BibTeX records: Muhammad Khurram Khan

download as .bib file

@article{DBLP:journals/apin/HeY0KN0L24,
  author       = {Junpeng He and
                  Lingfeng Yao and
                  Xiong Li and
                  Muhammad Khurram Khan and
                  Weina Niu and
                  Xiaosong Zhang and
                  Fagen Li},
  title        = {Model-agnostic generation-enhanced technology for few-shot intrusion
                  detection},
  journal      = {Appl. Intell.},
  volume       = {54},
  number       = {4},
  pages        = {3181--3204},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10489-024-05290-8},
  doi          = {10.1007/S10489-024-05290-8},
  timestamp    = {Fri, 12 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/HeY0KN0L24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/AdilKFJAJ24,
  author       = {Muhammad Adil and
                  Muhammad Khurram Khan and
                  Ahmed Farouk and
                  Mian Ahmad Jan and
                  Adnan Anwar and
                  Zhanpeng Jin},
  title        = {AI-Driven {EEC} for Healthcare IoT: Security Challenges and Future
                  Research Directions},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {13},
  number       = {1},
  pages        = {39--47},
  year         = {2024},
  url          = {https://doi.org/10.1109/MCE.2022.3226585},
  doi          = {10.1109/MCE.2022.3226585},
  timestamp    = {Sun, 19 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cem/AdilKFJAJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SethuramanSRRK24,
  author       = {Sibi Chakkaravarthy Sethuraman and
                  Devi Priya V. S and
                  Tarun Reddi and
                  Mulka Sai Tharun Reddy and
                  Muhammad Khurram Khan},
  title        = {A comprehensive examination of email spoofing: Issues and prospects
                  for email security},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103600},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103600},
  doi          = {10.1016/J.COSE.2023.103600},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SethuramanSRRK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/KumarSKKKK24,
  author       = {Sathish Kumar and
                  Velliangiri Sarveshwaran and
                  Periyasami Karthikeyan and
                  Saru Kumari and
                  Sachin Kumar and
                  Muhammad Khurram Khan},
  title        = {A survey on the blockchain techniques for the Internet of Vehicles
                  security},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.4317},
  doi          = {10.1002/ETT.4317},
  timestamp    = {Tue, 16 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/KumarSKKKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/VaroneBDKKGH24,
  author       = {Giuseppe Varone and
                  Wadii Boulila and
                  Maha Driss and
                  Saru Kumari and
                  Muhammad Khurram Khan and
                  Thippa Reddy Gadekallu and
                  Amir Hussain},
  title        = {Finger pinching and imagination classification: {A} fusion of {CNN}
                  architectures for IoMT-enabled {BCI} applications},
  journal      = {Inf. Fusion},
  volume       = {101},
  pages        = {102006},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.inffus.2023.102006},
  doi          = {10.1016/J.INFFUS.2023.102006},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/VaroneBDKKGH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangLLHK24,
  author       = {Ruijin Wang and
                  Jinshan Lai and
                  Xiong Li and
                  Donglin He and
                  Muhammad Khurram Khan},
  title        = {{RPIFL:} Reliable and Privacy-Preserving Federated Learning for the
                  Internet of Things},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {221},
  pages        = {103768},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jnca.2023.103768},
  doi          = {10.1016/J.JNCA.2023.103768},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/WangLLHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AdilSKFJ24,
  author       = {Muhammad Adil and
                  Houbing Song and
                  Muhammad Khurram Khan and
                  Ahmed Farouk and
                  Zhanpeng Jin},
  title        = {5G/6G-enabled metaverse technologies: Taxonomy, applications, and
                  open security challenges with future research directions},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {223},
  pages        = {103828},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jnca.2024.103828},
  doi          = {10.1016/J.JNCA.2024.103828},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AdilSKFJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangZWKF24,
  author       = {Yu Wang and
                  Wenfang Zhang and
                  Xiaomin Wang and
                  Muhammad Khurram Khan and
                  Pingzhi Fan},
  title        = {Security Enhanced Authentication Protocol for Space-Ground Integrated
                  Railway Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {370--385},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2023.3307453},
  doi          = {10.1109/TITS.2023.3307453},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangZWKF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/QinHFKLC24,
  author       = {Hong Qin and
                  Debiao He and
                  Qi Feng and
                  Muhammad Khurram Khan and
                  Min Luo and
                  Kim{-}Kwang Raymond Choo},
  title        = {Cryptographic Primitives in Privacy-Preserving Machine Learning: {A}
                  Survey},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {36},
  number       = {5},
  pages        = {1919--1934},
  year         = {2024},
  url          = {https://doi.org/10.1109/TKDE.2023.3321803},
  doi          = {10.1109/TKDE.2023.3321803},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/QinHFKLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/HuangKWCGHK24,
  author       = {Junqin Huang and
                  Linghe Kong and
                  Jingwei Wang and
                  Guihai Chen and
                  Jianhua Gao and
                  Gang Huang and
                  Muhammad Khurram Khan},
  title        = {Secure Data Sharing over Vehicular Networks Based on Multi-sharding
                  Blockchain},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {20},
  number       = {2},
  pages        = {31:1--31:23},
  year         = {2024},
  url          = {https://doi.org/10.1145/3579035},
  doi          = {10.1145/3579035},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/HuangKWCGHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-11326,
  author       = {Saif Al{-}Dean Qawasmeh and
                  Ali Abdullah S. AlQahtani and
                  Muhammad Khurram Khan},
  title        = {Navigating Cybersecurity Training: {A} Comprehensive Review},
  journal      = {CoRR},
  volume       = {abs/2401.11326},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.11326},
  doi          = {10.48550/ARXIV.2401.11326},
  eprinttype    = {arXiv},
  eprint       = {2401.11326},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-11326.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/air/WuLK23,
  author       = {Tengfei Wu and
                  Lu Leng and
                  Muhammad Khurram Khan},
  title        = {A multi-spectral palmprint fuzzy commitment based on deep hashing
                  code with discriminative bit selection},
  journal      = {Artif. Intell. Rev.},
  volume       = {56},
  number       = {7},
  pages        = {6169--6186},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10462-022-10334-x},
  doi          = {10.1007/S10462-022-10334-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/air/WuLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdata/ChakrabortyK23,
  author       = {Chinmay Chakraborty and
                  Muhammad Khurram Khan},
  title        = {Big Data-Driven Futuristic Fabric System in Societal Digital Transformation},
  journal      = {Big Data},
  volume       = {11},
  number       = {5},
  pages        = {321--322},
  year         = {2023},
  url          = {https://doi.org/10.1089/big.2023.29062.editorial},
  doi          = {10.1089/BIG.2023.29062.EDITORIAL},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bigdata/ChakrabortyK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/KhanKA23,
  author       = {Wazir Zada Khan and
                  Muhammad Khurram Khan and
                  Qurat{-}ul{-}Ain Arshad},
  title        = {Cybersecurity Digital Labels for Connected and Autonomous Vehicles},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {12},
  number       = {1},
  pages        = {87--93},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCE.2021.3119857},
  doi          = {10.1109/MCE.2021.3119857},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cem/KhanKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/GhoshUKRD23,
  author       = {Anay Ghosh and
                  Saiyed Umer and
                  Muhammad Khurram Khan and
                  Ranjeet Kumar Rout and
                  Bibhas Chandra Dhara},
  title        = {Smart sentiment analysis system for pain detection using cutting edge
                  techniques in a smart healthcare framework},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {1},
  pages        = {119--135},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-022-03552-z},
  doi          = {10.1007/S10586-022-03552-Z},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/GhoshUKRD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChatterjeeRAKD23,
  author       = {Uddalak Chatterjee and
                  Sangram Ray and
                  Sharmistha Adhikari and
                  Muhammad Khurram Khan and
                  Mou Dasgupta},
  title        = {An improved authentication and key management scheme in context of
                  IoT-based wireless sensor network using {ECC}},
  journal      = {Comput. Commun.},
  volume       = {209},
  pages        = {47--62},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.06.017},
  doi          = {10.1016/J.COMCOM.2023.06.017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ChatterjeeRAKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangJYWK23,
  author       = {Wenfang Zhang and
                  Heng Jiao and
                  Zhuoqun Yan and
                  Xiaomin Wang and
                  Muhammad Khurram Khan},
  title        = {Security analysis and improvement of a public auditing scheme for
                  secure data storage in fog-to-cloud computing},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103019},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103019},
  doi          = {10.1016/J.COSE.2022.103019},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangJYWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SSK23,
  author       = {Devi Priya V. S and
                  Sibi Chakkaravarthy Sethuraman and
                  Muhammad Khurram Khan},
  title        = {Container security: Precaution levels, mitigation strategies, and
                  research perspectives},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103490},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103490},
  doi          = {10.1016/J.COSE.2023.103490},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/KhanKK23,
  author       = {Suleman Khan and
                  Muhammad Khurram Khan and
                  Rizwan Khan},
  title        = {Harnessing intelligent technologies to curb {COVID-19} pandemic: taxonomy
                  and open challenges},
  journal      = {Computing},
  volume       = {105},
  number       = {4},
  pages        = {811--830},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00607-021-00983-1},
  doi          = {10.1007/S00607-021-00983-1},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/KhanKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/SamsamianHHTK23,
  author       = {Somayeh Samsamian and
                  Aliakbar Hasani and
                  Saqib Hakak and
                  Fatemeh Esmaeilnezhad Tanha and
                  Muhammad Khurram Khan},
  title        = {Comprehensive risk assessment and analysis of blockchain technology
                  implementation using fuzzy cognitive mapping},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {20},
  number       = {3},
  pages        = {977--996},
  year         = {2023},
  url          = {https://doi.org/10.2298/csis220308039s},
  doi          = {10.2298/CSIS220308039S},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/SamsamianHHTK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ChenWLHZZYK23,
  author       = {Xiang Chen and
                  Chunming Wu and
                  Xuan Liu and
                  Qun Huang and
                  Dong Zhang and
                  Haifeng Zhou and
                  Qiang Yang and
                  Muhammad Khurram Khan},
  title        = {Empowering Network Security With Programmable Switches: {A} Comprehensive
                  Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {25},
  number       = {3},
  pages        = {1653--1704},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMST.2023.3265984},
  doi          = {10.1109/COMST.2023.3265984},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/ChenWLHZZYK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/KongTHCWJZKD23,
  author       = {Linghe Kong and
                  Jinlin Tan and
                  Junqin Huang and
                  Guihai Chen and
                  Shuaitian Wang and
                  Xi Jin and
                  Peng Zeng and
