hiding)}, booktitle = {Bio-Science and Bio-Technology - International Conference, {BSBT} 2009 Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009 Jeju Island, Korea, December 10-12, 2009 Proceedings}, series = {Communications in Computer and Information Science}, volume = {57}, pages = {97--107}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10616-3\_14}, doi = {10.1007/978-3-642-10616-3\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/MahmudKA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/MuhayaUK09, author = {Fahad Bin Muhaya and Muhammad Usama and Muhammad Khurram Khan}, editor = {De{-}Shuang Huang and Kang{-}Hyun Jo and Hong{-}Hee Lee and Hee{-}Jun Kang and Vitoantonio Bevilacqua}, title = {Modified {AES} Using Chaotic Key Generator for Satellite Imagery Encryption}, booktitle = {Emerging Intelligent Computing Technology and Applications, 5th International Conference on Intelligent Computing, {ICIC} 2009, Ulsan, South Korea, September 16-19, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5754}, pages = {1014--1024}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04070-2\_107}, doi = {10.1007/978-3-642-04070-2\_107}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icic/MuhayaUK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Khan09, author = {Muhammad Khurram Khan}, editor = {Yang Xiang and Javier L{\'{o}}pez and Haining Wang and Wanlei Zhou}, title = {Enhancing the Security of a 'More Efficient {\&} Secure Dynamic ID-Based Remote User Authentication Scheme'}, booktitle = {Third International Conference on Network and System Security, {NSS} 2009, Gold Coast, Queensland, Australia, October 19-21, 2009}, pages = {420--424}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NSS.2009.100}, doi = {10.1109/NSS.2009.100}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Khan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/KhanZ08, author = {Muhammad Khurram Khan and Jiashu Zhang}, title = {Multimodal face and fingerprint biometrics authentication on space-limited tokens}, journal = {Neurocomputing}, volume = {71}, number = {13-15}, pages = {3026--3031}, year = {2008}, url = {https://doi.org/10.1016/j.neucom.2007.12.017}, doi = {10.1016/J.NEUCOM.2007.12.017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/KhanZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/KhanZ07, author = {Muhammad Khurram Khan and Jiashu Zhang}, title = {Improving the security of 'a flexible biometrics remote user authentication scheme'}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {82--85}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.01.002}, doi = {10.1016/J.CSI.2006.01.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/KhanZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/WangZZK07, author = {Xiaomin Wang and Wenfang Zhang and Jiashu Zhang and Muhammad Khurram Khan}, title = {Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {507--512}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.005}, doi = {10.1016/J.CSI.2006.11.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/WangZZK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/KhanXZ07, author = {Muhammad Khurram Khan and Ling Xie and Jiashu Zhang}, editor = {Seong{-}Whan Lee and Stan Z. Li}, title = {Robust Hiding of Fingerprint-Biometric Data into Audio Signals}, booktitle = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul, Korea, August 27-29, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4642}, pages = {702--712}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74549-5\_74}, doi = {10.1007/978-3-540-74549-5\_74}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/icb/KhanXZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/KhanZ07, author = {Muhammad Khurram Khan and Jiashu Zhang}, editor = {De{-}Shuang Huang and Laurent Heutte and Marco Loog}, title = {An Intelligent Fingerprint-Biometric Image Scrambling Scheme}, booktitle = {Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, Third International Conference on Intelligent Computing, {ICIC} 2007, Qingdao, China, August 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4682}, pages = {1141--1151}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74205-0\_118}, doi = {10.1007/978-3-540-74205-0\_118}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icic/KhanZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/KhanZ06, author = {Muhammad Khurram Khan and Jiashu Zhang}, title = {Pointing a Finger toward Standardized and Automated Biometrics}, journal = {{IEEE} Multim.}, volume = {13}, number = {4}, pages = {73--75}, year = {2006}, url = {https://doi.org/10.1109/MMUL.2006.90}, doi = {10.1109/MMUL.2006.90}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeemm/KhanZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/JosephBBCDJGGLSIFLKFGGSNPWWSSLYKZ06, author = {Anthony D. Joseph and Alastair R. Beresford and Jean Bacon and David Naveen Cottingham and Jonathan J. Davies and Brian D. Jones and Haitao Guo and Wei Guan and Yong Lin and Houbing Song and Liviu Iftode and Simone Fuchs and Bernhard Lamprecht and Kyandoghere Kyamakya and Jorge Gonz{\'{a}}lez Fern{\'{a}}ndez and Juan Carlos Yelmo Garc{\'{\i}}a and Yod Samuel Mart{\'{\i}}n Garc{\'{\i}}a and Jorge de Gracia Santos and Milind Nimesh and Gang Pan and Zhaohui Wu and Qing Wu and Zhenyu Shan and Jie Sun and Jian Lu and Guoqing Yang and Muhammad Khurram Khan and Jiashu Zhang}, title = {Intelligent Transportation Systems}, journal = {{IEEE} Pervasive Comput.}, volume = {5}, number = {4}, pages = {63--67}, year = {2006}, url = {https://doi.org/10.1109/MPRV.2006.77}, doi = {10.1109/MPRV.2006.77}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/JosephBBCDJGGLSIFLKFGGSNPWWSSLYKZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/KhanZ06, author = {Muhammad Khurram Khan and Jiashu Zhang}, editor = {Jun Wang and Zhang Yi and Jacek M. Zurada and Bao{-}Liang Lu and Hujun Yin}, title = {Enhancing the Transmission Security of Content-Based Hidden Biometric Data}, booktitle = {Advances in Neural Networks - {ISNN} 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3973}, pages = {214--223}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11760191\_32}, doi = {10.1007/11760191\_32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isnn/KhanZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KhanZ06, author = {Muhammad Khurram Khan and Jiashu Zhang}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {260--268}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_24}, doi = {10.1007/11689522\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/KhanZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/KhanZ05, author = {Muhammad Khurram Khan and Jiashu Zhang}, editor = {De{-}Shuang Huang and Xiao{-}Ping (Steven) Zhang and Guang{-}Bin Huang}, title = {Securing Biometric Templates for Reliable Identity Authentication}, booktitle = {Advances in Intelligent Computing, International Conference on Intelligent Computing, {ICIC} 2005, Hefei, China, August 23-26, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3645}, pages = {723--732}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11538356\_75}, doi = {10.1007/11538356\_75}, timestamp = {Thu, 12 Dec 2019 16:43:34 +0100}, biburl = {https://dblp.org/rec/conf/icic/KhanZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sinobiometrics/KhanZT04, author = {Muhammad Khurram Khan and Jiashu Zhang and Lei Tian}, editor = {Stan Z. Li and Jian{-}Huang Lai and Tieniu Tan and Guo{-}Can Feng and Yangsheng Wang}, title = {Protecting Biometric Data for Personal Identification}, booktitle = {Advances in Biometric Person Authentication, 5th Chinese Conference on Biometric Recognition, {SINOBIOMETRICS} 2004, Guangzhou, China, December 13-14, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3338}, pages = {629--638}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30548-4\_72}, doi = {10.1007/978-3-540-30548-4\_72}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/sinobiometrics/KhanZT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.