                  Muhammad Khurram Khan and
                  Sajal K. Das},
  title        = {Edge-computing-driven Internet of Things: {A} Survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {8},
  pages        = {174:1--174:41},
  year         = {2023},
  url          = {https://doi.org/10.1145/3555308},
  doi          = {10.1145/3555308},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/KongTHCWJZKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ChenZKKKC23,
  author       = {Li Chen and
                  Ke Zhang and
                  Saru Kumari and
                  Muhammad Khurram Khan and
                  Zhiying Kong and
                  Pradeep Chaudhary},
  title        = {An efficient certificateless key exchange protocol for heterogeneous
                  networks in human-centered IoT systems},
  journal      = {Int. J. Commun. Syst.},
  volume       = {36},
  number       = {12},
  year         = {2023},
  url          = {https://doi.org/10.1002/dac.4093},
  doi          = {10.1002/DAC.4093},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ChenZKKKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijimai/YangSK23,
  author       = {Jiachen Yang and
                  Houbing Song and
                  Muhammad Khurram Khan},
  title        = {Editor's Note},
  journal      = {Int. J. Interact. Multim. Artif. Intell.},
  volume       = {8},
  number       = {1},
  pages        = {4},
  year         = {2023},
  url          = {https://doi.org/10.9781/ijimai.2023.02.013},
  doi          = {10.9781/IJIMAI.2023.02.013},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijimai/YangSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenHKLP23,
  author       = {Xin Chen and
                  Debiao He and
                  Muhammad Khurram Khan and
                  Min Luo and
                  Cong Peng},
  title        = {A Secure Certificateless Signcryption Scheme Without Pairing for Internet
                  of Medical Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {10},
  pages        = {9136--9147},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3233180},
  doi          = {10.1109/JIOT.2022.3233180},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenHKLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/CaiLLLGK23,
  author       = {Jiahong Cai and
                  Wei Liang and
                  Xiong Li and
                  Kuan{-}Ching Li and
                  Zhenwen Gui and
                  Muhammad Khurram Khan},
  title        = {GTxChain: {A} Secure IoT Smart Blockchain Architecture Based on Graph
                  Neural Network},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {24},
  pages        = {21502--21514},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3296469},
  doi          = {10.1109/JIOT.2023.3296469},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/CaiLLLGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/BansalCHK23,
  author       = {Gaurang Bansal and
                  Vinay Chamola and
                  Amir Hussain and
                  Muhammad Khurram Khan},
  title        = {Cracking the Anonymous IoT Routing Networks: {A} Deep Learning Approach},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {6},
  number       = {1},
  pages        = {120--126},
  year         = {2023},
  url          = {https://doi.org/10.1109/IOTM.001.2200194},
  doi          = {10.1109/IOTM.001.2200194},
  timestamp    = {Mon, 20 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotm/BansalCHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/BojjaganiSCKK23,
  author       = {Sriramulu Bojjagani and
                  V. N. Sastry and
                  Chien{-}Ming Chen and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {Systematic survey of mobile payments, protocols, and security infrastructure},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {609--654},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-021-03316-4},
  doi          = {10.1007/S12652-021-03316-4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/BojjaganiSCKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdiq/ChakrabortyKKS23,
  author       = {Chinmay Chakraborty and
                  Mohammad Reza Khosravi and
                  Muhammad Khurram Khan and
                  Houbing Herbert Song},
  title        = {Editorial: Multimodality, Multidimensional Representation, and Multimedia
                  Quality Assessment Toward Information Quality in Social Web of Things},
  journal      = {{ACM} J. Data Inf. Qual.},
  volume       = {15},
  number       = {3},
  pages        = {30:1--30:3},
  year         = {2023},
  url          = {https://doi.org/10.1145/3625102},
  doi          = {10.1145/3625102},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdiq/ChakrabortyKKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/KhanSKKKA23,
  author       = {Nauman Khan and
                  Rosli Bin Salleh and
                  Anis Koubaa and
                  Zahid Khan and
                  Muhammad Khurram Khan and
                  Ihsan Ali},
  title        = {Data plane failure and its recovery techniques in {SDN:} {A} systematic
                  literature review},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {35},
  number       = {3},
  pages        = {176--201},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jksuci.2023.02.001},
  doi          = {10.1016/J.JKSUCI.2023.02.001},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/KhanSKKKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/ChatterjeeCIK23,
  author       = {Rajdeep Chatterjee and
                  Ankita Chatterjee and
                  SK Hafizul Islam and
                  Muhammad Khurram Khan},
  title        = {An object detection-based few-shot learning approach for multimedia
                  quality assessment},
  journal      = {Multim. Syst.},
  volume       = {29},
  number       = {5},
  pages        = {2899--2912},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00530-021-00881-8},
  doi          = {10.1007/S00530-021-00881-8},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mms/ChatterjeeCIK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SinghGNK23,
  author       = {Ashish Singh and
                  Adnan Gutub and
                  Anand Nayyar and
                  Muhammad Khurram Khan},
  title        = {Redefining food safety traceability system through blockchain: findings,
                  challenges and open issues},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {14},
  pages        = {21243--21277},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-14006-4},
  doi          = {10.1007/S11042-022-14006-4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SinghGNK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ChatterjeeRAKD23,
  author       = {Uddalak Chatterjee and
                  Sangram Ray and
                  Sharmistha Adhikari and
                  Muhammad Khurram Khan and
                  Mou Dasgupta},
  title        = {Efficient and secure e-voting scheme using elliptic curve cryptography},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.283},
  doi          = {10.1002/SPY2.283},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ChatterjeeRAKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GongLXCX0K23,
  author       = {Yinyan Gong and
                  Kuan{-}Ching Li and
                  Lijun Xiao and
                  Jiahong Cai and
                  Jiahong Xiao and
                  Wei Liang and
                  Muhammad Khurram Khan},
  title        = {{VASERP:} An Adaptive, Lightweight, Secure, and Efficient RFID-Based
                  Authentication Scheme for IoV},
  journal      = {Sensors},
  volume       = {23},
  number       = {11},
  pages        = {5198},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23115198},
  doi          = {10.3390/S23115198},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/GongLXCX0K23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tai/ArshadKAK23,
  author       = {Qurat{-}ul{-}Ain Arshad and
                  Wazir Zada Khan and
                  Faisal Azam and
                  Muhammad Khurram Khan},
  title        = {Deep-Learning-Based {COVID-19} Detection: Challenges and Future Directions},
  journal      = {{IEEE} Trans. Artif. Intell.},
  volume       = {4},
  number       = {2},
  pages        = {210--228},
  year         = {2023},
  url          = {https://doi.org/10.1109/TAI.2022.3224097},
  doi          = {10.1109/TAI.2022.3224097},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tai/ArshadKAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tai/SardarURK23,
  author       = {Alamgir Sardar and
                  Saiyed Umer and
                  Ranjeet Kumar Rout and
                  Muhammad Khurram Khan},
  title        = {A Secure and Efficient Biometric Template Protection Scheme for Palmprint
                  Recognition System},
  journal      = {{IEEE} Trans. Artif. Intell.},
  volume       = {4},
  number       = {5},
  pages        = {1051--1063},
  year         = {2023},
  url          = {https://doi.org/10.1109/TAI.2022.3188596},
  doi          = {10.1109/TAI.2022.3188596},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tai/SardarURK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/Khan23,
  author       = {Muhammad Khurram Khan},
  title        = {AI-enabled transformations in telecommunications industry},
  journal      = {Telecommun. Syst.},
  volume       = {82},
  number       = {1},
  pages        = {1--2},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11235-022-00989-w},
  doi          = {10.1007/S11235-022-00989-W},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/Khan23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLHZZWLK23,
  author       = {Xiang Chen and
                  Hongyan Liu and
                  Qun Huang and
                  Dong Zhang and
                  Haifeng Zhou and
                  Chunming Wu and
                  Xuan Liu and
                  Muhammad Khurram Khan},
  title        = {Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy
                  on Programmable Switches},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {5832--5847},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3315128},
  doi          = {10.1109/TIFS.2023.3315128},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenLHZZWLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/SinghKAK23,
  author       = {Ashish Singh and
                  Abhinav Kumar and
                  Zahid Akhtar and
                  Muhammad Khurram Khan},
  title        = {Guest Editorial: Cybersecurity Intelligence in the Healthcare System},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {1},
  pages        = {809--812},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2022.3202828},
  doi          = {10.1109/TII.2022.3202828},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/SinghKAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/BaoHKLX23,
  author       = {Zijian Bao and
                  Debiao He and
                  Muhammad Khurram Khan and
                  Min Luo and
                  Qi Xie},
  title        = {PBidm: Privacy-Preserving Blockchain-Based Identity Management System
                  for Industrial Internet of Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {2},
  pages        = {1524--1534},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2022.3206798},
  doi          = {10.1109/TII.2022.3206798},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/BaoHKLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tim/ChengLZTWLBK23,
  author       = {Minghao Cheng and
                  Di Li and
                  Nan Zhou and
                  Hao Tang and
                  Ge Wang and
                  Shipeng Li and
                  Uzair Aslam Bhatti and
                  Muhammad Khurram Khan},
  title        = {Vision-Motion Codesign for Low-Level Trajectory Generation in Visual
                  Servoing Systems},
  journal      = {{IEEE} Trans. Instrum. Meas.},
  volume       = {72},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIM.2023.3326234},
  doi          = {10.1109/TIM.2023.3326234},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tim/ChengLZTWLBK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/DuanHLKLLCK23,
  author       = {Yongshuai Duan and
                  Junqin Huang and
                  Jiale Lei and
                  Linghe Kong and
                  Yibin Lv and
                  Zhiliang Lin and
                  Guihai Chen and
                  Muhammad Khurram Khan},
  title        = {AISChain: Blockchain-Based {AIS} Data Platform With Dynamic Bloom
                  Filter Tree},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {2332--2343},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2022.3188691},
  doi          = {10.1109/TITS.2022.3188691},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/DuanHLKLLCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/MahmoodSAGKD23,
  author       = {Khalid Mahmood and
                  Salman Shamshad and
                  Muhammad Faizan Ayub and
                  Zahid Ghaffar and
                  Muhammad Khurram Khan and
                  Ashok Kumar Das},
  title        = {Design of Provably Secure Authentication Protocol for Edge-Centric
                  Maritime Transportation System},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {12},
  pages        = {14536--14545},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2023.3295818},
  doi          = {10.1109/TITS.2023.3295818},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/MahmoodSAGKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiv/LiuHBWKC23,
  author       = {Yulin Liu and
                  Debiao He and
                  Zijian Bao and
                  Huaqun Wang and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic
                  Size for Anonymous Payment in Vehicle-to-Grid Networks},
  journal      = {{IEEE} Trans. Intell. Veh.},
  volume       = {8},
  number       = {4},
  pages        = {2998--3011},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIV.2022.3216949},
  doi          = {10.1109/TIV.2022.3216949},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tiv/LiuHBWKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/GhaffarSMOKK23,
  author       = {Zahid Ghaffar and
                  Salman Shamshad and
                  Khalid Mahmood and
                  Mohammad S. Obaidat and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {A Lightweight and Efficient Remote Data Authentication Protocol Over
                  Cloud Storage Environment},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {103--112},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3205443},
  doi          = {10.1109/TNSE.2022.3205443},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/GhaffarSMOKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/AdilKJASF23,
  author       = {Muhammad Adil and
                  Muhammad Khurram Khan and
                  Muhammad Mohsin Jadoon and
                  Muhammad Attique and
                  Houbing Song and
                  Ahmed Farouk},
  title        = {An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent
                  IoMT Based Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {5},
  pages        = {2719--2730},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3159526},
  doi          = {10.1109/TNSE.2022.3159526},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/AdilKJASF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/DwivediAVK23,
  author       = {Sanjeev Kumar Dwivedi and
                  Ruhul Amin and
                  Satyanarayana Vollala and
                  Muhammad Khurram Khan},
  title        = {{B-HAS:} Blockchain-Assisted Efficient Handover Authentication and
                  Secure Communication Protocol in VANETs},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {6},
  pages        = {3491--3504},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2023.3264829},
  doi          = {10.1109/TNSE.2023.3264829},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/DwivediAVK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhouHKWC23,
  author       = {Xiaotong Zhou and
                  Debiao He and
                  Muhammad Khurram Khan and
                  Wei Wu and
                  Kim{-}Kwang Raymond Choo},
  title        = {An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication
                  Protocol for VANETs},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {1},
  pages        = {81--92},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2022.3204582},
  doi          = {10.1109/TVT.2022.3204582},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhouHKWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icbds/2022,
  editor       = {Yuan Tian and
                  Tinghuai Ma and
                  Qingshan Jiang and
                  Qi Liu and
                  Muhammad Khurram Khan},
  title        = {Big Data and Security - 4th International Conference, {ICBDS} 2022,
                  Xiamen, China, December 8-12, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1796},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-3300-6},
  doi          = {10.1007/978-981-99-3300-6},
  isbn         = {978-981-99-3299-3},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbds/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-16473,
  author       = {Muhammad Adil and
                  Houbing Song and
                  Muhammad Khurram Khan and
                  Ahmed Farouk and
                  Zhanpeng Jin},
  title        = {5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and
                  Open Security Challenges with Future Research Directions},
  journal      = {CoRR},
  volume       = {abs/2305.16473},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.16473},
  doi          = {10.48550/ARXIV.2305.16473},
  eprinttype    = {arXiv},
  eprint       = {2305.16473},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-16473.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-13416,
  author       = {Reem Alrawili and
                  Ali Abdullah S. AlQahtani and
                  Muhammad Khurram Khan},
  title        = {Comprehensive Survey: Biometric User Authentication Application, Evaluation,
                  and Discussion},
  journal      = {CoRR},
  volume       = {abs/2311.13416},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.13416},
  doi          = {10.48550/ARXIV.2311.13416},
  eprinttype    = {arXiv},
  eprint       = {2311.13416},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-13416.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WazidSDSKR22,
  author       = {Mohammad Wazid and
                  Jaskaran Singh and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  Muhammad Khurram Khan and
                  Joel J. P. C. Rodrigues},
  title        = {ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for
                  Internet of Medical Things},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {57990--58004},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3179418},
  doi          = {10.1109/ACCESS.2022.3179418},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WazidSDSKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/GoudarziSAAMKRK22,
  author       = {Shidrokh Goudarzi and
                  Seyed Ahmad Soleymani and
                  Mohammad Hossein Anisi and
                  Mohammad Abdollahi Azgomi and
                  Zeinab Movahedi and
                  Nazri Kama and
                  Hazlifah Mohd Rusli and
                  Muhammad Khurram Khan},
  title        = {A privacy-preserving authentication scheme based on Elliptic Curve
                  Cryptography and using Quotient Filter in fog-enabled {VANET}},
  journal      = {Ad Hoc Networks},
  volume       = {128},
  pages        = {102782},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.adhoc.2022.102782},
  doi          = {10.1016/J.ADHOC.2022.102782},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/GoudarziSAAMKRK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdata/ChakrabortyKA22,
  author       = {Chinmay Chakraborty and
                  Muhammad Khurram Khan and
                  Ishfaq Ahmad},
  title        = {Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System
                  in Societal Digital Transformation: Deadline for Manuscript Submission:
                  March 31, 2022},
  journal      = {Big Data},
  volume       = {10},
  number       = {1},
  pages        = {81--82},
  year         = {2022},
  url          = {https://doi.org/10.1089/big.2021.29045.cfp4},
  doi          = {10.1089/BIG.2021.29045.CFP4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bigdata/ChakrabortyKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/ChatterjeeRKDC22,
  author       = {Uddalak Chatterjee and
                  Sangram Ray and
                  Muhammad Khurram Khan and
                  Mou Dasgupta and
                  Chien{-}Ming Chen},
  title        = {An ECC-based lightweight remote user authentication and key management
                  scheme for IoT communication in context of fog computing},
  journal      = {Computing},
  volume       = {104},
  number       = {6},
  pages        = {1359--1395},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00607-022-01055-8},
  doi          = {10.1007/S00607-022-01055-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/ChatterjeeRKDC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/HussainMKCAC22,
  author       = {Sajid Hussain and
                  Khalid Mahmood and
                  Muhammad Khurram Khan and
                  Chien{-}Ming Chen and
                  Bander A. Alzahrani and
                  Shehzad Ashraf Chaudhry},
  title        = {Designing secure and lightweight user access to drone for smart city
                  surveillance},
  journal      = {Comput. Stand. Interfaces},
  volume       = {80},
  pages        = {103566},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csi.2021.103566},
  doi          = {10.1016/J.CSI.2021.103566},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/HussainMKCAC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/BeraVDLK22,
  author       = {Basudeb Bera and
                  Anusha Vangala and
                  Ashok Kumar Das and
                  Pascal Lorenz and
                  Muhammad Khurram Khan},
  title        = {Private blockchain-envisioned drones-assisted authentication scheme
                  in IoT-enabled agricultural environment},
  journal      = {Comput. Stand. Interfaces},
  volume       = {80},
  pages        = {103567},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csi.2021.103567},
  doi          = {10.1016/J.CSI.2021.103567},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/BeraVDLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/MajumderRSKD22,
  author       = {Suman Majumder and
                  Sangram Ray and
                  Dipanwita Sadhukhan and
                  Muhammad Khurram Khan and
                  Mou Dasgupta},
  title        = {{ESOTP:} ECC-based secure object tracking protocol for IoT communication},
  journal      = {Int. J. Commun. Syst.},
  volume       = {35},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/dac.5026},
  doi          = {10.1002/DAC.5026},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/MajumderRSKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ManzoorSKDK22,
  author       = {Awais Manzoor and
                  Munam Ali Shah and
                  Hasan Ali Khattak and
                  Ikram Ud Din and
                  Muhammad Khurram Khan},
  title        = {Multi-tier authentication schemes for fog computing: Architecture,
                  security perspective, and challenges},
  journal      = {Int. J. Commun. Syst.},
  volume       = {35},
  number       = {12},
  year         = {2022},
  url          = {https://doi.org/10.1002/dac.4033},
  doi          = {10.1002/DAC.4033},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ManzoorSKDK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XenofontosZKJKC22,
  author       = {Christos Xenofontos and
                  Ioannis Zografopoulos and
                  Charalambos Konstantinou and
                  Alireza Jolfaei and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy
                  and Case Studies},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {1},
  pages        = {199--221},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3079916},
  doi          = {10.1109/JIOT.2021.3079916},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/XenofontosZKJKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/PengLWKH22,
  author       = {Cong Peng and
                  Min Luo and
                  Huaqun Wang and
                  Muhammad Khurram Khan and
                  Debiao He},
  title        = {An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional
                  Data in IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {1},
  pages        = {589--600},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3083136},
  doi          = {10.1109/JIOT.2021.3083136},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/PengLWKH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YounusKB22,
  author       = {Muhammad Usman Younus and
                  Muhammad Khurram Khan and
                  Abdul Rauf Bhatti},
  title        = {Improving the Software-Defined Wireless Sensor Networks Routing Performance
                  Using Reinforcement Learning},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {5},
  pages        = {3495--3508},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3102130},
  doi          = {10.1109/JIOT.2021.3102130},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YounusKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SiddiquiGK22,
  author       = {Zeeshan Siddiqui and
                  Jiechao Gao and
                  Muhammad Khurram Khan},
  title        = {An Improved Lightweight {PUF-PKI} Digital Certificate Authentication
                  Scheme for the Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {20},
  pages        = {19744--19756},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3168726},
  doi          = {10.1109/JIOT.2022.3168726},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/SiddiquiGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DongKLT22,
  author       = {Xingbo Dong and
                  Muhammad Khurram Khan and
                  Lu Leng and
                  Andrew Beng Jin Teoh},
  title        = {Co-Learning to Hash Palm Biometrics for Flexible IoT Deployment},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {23},
  pages        = {23786--23794},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3190020},
  doi          = {10.1109/JIOT.2022.3190020},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/DongKLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangJXKH22,
  author       = {Yifan Wang and
                  Xiaoying Jia and
                  Yongbo Xia and
                  Muhammad Khurram Khan and
                  Debiao He},
  title        = {A blockchain-based conditional privacy-preserving authentication scheme
                  for edge computing services},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103334},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103334},
  doi          = {10.1016/J.JISA.2022.103334},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangJXKH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/AdilKJF22,
  author       = {Muhammad Adil and
                  Muhammad Khurram Khan and
                  Mona Jamjoom and
                  Ahmed Farouk},
  title        = {{MHADBOR:} AI-Enabled Administrative-Distance-Based Opportunistic
                  Load Balancing Scheme for an Agriculture Internet of Things Network},
  journal      = {{IEEE} Micro},
  volume       = {42},
  number       = {1},
  pages        = {41--50},
  year         = {2022},
  url          = {https://doi.org/10.1109/MM.2021.3112264},
  doi          = {10.1109/MM.2021.3112264},
  timestamp    = {Fri, 02 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/micro/AdilKJF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KumarPPIK22,
  author       = {Sumit Kumar and
                  Jitesh Pradhan and
                  Arup Kumar Pal and
                  SK Hafizul Islam and
                  Muhammad Khurram Khan},
  title        = {Radiological image retrieval technique using multi-resolution texture
                  and shape features},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {10},
  pages        = {13633--13660},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-021-10525-8},
  doi          = {10.1007/S11042-021-10525-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KumarPPIK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MajhiPPIK22,
  author       = {Mukul Majhi and
                  Arup Kumar Pal and
                  Jitesh Pradhan and
                  SK Hafizul Islam and
                  Muhammad Khurram Khan},
  title        = {Computational intelligence based secure three-party {CBIR} scheme
                  for medical data for cloud-assisted healthcare applications},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {29},
  pages        = {41545--41577},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-020-10483-7},
  doi          = {10.1007/S11042-020-10483-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/MajhiPPIK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/Khan22,
  author       = {Muhammad Khurram Khan},
  title        = {Technology and telecommunications: a panacea in the {COVID-19} crisis},
  journal      = {Telecommun. Syst.},
  volume       = {79},
  number       = {1},
  pages        = {1--2},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11235-022-00880-8},
  doi          = {10.1007/S11235-022-00880-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/Khan22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/RazzakXK22,
  author       = {Imran Razzak and
                  Guandong Xu and
                  Muhammad Khurram Khan},
  title        = {Guest Editorial: Privacy-Preserving Federated Machine Learning Solutions
                  for Enhanced Security of Critical Energy Infrastructures},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {5},
  pages        = {3449--3451},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2021.3128962},
  doi          = {10.1109/TII.2021.3128962},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/RazzakXK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/AnsariMGKCM22,
  author       = {Aman Ahmad Ansari and
                  Bharavi Mishra and
                  Poonam Gera and
                  Muhammad Khurram Khan and
                  Chinmay Chakraborty and
                  Dheerendra Mishra},
  title        = {Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {11},
  pages        = {8316--8325},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2022.3170148},
  doi          = {10.1109/TII.2022.3170148},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/AnsariMGKCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/LiLLKGZ22,
  author       = {Xiong Li and
                  Shanpeng Liu and
                  Rongxing Lu and
                  Muhammad Khurram Khan and
                  Ke Gu and
                  Xiaosong Zhang},
  title        = {An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based
                  Medical Storage System},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {26},
  number       = {5},
  pages        = {2020--2031},
  year         = {2022},
  url          = {https://doi.org/10.1109/JBHI.2022.3140831},
  doi          = {10.1109/JBHI.2022.3140831},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/LiLLKGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangZWGKF22,
  author       = {Yu Wang and
                  Wenfang Zhang and
                  Xiaomin Wang and
                  Wei Guo and
                  Muhammad Khurram Khan and
                  Pingzhi Fan},
  title        = {Improving the Security of {LTE-R} for High-Speed Railway: From the
                  Access Authentication View},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {2},
  pages        = {1332--1346},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2020.3024684},
  doi          = {10.1109/TITS.2020.3024684},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangZWGKF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/DerhabBMKK22,
  author       = {Abdelouahid Derhab and
                  Mohamed Belaoued and
                  Irfan Mohiuddin and
                  Fajri Kurniawan and
                  Muhammad Khurram Khan},
  title        = {Histogram-Based Intrusion Detection and Filtering Framework for Secure
                  and Safe In-Vehicle Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {3},
  pages        = {2366--2379},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2021.3088998},
  doi          = {10.1109/TITS.2021.3088998},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/DerhabBMKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/LeiHKCK22,
  author       = {Jiale Lei and
                  Junqin Huang and
                  Linghe Kong and
                  Guihai Chen and
                  Muhammad Khurram Khan},
  title        = {DeFLoc: Deep Learning Assisted Indoor Vehicle Localization Atop {FM}
                  Fingerprint Map},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {10},
  pages        = {19795--19806},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2022.3163539},
  doi          = {10.1109/TITS.2022.3163539},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/LeiHKCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/BojjaganiRARRK22,
  author       = {Sriramulu Bojjagani and
                  Y. C. A. Padmanabha Reddy and
                  Thati Anuradha and
                  P. V. Venkateswara Rao and
                  B. Ramachandra Reddy and
                  Muhammad Khurram Khan},
  title        = {Secure Authentication and Key Management Protocol for Deployment of
                  Internet of Vehicles (IoV) Concerning Intelligent Transport Systems},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {12},
  pages        = {24698--24713},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2022.3207593},
  doi          = {10.1109/TITS.2022.3207593},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/BojjaganiRARRK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/MeherADK22,
  author       = {Bimal Kumar Meher and
                  Ruhul Amin and
                  Ashok Kumar Das and
                  Muhammad Khurram Khan},
  title        = {{KL-RAP:} An Efficient Key-Less {RFID} Authentication Protocol Based
                  on {ECDLP} for Consumer Warehouse Management System},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {9},
  number       = {5},
  pages        = {3411--3420},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSE.2022.3179830},
  doi          = {10.1109/TNSE.2022.3179830},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/MeherADK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/HuangHCKL22,
  author       = {Jun Huang and
                  Debiao He and
                  Yitao Chen and
                  Muhammad Khurram Khan and
                  Min Luo},
  title        = {A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter
                  Privacy},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {9},
  number       = {5},
  pages        = {3808--3820},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSE.2022.3190909},
  doi          = {10.1109/TNSE.2022.3190909},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/HuangHCKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/BibiAMKD22,
  author       = {Iram Bibi and
                  Adnan Akhunzada and
                  Jahanzaib Malik and
                  Muhammad Khurram Khan and
                  Muhammad Dawood},
  title        = {Secure Distributed Mobile Volunteer Computing with Android},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {1},
  pages        = {2:1--2:21},
  year         = {2022},
  url          = {https://doi.org/10.1145/3428151},
  doi          = {10.1145/3428151},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/BibiAMKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ShamshadRMKO22,
  author       = {Salman Shamshad and
                  Minahil Rana and
                  Khalid Mahmood and
                  Muhammad Khurram Khan and
                  Mohammad S. Obaidat},
  title        = {On the Security of {A} Secure Anonymous Identity-Based Scheme in New
                  Authentication Architecture for Mobile Edge Computing},
  journal      = {Wirel. Pers. Commun.},
  volume       = {124},
  number       = {1},
  pages        = {283--292},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-021-09338-7},
  doi          = {10.1007/S11277-021-09338-7},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ShamshadRMKO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaai/LinLK22,
  author       = {Qizhou Lin and
                  Lu Leng and
                  Muhammad Khurram Khan},
  title        = {Deep Ternary Hashing Code for Palmprint Retrieval and Recognition},
  booktitle    = {2022 The 6th International Conference on Advances in Artificial Intelligence,
                  {ICAAI} 2022, Birmingham, United Kingdom, October 21-23, 2022},
  pages        = {88--93},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3571560.3571573},
  doi          = {10.1145/3571560.3571573},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaai/LinLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsaa/2022,
  editor       = {Joshua Zhexue Huang and
                  Yi Pan and
                  Barbara Hammer and
                  Muhammad Khurram Khan and
                  Xing Xie and
                  Laizhong Cui and
                  Yulin He},
  title        = {9th {IEEE} International Conference on Data Science and Advanced Analytics,
                  {DSAA} 2022, Shenzhen, China, October 13-16, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSAA54385.2022},
  doi          = {10.1109/DSAA54385.2022},
  isbn         = {978-1-6654-7330-9},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsaa/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icbds/2021,
  editor       = {Yuan Tian and
                  Tinghuai Ma and
                  Muhammad Khurram Khan and
                  Victor S. Sheng and
                  Zhaoqing Pan},
  title        = {Big Data and Security - Third International Conference, {ICBDS} 2021,
                  Shenzhen, China, November 26-28, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1563},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-0852-1},
  doi          = {10.1007/978-981-19-0852-1},
  isbn         = {978-981-19-0851-4},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbds/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YounusKAAAJ21,
  author       = {Muhammad Usman Younus and
                  Muhammad Khurram Khan and
                  Muhammad Rizwan Anjum and
                  Sharjeel Afridi and
                  Zulfiqar Ali Arain and
                  Abdul Aleem Jamali},
  title        = {Optimizing the Lifetime of Software Defined Wireless Sensor Network
                  via Reinforcement Learning},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {259--272},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2020.3046693},
  doi          = {10.1109/ACCESS.2020.3046693},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/YounusKAAAJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BhuttaKNAKHSAC21,
  author       = {Muhammad Nasir Mumtaz Bhutta and
                  Amir A. Khwaja and
                  Adnan Nadeem and
                  Hafiz Farooq Ahmad and
                  Muhammad Khurram Khan and
                  Moataz Hanif and
                  Houbing Song and
                  Mohsen A. Rashwan and
                  Yue Cao},
  title        = {A Survey on Blockchain Technology: Evolution, Architecture and Security},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {61048--61073},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3072849},
  doi          = {10.1109/ACCESS.2021.3072849},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BhuttaKNAKHSAC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WuLKK21,
  author       = {Tengfei Wu and
                  Lu Leng and
                  Muhammad Khurram Khan and
                  Farrukh Aslam Khan},
  title        = {Palmprint-Palmvein Fusion Recognition Based on Deep Hashing Network},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {135816--135827},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3112513},
  doi          = {10.1109/ACCESS.2021.3112513},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WuLKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdata/ChakrabortyKA21,
  author       = {Chinmay Chakraborty and
                  Muhammad Khurram Khan and
                  Ishfaq Ahmad},
  title        = {Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System
                  in Societal Digital Transformation: Deadline for Manuscript Submission:
                  December 30, 2021},
  journal      = {Big Data},
  volume       = {9},
  number       = {3},
  pages        = {151--152},
  year         = {2021},
  url          = {https://doi.org/10.1089/big.2021.29045.cfp},
  doi          = {10.1089/BIG.2021.29045.CFP},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bigdata/ChakrabortyKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdata/ChakrabortyKA21a,
  author       = {Chinmay Chakraborty and
                  Muhammad Khurram Khan and
                  Ishfaq Ahmad},
  title        = {Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System
                  in Societal Digital Transformation: Deadline for Manuscript Submission:
                  December 30, 2021},
  journal      = {Big Data},
  volume       = {9},
  number       = {4},
  pages        = {324--325},
  year         = {2021},
  url          = {https://doi.org/10.1089/big.2021.29045.cfp2},
  doi          = {10.1089/BIG.2021.29045.CFP2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bigdata/ChakrabortyKA21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdata/ChakrabortyKA21b,
  author       = {Chinmay Chakraborty and
                  Muhammad Khurram Khan and
                  Ishfaq Ahmad},
  title        = {Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System
                  in Societal Digital Transformation: Deadline for Manuscript Submission:
                  December 30, 2021},
  journal      = {Big Data},
  volume       = {9},
  number       = {5},
  pages        = {402--403},
  year         = {2021},
  url          = {https://doi.org/10.1089/big.2021.29045.cfp3},
  doi          = {10.1089/BIG.2021.29045.CFP3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bigdata/ChakrabortyKA21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/KhanQ21,
  author       = {Muhammad Khurram Khan and
                  Amanullah Quadri},
  title        = {Augmenting Cybersecurity in Autonomous Vehicles: Innovative Recommendations
                  for Aspiring Entrepreneurs},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {10},
  number       = {3},
  pages        = {111--116},
  year         = {2021},
  url          = {https://doi.org/10.1109/MCE.2020.3024513},
  doi          = {10.1109/MCE.2020.3024513},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/KhanQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/BanerjeeBDCKR21,
  author       = {Soumya Banerjee and
                  Basudeb Bera and
                  Ashok Kumar Das and
                  Samiran Chattopadhyay and
                  Muhammad Khurram Khan and
                  Joel J. P. C. Rodrigues},
  title        = {Private blockchain-envisioned multi-authority CP-ABE-based user access
                  control scheme in IIoT},
  journal      = {Comput. Commun.},
  volume       = {169},
  pages        = {99--113},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comcom.2021.01.023},
  doi          = {10.1016/J.COMCOM.2021.01.023},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/BanerjeeBDCKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BeamanBAHK21,
  author       = {Craig Beaman and
                  Ashley Barkworth and
                  Toluwalope David Akande and
                  Saqib Hakak and
                  Muhammad Khurram Khan},
  title        = {Ransomware: Recent advances, analysis, challenges and future research
                  directions},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102490},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102490},
  doi          = {10.1016/J.COSE.2021.102490},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BeamanBAHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/MajhiPIK21,
  author       = {Mukul Majhi and
                  Arup Kumar Pal and
                  SK Hafizul Islam and
                  Muhammad Khurram Khan},
  title        = {Secure content-based image retrieval using modified Euclidean distance
                  for encrypted features},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.4013},
  doi          = {10.1002/ETT.4013},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/MajhiPIK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/RangwaniSRKD21,
  author       = {Diksha Rangwani and
                  Dipanwita Sadhukhan and
                  Sangram Ray and
                  Muhammad Khurram Khan and
                  Mou Dasgupta},
  title        = {An improved privacy preserving remote user authentication scheme for
                  agricultural wireless sensor network},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.4218},
  doi          = {10.1002/ETT.4218},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/RangwaniSRKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/AltafAMKXK21,
  author       = {Izwa Altaf and
                  Muhammad Arslan Akram and
                  Khalid Mahmood and
                  Saru Kumari and
                  Hu Xiong and
                  Muhammad Khurram Khan},
  title        = {A novel authentication and key-agreement scheme for satellite communication
                  network},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {7},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.3894},
  doi          = {10.1002/ETT.3894},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/AltafAMKXK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/XuLKCH21,
  author       = {Zhiyan Xu and
                  Min Luo and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo and
                  Debiao He},
  title        = {Analysis and Improvement of a Certificateless Signature Scheme for
                  Resource-Constrained Scenarios},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {25},
  number       = {4},
  pages        = {1074--1078},
  year         = {2021},
  url          = {https://doi.org/10.1109/LCOMM.2020.3042648},
  doi          = {10.1109/LCOMM.2020.3042648},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/XuLKCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/KumarAKKK21,
  author       = {Vinod Kumar and
                  Musheer Ahmad and
                  Adesh Kumari and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {{SEBAP:} {A} secure and efficient biometric-assisted authentication
                  protocol using {ECC} for vehicular cloud computing},
  journal      = {Int. J. Commun. Syst.},
  volume       = {34},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/dac.4103},
  doi          = {10.1002/DAC.4103},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/KumarAKKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/KarunarathneSK21,
  author       = {Sivanarayani M. Karunarathne and
                  Neetesh Saxena and
                  Muhammad Khurram Khan},
  title        = {Security and Privacy in IoT Smart Healthcare},
  journal      = {{IEEE} Internet Comput.},
  volume       = {25},
  number       = {4},
  pages        = {37--48},
  year         = {2021},
  url          = {https://doi.org/10.1109/MIC.2021.3051675},
  doi          = {10.1109/MIC.2021.3051675},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/KarunarathneSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KhanAHKS21,
  author       = {Wazir Zada Khan and
                  Quratul{-}Ain Arshad and
                  Saqib Hakak and
                  Muhammad Khurram Khan and
                  Saeed Ur Rehman},
  title        = {Trust Management in Social Internet of Things: Architectures, Recent
                  Advancements, and Future Challenges},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {10},
  pages        = {7768--7788},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3039296},
  doi          = {10.1109/JIOT.2020.3039296},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/KhanAHKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SaleemGMDRK21,
  author       = {Muhammad Asad Saleem and
                  Zahid Ghaffar and
                  Khalid Mahmood and
                  Ashok Kumar Das and
                  Joel J. P. C. Rodrigues and
                  Muhammad Khurram Khan},
  title        = {Provably Secure Authentication Protocol for Mobile Clients in IoT
                  Environment Using Puncturable Pseudorandom Function},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {22},
  pages        = {16613--16622},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2021.3075158},
  doi          = {10.1109/JIOT.2021.3075158},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/SaleemGMDRK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KhalidWACAK21,
  author       = {Muhammad Khalid and
                  Kezhi Wang and
                  Nauman Aslam and
                  Yue Cao and
                  Naveed Ahmad and
                  Muhammad Khurram Khan},
  title        = {From smart parking towards autonomous valet parking: {A} survey, challenges
                  and future Works},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {175},
  pages        = {102935},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2020.102935},
  doi          = {10.1016/J.JNCA.2020.102935},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/KhalidWACAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/NerurkarPBLKK21,
  author       = {Pranav Nerurkar and
                  Dhiren R. Patel and
                  Yann Busnel and
                  Romaric Ludinard and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {Dissecting bitcoin blockchain: Empirical analysis of bitcoin network
                  {(2009-2020)}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {177},
  pages        = {102940},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2020.102940},
  doi          = {10.1016/J.JNCA.2020.102940},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/NerurkarPBLKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/KhanSSBAKC21,
  author       = {Muhammad Khurram Khan and
                  Muhammad Shiraz and
                  Qaisar Shaheen and
                  Shariq Aziz Butt and
                  Rizwan Akhtar and
                  Muazzam Ali Khan Khattak and
                  Wang Changda},
  title        = {Hierarchical Routing Protocols for Wireless Sensor Networks: Functional
                  and Performance Analysis},
  journal      = {J. Sensors},
  volume       = {2021},
  pages        = {7459368:1--7459368:18},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/7459368},
  doi          = {10.1155/2021/7459368},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/js/KhanSSBAKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/AftabKKAIR21,
  author       = {Anum Aftab and
                  Farrukh Aslam Khan and
                  Muhammad Khurram Khan and
                  Haider Abbas and
                  Waseem Iqbal and
                  Farhan Riaz},
  title        = {Hand-based multibiometric systems: state-of-the-art and future challenges},
  journal      = {PeerJ Comput. Sci.},
  volume       = {7},
  pages        = {e707},
  year         = {2021},
  url          = {https://doi.org/10.7717/peerj-cs.707},
  doi          = {10.7717/PEERJ-CS.707},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/AftabKKAIR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/RangwaniSRKD21,
  author       = {Diksha Rangwani and
                  Dipanwita Sadhukhan and
                  Sangram Ray and
                  Muhammad Khurram Khan and
                  Mou Dasgupta},
  title        = {A robust provable-secure privacy-preserving authentication protocol
                  for Industrial Internet of Things},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {14},
  number       = {3},
  pages        = {1548--1571},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12083-020-01063-5},
  doi          = {10.1007/S12083-020-01063-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/RangwaniSRKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ChenTWKKK21,
  author       = {Chien{-}Ming Chen and
                  Zhuoyu Tie and
                  Eric Ke Wang and
                  Muhammad Khurram Khan and
                  Sachin Kumar and
                  Saru Kumari},
  title        = {Verifiable dynamic ranked search with forward privacy over encrypted
                  cloud data},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {14},
  number       = {5},
  pages        = {2977--2991},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12083-021-01132-3},
  doi          = {10.1007/S12083-021-01132-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ChenTWKKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/MeiXCYKK21,
  author       = {Qian Mei and
                  Hu Xiong and
                  Jinhao Chen and
                  Minghao Yang and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {Efficient Certificateless Aggregate Signature With Conditional Privacy
                  Preservation in IoV},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {1},
  pages        = {245--256},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.2966526},
  doi          = {10.1109/JSYST.2020.2966526},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/MeiXCYKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ShamshadMKK21,
  author       = {Salman Shamshad and
                  Khalid Mahmood and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {Comments on "Insider Attack Protection: Lightweight Password-Based
                  Authentication Techniques Using ECC"},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {1},
  pages        = {877--880},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.2986377},
  doi          = {10.1109/JSYST.2020.2986377},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ShamshadMKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/MahmoodSKKO21,
  author       = {Khalid Mahmood and
                  Salman Shamshad and
                  Saru Kumari and
                  Muhammad Khurram Khan and
                  Mohammad S. Obaidat},
  title        = {Comment on "Lightweight Secure Message Broadcasting Protocol
                  for Vehicle-to-Vehicle Communication"},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {1},
  pages        = {1366--1368},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.3029895},
  doi          = {10.1109/JSYST.2020.3029895},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/MahmoodSKKO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/HussainCAAK021,
  author       = {Sajid Hussain and
                  Shehzad Ashraf Chaudhry and
                  Osama Ahmad Alomari and
                  Mohammed H. Alsharif and
                  Muhammad Khurram Khan and
                  Neeraj Kumar},
  title        = {Amassing the Security: An ECC-Based Authentication Scheme for Internet
                  of Drones},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {3},
  pages        = {4431--4438},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2021.3057047},
  doi          = {10.1109/JSYST.2021.3057047},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/HussainCAAK021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/Khan21,
  author       = {Muhammad Khurram Khan},
  title        = {Importance of telecommunications in the times of {COVID-19}},
  journal      = {Telecommun. Syst.},
  volume       = {76},
  number       = {1},
  pages        = {1--2},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11235-020-00749-8},
  doi          = {10.1007/S11235-020-00749-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/Khan21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/SrinivasDLKJ21,
  author       = {Jangirala Srinivas and
                  Ashok Kumar Das and
                  Xiong Li and
                  Muhammad Khurram Khan and
                  Minho Jo},
  title        = {Designing Anonymous Signature-Based Authenticated Key Exchange Scheme
                  for Internet of Things-Enabled Smart Grid Systems},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {7},
  pages        = {4425--4436},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3011849},
  doi          = {10.1109/TII.2020.3011849},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/SrinivasDLKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/SadhukhanRBKD21,
  author       = {Dipanwita Sadhukhan and
                  Sangram Ray and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Mou Dasgupta},
  title        = {A lightweight remote user authentication scheme for IoT communication
                  using elliptic curve cryptography},
  journal      = {J. Supercomput.},
  volume       = {77},
  number       = {2},
  pages        = {1114--1151},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11227-020-03318-7},
  doi          = {10.1007/S11227-020-03318-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/SadhukhanRBKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/PengHCKK21,
  author       = {Cong Peng and
                  Debiao He and
                  Jianhua Chen and
                  Neeraj Kumar and
                  Muhammad Khurram Khan},
  title        = {{EPRT:} An Efficient Privacy-Preserving Medical Service Recommendation
                  and Trust Discovery Scheme for eHealth System},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {21},
  number       = {3},
  pages        = {61:1--61:24},
  year         = {2021},
  url          = {https://doi.org/10.1145/3397678},
  doi          = {10.1145/3397678},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/PengHCKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/0036WZKH21,
  author       = {Jing Wang and
                  Libing Wu and
                  Sherali Zeadally and
                  Muhammad Khurram Khan and
                  Debiao He},
  title        = {Privacy-preserving Data Aggregation against Malicious Data Mining
                  Attack for IoT-enabled Smart Grid},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {17},
  number       = {3},
  pages        = {25:1--25:25},
  year         = {2021},
  url          = {https://doi.org/10.1145/3440249},
  doi          = {10.1145/3440249},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/0036WZKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WangZWKF21,
  author       = {Yu Wang and
                  Wenfang Zhang and
                  Xiaomin Wang and
                  Muhammad Khurram Khan and
                  Pingzhi Fan},
  title        = {Efficient Privacy-Preserving Authentication Scheme With Fine-Grained
                  Error Location for Cloud-Based {VANET}},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {10},
  pages        = {10436--10449},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3107524},
  doi          = {10.1109/TVT.2021.3107524},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/WangZWKF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MajumderRSKD21,
  author       = {Suman Majumder and
                  Sangram Ray and
                  Dipanwita Sadhukhan and
                  Muhammad Khurram Khan and
                  Mou Dasgupta},
  title        = {ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application
                  Protocol for Internet of Things},
  journal      = {Wirel. Pers. Commun.},
  volume       = {116},
  number       = {3},
  pages        = {1867--1896},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-020-07769-2},
  doi          = {10.1007/S11277-020-07769-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/MajumderRSKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Toral-CruzHMCK21,
  author       = {Homero Toral{-}Cruz and
                  Debiao He and
                  Albena Dimitrova Mihovska and
                  Kim{-}Kwang Raymond Choo and
                  Muhammad Khurram Khan},
  title        = {Reliable and Secure e-Health Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {117},
  number       = {1},
  pages        = {1--6},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-021-08104-z},
  doi          = {10.1007/S11277-021-08104-Z},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/Toral-CruzHMCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/KumarRDK21,
  author       = {Vivek Kumar and
                  Sangram Ray and
                  Mou Dasgupta and
                  Muhammad Khurram Khan},
  title        = {A Pairing Free Identity Based Two Party Authenticated Key Agreement
                  Protocol Using Hexadecimal Extended {ASCII} Elliptic Curve Cryptography},
  journal      = {Wirel. Pers. Commun.},
  volume       = {118},
  number       = {4},
  pages        = {3045--3061},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-021-08168-x},
  doi          = {10.1007/S11277-021-08168-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/KumarRDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/KhanKAMA21,
  author       = {Wazir Zada Khan and
                  Muhammad Khurram Khan and
                  Qurat{-}ul{-}Ain Arshad and
                  Hafiz Malik and
                  Jalal Al{-}Muhtadi},
  title        = {Digital Labels: Influencing Consumers Trust and Raising Cybersecurity
                  Awareness for Adopting Autonomous Vehicles},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2021,
                  Las Vegas, NV, USA, January 10-12, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCE50685.2021.9427684},
  doi          = {10.1109/ICCE50685.2021.9427684},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccel/KhanKAMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ShuWKYYCWK21,
  author       = {Yuanhe Shu and
                  Jingwei Wang and
                  Linghe Kong and
                  Jiadi Yu and
                  Guisong Yang and
                  Yueping Cai and
                  Zhen Wang and
                  Muhammad Khurram Khan},
  title        = {WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology
                  Communication between {BLE} and WiFi},
  booktitle    = {27th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2021, Beijing, China, December 14-16, 2021},
  pages        = {356--363},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICPADS53394.2021.00050},
  doi          = {10.1109/ICPADS53394.2021.00050},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/ShuWKYYCWK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icbds/2020,
  editor       = {Yuan Tian and
                  Tinghuai Ma and
                  Muhammad Khurram Khan},
  title        = {Big Data and Security - Second International Conference, {ICBDS} 2020,
                  Singapore, Singapore, December 20-22, 2020, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1415},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-3150-4},
  doi          = {10.1007/978-981-16-3150-4},
  isbn         = {978-981-16-3149-8},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbds/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-06612,
  author       = {Christos Xenofontos and
                  Ioannis Zografopoulos and
                  Charalambos Konstantinou and
                  Alireza Jolfaei and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy
                  and Case Studies},
  journal      = {CoRR},
  volume       = {abs/2105.06612},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.06612},
  eprinttype    = {arXiv},
  eprint       = {2105.06612},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-06612.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LimAJK20,
  author       = {Marcus Lim and
                  Azween B. Abdullah and
                  N. Z. Jhanjhi and
                  Muhammad Khurram Khan},
  title        = {Situation-Aware Deep Reinforcement Learning Link Prediction Model
                  for Evolving Criminal Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {16550--16559},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2961805},
  doi          = {10.1109/ACCESS.2019.2961805},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LimAJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BinjubeirAISK20,
  author       = {Mohammed Binjubeir and
                  Abdulghani Ali Ahmed and
                  Mohd Arfian Ismail and
                  Ali Safaa Sadiq and
                  Muhammad Khurram Khan},
  title        = {Comprehensive Survey on Big Data Privacy Protection},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {20067--20079},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2962368},
  doi          = {10.1109/ACCESS.2019.2962368},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/BinjubeirAISK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Al-KhaterAASK20,
  author       = {Wadha Abdullah Al{-}Khater and
                  Somaya Al{-}M{\'{a}}adeed and
                  Abdulghani Ali Ahmed and
                  Ali Safaa Sadiq and
                  Muhammad Khurram Khan},
  title        = {Comprehensive Review of Cybercrime Detection Techniques},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {137293--137311},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3011259},
  doi          = {10.1109/ACCESS.2020.3011259},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Al-KhaterAASK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanSJYGVA20,
  author       = {Muhammad Khurram Khan and
                  Junaid Shuja and
                  Yaser Jararweh and
                  Guanding Yu and
                  Mohsen Guizani and
                  Christos V. Verikoukis and
                  Raja Wasim Ahmad},
  title        = {{IEEE} Access Special Section Editorial: Mobile Edge Computing and
                  Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues
                  of Compute and Network Resources},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {163769--163774},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3019975},
  doi          = {10.1109/ACCESS.2020.3019975},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanSJYGVA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/SoleymaniAANGKK20,
  author       = {Seyed Ahmad Soleymani and
                  Mohammad Hossein Anisi and
                  Abdul Hanan Abdullah and
                  Md. Asri Ngadi and
                  Shidrokh Goudarzi and
                  Muhammad Khurram Khan and
                  Mohd Nazri Kama},
  title        = {An authentication and plausibility model for big data analytic under
                  {LOS} and {NLOS} conditions in 5G-VANET},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {12},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-019-2835-4},
  doi          = {10.1007/S11432-019-2835-4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/SoleymaniAANGKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangCWKK20,
  author       = {Eric Ke Wang and
                  Chien{-}Ming Chen and
                  Fan Wang and
                  Muhammad Khurram Khan and
                  Saru Kumari},
  title        = {Joint-learning segmentation in Internet of drones (IoD)-based monitor
                  systems},
  journal      = {Comput. Commun.},
  volume       = {152},
  pages        = {54--62},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.01.027},
  doi          = {10.1016/J.COMCOM.2020.01.027},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/WangCWKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangSCLKK20,
  author       = {Eric Ke Wang and
                  RuiPei Sun and
                  Chien{-}Ming Chen and
                  Zuodong Liang and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {Proof of X-repute blockchain consensus protocol for IoT systems},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101871},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101871},
  doi          = {10.1016/J.COSE.2020.101871},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangSCLKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShiHLKKC20,
  author       = {Shuyun Shi and
                  Debiao He and
                  Li Li and
                  Neeraj Kumar and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {Applications of blockchain in ensuring the security and privacy of
                  electronic health record systems: {A} survey},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101966},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101966},
  doi          = {10.1016/J.COSE.2020.101966},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ShiHLKKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/ZhaoHWKKX20,
  author       = {Yanan Zhao and
                  Yingzhe Hou and
                  Lili Wang and
                  Saru Kumari and
                  Muhammad Khurram Khan and
                  Hu Xiong},
  title        = {An efficient certificateless aggregate signature scheme for the Internet
                  of Vehicles},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {31},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/ett.3708},
  doi          = {10.1002/ETT.3708},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/ZhaoHWKKX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangLCKK20,
  author       = {Eric Ke Wang and
                  Zuodong Liang and
                  Chien{-}Ming Chen and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {PoRX: {A} reputation incentive scheme for blockchain consensus of
                  IIoT},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {102},
  pages        = {140--151},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.08.005},
  doi          = {10.1016/J.FUTURE.2019.08.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangLCKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ShahjehanRKSKK20,
  author       = {Waleed Shahjehan and
                  Asad Riaz and
                  Imran Khan and
                  Ali Safaa Sadiq and
                  Suleman Khan and
                  Muhammad Khurram Khan},
  title        = {Bat algorithm-based beamforming for mmWave massive {MIMO} systems},
  journal      = {Int. J. Commun. Syst.},
  volume       = {33},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1002/dac.4182},
  doi          = {10.1002/DAC.4182},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ShahjehanRKSKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuHOKKC20,
  author       = {Yang Liu and
                  Debiao He and
                  Mohammad S. Obaidat and
                  Neeraj Kumar and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {Blockchain-based identity management systems: {A} review},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {166},
  pages        = {102731},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jnca.2020.102731},
  doi          = {10.1016/J.JNCA.2020.102731},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiuHOKKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/WaheedSKIKMK20,
  author       = {Abdul Waheed and
                  Munam Ali Shah and
                  Abid Khan and
                  Saif ul Islam and
                  Suleman Khan and
                  Carsten Maple and
                  Muhammad Khurram Khan},
  title        = {Volunteer Computing in Connected Vehicles: Opportunities and Challenges},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {5},
  pages        = {212--218},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.011.1900603},
  doi          = {10.1109/MNET.011.1900603},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/WaheedSKIKMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LiPOWKC20,
  author       = {Xiong Li and
                  Jieyao Peng and
                  Mohammad S. Obaidat and
                  Fan Wu and
                  Muhammad Khurram Khan and
                  Chaoyang Chen},
  title        = {A Secure Three-Factor User Authentication Protocol With Forward Secrecy
                  for Wireless Medical Sensor Network Systems},
  journal      = {{IEEE} Syst. J.},
  volume       = {14},
  number       = {1},
  pages        = {39--50},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSYST.2019.2899580},
  doi          = {10.1109/JSYST.2019.2899580},
  timestamp    = {Thu, 29 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/LiPOWKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/Khan20,
  author       = {Muhammad Khurram Khan},
  title        = {Technological advancements and 2020},
  journal      = {Telecommun. Syst.},
  volume       = {73},
  number       = {1},
  pages        = {1--2},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11235-019-00647-8},
  doi          = {10.1007/S11235-019-00647-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/Khan20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/LiuCLK20,
  author       = {Zhe Liu and
                  Kim{-}Kwang Raymond Choo and
                  Weiqiang Liu and
                  Muhammad Khurram Khan},
  title        = {Guest Editorial: Introduction to the Special Section on Cyber Security
                  Threats and Defense Advance},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {8},
  number       = {2},
  pages        = {264--266},
  year         = {2020},
  url          = {https://doi.org/10.1109/TETC.2020.2995250},
  doi          = {10.1109/TETC.2020.2995250},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/LiuCLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinHHKC20,
  author       = {Chao Lin and
                  Debiao He and
                  Xinyi Huang and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {{DCAP:} {A} Secure and Efficient Decentralized Conditional Anonymous
                  Payment System Based on Blockchain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2440--2452},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2969565},
  doi          = {10.1109/TIFS.2020.2969565},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LinHHKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/KumarAMKK20,
  author       = {Vinod Kumar and
                  Musheer Ahmad and
                  Dheerendra Mishra and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {{RSEAP:} {RFID} based secure and efficient authentication protocol
                  for vehicular cloud computing},
  journal      = {Veh. Commun.},
  volume       = {22},
  pages        = {100213},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.vehcom.2019.100213},
  doi          = {10.1016/J.VEHCOM.2019.100213},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/KumarAMKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icbds/2019,
  editor       = {Yuan Tian and
                  Tinghuai Ma and
                  Muhammad Khurram Khan},
  title        = {Big Data and Security - First International Conference, {ICBDS} 2019,
                  Nanjing, China, December 20-22, 2019, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1210},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-7530-3},
  doi          = {10.1007/978-981-15-7530-3},
  isbn         = {978-981-15-7529-7},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbds/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-00038,
  author       = {Halgurd S. Maghdid and
                  Aras T. Asaad and
                  Kayhan Zrar Ghafoor and
                  Ali Safaa Sadiq and
                  Muhammad Khurram Khan},
  title        = {Diagnosing {COVID-19} Pneumonia from X-Ray and {CT} Images using Deep
                  Learning and Transfer Learning Algorithms},
  journal      = {CoRR},
  volume       = {abs/2004.00038},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.00038},
  eprinttype    = {arXiv},
  eprint       = {2004.00038},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-00038.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DinGHKKAA19,
  author       = {Ikram Ud Din and
                  Mohsen Guizani and
                  Suhaidi Hassan and
                  Byung{-}Seo Kim and
                  Muhammad Khurram Khan and
                  Mohammed Atiquzzaman and
                  Syed Hassan Ahmed},
  title        = {The Internet of Things: {A} Review of Enabled Technologies and Future
                  Challenges},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {7606--7640},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2018.2886601},
  doi          = {10.1109/ACCESS.2018.2886601},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DinGHKKAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GhaniNIKH19,
  author       = {Anwar Ghani and
                  Syed Husnain Abbas Naqvi and
                  Muhammad U. Ilyas and
                  Muhammad Khurram Khan and
                  Ali Hassan},
  title        = {Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks
                  Using Collaborative Communication},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {26558--26570},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2898565},
  doi          = {10.1109/ACCESS.2019.2898565},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GhaniNIKH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DinGKHK19,
  author       = {Ikram Ud Din and
                  Mohsen Guizani and
                  Byung{-}Seo Kim and
                  Suhaidi Hassan and
                  Muhammad Khurram Khan},
  title        = {Trust Management Techniques for the Internet of Things: {A} Survey},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {29763--29787},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2018.2880838},
  doi          = {10.1109/ACCESS.2018.2880838},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DinGKHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KumariCCK19,
  author       = {Saru Kumari and
                  Pradeep Chaudhary and
                  Chien{-}Ming Chen and
                  Muhammad Khurram Khan},
  title        = {Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication
                  and Session key Generation Scheme for Healthcare Applications},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {39717--39720},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2905731},
  doi          = {10.1109/ACCESS.2019.2905731},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KumariCCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangZKKHL19,
  author       = {Mengli Zhang and
                  Gang Zhou and
                  Muhammad Khurram Khan and
                  Saru Kumari and
                  Xuexian Hu and
                  Wenfen Liu},
  title        = {{SPSR-FSPG:} {A} Fast Simulative Password Set Generation Algorithm},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {155107--155119},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2948975},
  doi          = {10.1109/ACCESS.2019.2948975},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangZKKHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LimAJKS19,
  author       = {Marcus Lim and
                  Azween B. Abdullah and
                  N. Z. Jhanjhi and
                  Muhammad Khurram Khan and
                  Mahadevan Supramaniam},
  title        = {Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement
                  Learning Technique},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {184797--184807},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2958873},
  doi          = {10.1109/ACCESS.2019.2958873},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LimAJKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/KhanAKA19,
  author       = {Wazir Zada Khan and
                  Mohammed Y. Aalsalem and
                  Muhammad Khurram Khan and
                  Quratul{-}Ain Arshad},
  title        = {Data and Privacy: Getting Consumers to Trust Products Enabled by the
                  Internet of Things},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {8},
  number       = {2},
  pages        = {35--38},
  year         = {2019},
  url          = {https://doi.org/10.1109/MCE.2018.2880807},
  doi          = {10.1109/MCE.2018.2880807},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cem/KhanAKA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/AbiodunAK19,
  author       = {Akande Sheriff Abiodun and
                  Mohammad Hossein Anisi and
                  Muhammad Khurram Khan},
  title        = {Cloud-Based Wireless Body Area Networks: Managing Data for Better
                  Health Care},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {8},
  number       = {3},
  pages        = {55--59},
  year         = {2019},
  url          = {https://doi.org/10.1109/MCE.2019.2892244},
  doi          = {10.1109/MCE.2019.2892244},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/AbiodunAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/KhattakADK19,
  author       = {Hasan Ali Khattak and
                  Zoobia Ameer and
                  Ikram Ud Din and
                  Muhammad Khurram Khan},
  title        = {Cross-layer design and optimization techniques in wireless multimedia
                  sensor networks for smart cities},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {1--17},
  year         = {2019},
  url          = {https://doi.org/10.2298/CSIS181115004K},
  doi          = {10.2298/CSIS181115004K},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/KhattakADK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AnjumNAAOAK19,
  author       = {Shaik Shabana Anjum and
                  Rafidah Md Noor and
                  Mohammad Hossein Anisi and
                  Ismail Bin Ahmedy and
                  Fazidah Othman and
                  Muhammad Alam and
                  Muhammad Khurram Khan},
  title        = {Energy Management in RFID-Sensor Networks: Taxonomy and Challenges},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {1},
  pages        = {250--266},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2017.2728000},
  doi          = {10.1109/JIOT.2017.2728000},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/AnjumNAAOAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/FengHZKK19,
  author       = {Qi Feng and
                  Debiao He and
                  Sherali Zeadally and
                  Muhammad Khurram Khan and
                  Neeraj Kumar},
  title        = {A survey on privacy protection in blockchain system},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {126},
  pages        = {45--58},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2018.10.020},
  doi          = {10.1016/J.JNCA.2018.10.020},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/FengHZKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YounusIAKK19,
  author       = {Muhammad Usman Younus and
                  Saif ul Islam and
                  Ihsan Ali and
                  Suleman Khan and
                  Muhammad Khurram Khan},
  title        = {A survey on software defined networking enabled smart buildings: Architecture,
                  challenges and use cases},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {137},
  pages        = {62--77},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2019.04.002},
  doi          = {10.1016/J.JNCA.2019.04.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/YounusIAKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AbdallaahmedHGK19,
  author       = {Abdelmuttlib Ibrahim Abdallaahmed and
                  Siti Hafizah Ab Hamid and
                  Abdullah Gani and
                  Suleman Khan and
                  Muhammad Khurram Khan},
  title        = {Trust and reputation for Internet of Things: Fundamentals, taxonomy,
                  and open research challenges},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {145},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2019.102409},
  doi          = {10.1016/J.JNCA.2019.102409},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AbdallaahmedHGK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/KhanAAHAK19,
  author       = {Tanveer Khan and
                  Masoom Alam and
                  Adnan Akhunzada and
                  Ali Hur and
                  Muhammad Asif and
                  Muhammad Khurram Khan},
  title        = {Towards augmented proactive cyberthreat intelligence},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {124},
  pages        = {47--59},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jpdc.2018.10.006},
  doi          = {10.1016/J.JPDC.2018.10.006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/KhanAAHAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KaljahiPAIBK19,
  author       = {Maryam Asadzadeh Kaljahi and
                  Shivakumara Palaiahnakote and
                  Mohammad Hossein Anisi and
                  Mohd Yamani Idna Bin Idris and
                  Michael Blumenstein and
                  Muhammad Khurram Khan},
  title        = {A scene image classification technique for a ubiquitous visual surveillance
                  system},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {5},
  pages        = {5791--5818},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6151-x},
  doi          = {10.1007/S11042-018-6151-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KaljahiPAIBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/MeshramLMK19,
  author       = {Chandrashekhar Meshram and
                  Cheng{-}Chi Lee and
                  Sarita Gajbhiye Meshram and
                  Muhammad Khurram Khan},
  title        = {An identity-based encryption technique using subtree for fuzzy user
                  data sharing under cloud computing environment},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {24},
  pages        = {13127--13138},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-019-03855-1},
  doi          = {10.1007/S00500-019-03855-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/MeshramLMK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/KhanAK19,
  author       = {Wazir Zada Khan and
                  Mohammed Y. Aalsalem and
                  Muhammad Khurram Khan},
  title        = {Communal Acts of IoT Consumers: {A} Potential Threat to Security and
                  Privacy},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {65},
  number       = {1},
  pages        = {64--72},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCE.2018.2880338},
  doi          = {10.1109/TCE.2018.2880338},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tce/KhanAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/KhanDJKGA19,
  author       = {Mudassar Ali Khan and
                  Ikram Ud Din and
                  Sultan Ullah Jadoon and
                  Muhammad Khurram Khan and
                  Mohsen Guizani and
                  Kamran Ahmad Awan},
  title        = {g-RAT {\(\vert\)} {A} Novel Graphical Randomized Authentication Technique
                  for Consumer Smart Devices},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {65},
  number       = {2},
  pages        = {215--223},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCE.2019.2895715},
  doi          = {10.1109/TCE.2019.2895715},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/KhanDJKGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/Khan19,
  author       = {Muhammad Khurram Khan},
  title        = {A new journey in the new year},
  journal      = {Telecommun. Syst.},
  volume       = {70},
  number       = {1},
  pages        = {1},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11235-018-00545-5},
  doi          = {10.1007/S11235-018-00545-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/Khan19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WenKCKMR19,
  author       = {Zhenzao Wen and
                  Linghe Kong and
                  Guihai Chen and
                  Muhammad Khurram Khan and
                  Shahid Mumtaz and
                  Joel J. P. C. Rodrigues},
  title        = {Understanding Multi-Path Routing Algorithms in Datacenter Networks},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013819},
  doi          = {10.1109/GLOBECOM38437.2019.9013819},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WenKCKMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WuKCKMR19,
  author       = {Zucheng Wu and
                  Linghe Kong and
                  Guihai Chen and
                  Muhammad Khurram Khan and
                  Shahid Mumtaz and
                  Joel J. P. C. Rodrigues},
  title        = {CrowdSwitch: Crowdsensing Based Switch between Multiple Cellular Operators
                  in Subways},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013821},
  doi          = {10.1109/GLOBECOM38437.2019.9013821},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WuKCKMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhengWKZGG18,
  author       = {Qiming Zheng and
                  Xiaomin Wang and
                  Muhammad Khurram Khan and
                  Wenfang Zhang and
                  Brij B. Gupta and
                  Wei Guo},
  title        = {A Lightweight Authenticated Encryption Scheme Based on Chaotic {SCML}
                  for Railway Cloud Service},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {711--722},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2017.2775038},
  doi          = {10.1109/ACCESS.2017.2775038},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhengWKZGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZeeshanMNADK18,
  author       = {Muhammad Zeeshan and
                  Muhammad Majid and
                  Imran Fareed Nizami and
                  Syed Muhammad Anwar and
                  Ikram Ud Din and
                  Muhammad Khurram Khan},
  title        = {A Newly Developed Ground Truth Dataset for Visual Saliency in Videos},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {20855--20867},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2826562},
  doi          = {10.1109/ACCESS.2018.2826562},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZeeshanMNADK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LinHHKC18,
  author       = {Chao Lin and
                  Debiao He and
                  Xinyi Huang and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {A New Transitively Closed Undirected Graph Authentication Scheme for
                  Blockchain-Based Identity Management Systems},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {28203--28212},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2837650},
  doi          = {10.1109/ACCESS.2018.2837650},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LinHHKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AhmedISAJKRH18,
  author       = {Ghufran Ahmed and
                  Saif ul Islam and
                  Maham Shahid and
                  Adnan Akhunzada and
                  Sohail Jabbar and
                  Muhammad Khurram Khan and
                  Muhammad Riaz and
                  Kijun Han},
  title        = {Rigorous Analysis and Evaluation of Specific Absorption Rate {(SAR)}
                  for Mobile Multimedia Healthcare},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {29602--29610},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2839909},
  doi          = {10.1109/ACCESS.2018.2839909},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AhmedISAJKRH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SiddiquiTK18,
  author       = {Zeeshan Siddiqui and
                  Omar Tayan and
                  Muhammad Khurram Khan},
  title        = {Security Analysis of Smartphone and Cloud Computing Authentication
                  Frameworks and Protocols},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {34527--34542},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2845299},
  doi          = {10.1109/ACCESS.2018.2845299},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SiddiquiTK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SyedGNNAK18,
  author       = {Hassan Jamil Syed and
                  Abdullah Gani and
                  Fariza Hanum Nasaruddin and
                  Anjum Naveed and
                  Abdelmuttlib Ibrahim Abdallaahmed and
                  Muhammad Khurram Khan},
  title        = {CloudProcMon: {A} Non-Intrusive Cloud Monitoring Framework},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {44591--44606},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2864573},
  doi          = {10.1109/ACCESS.2018.2864573},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SyedGNNAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/MaHKC18,
  author       = {Mimi Ma and
                  Debiao He and
                  Muhammad Khurram Khan and
                  Jianhua Chen},
  title        = {Certificateless searchable public key encryption scheme for mobile
                  healthcare system},
  journal      = {Comput. Electr. Eng.},
  volume       = {65},
  pages        = {413--424},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compeleceng.2017.05.014},
  doi          = {10.1016/J.COMPELECENG.2017.05.014},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/MaHKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ChallaDOKKKV18,
  author       = {Sravani Challa and
                  Ashok Kumar Das and
                  Vanga Odelu and
                  Neeraj Kumar and
                  Saru Kumari and
                  Muhammad Khurram Khan and
                  Athanasios V. Vasilakos},
  title        = {An efficient ECC-based provably secure three-factor user authentication
                  and key agreement protocol for wireless healthcare sensor networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {69},
  pages        = {534--554},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compeleceng.2017.08.003},
  doi          = {10.1016/J.COMPELECENG.2017.08.003},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/ChallaDOKKKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/ChallaWDK18,
  author       = {Sravani Challa and
                  Mohammad Wazid and
                  Ashok Kumar Das and
                  Muhammad Khurram Khan},
  title        = {Authentication Protocols for Implantable Medical Devices: Taxonomy,
                  Analysis and Future Directions},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {7},
  number       = {1},
  pages        = {57--65},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCE.2017.2720193},
  doi          = {10.1109/MCE.2017.2720193},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/ChallaWDK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/DinHKGGH18,
  author       = {Ikram Ud Din and
                  Suhaidi Hassan and
                  Muhammad Khurram Khan and
                  Mohsen Guizani and
                  Osman Ghazali and
                  Adib Habbal},
  title        = {Caching in Information-Centric Networking: Strategies, Challenges,
                  and Future Research Directions},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {20},
  number       = {2},
  pages        = {1443--1474},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMST.2017.2787609},
  doi          = {10.1109/COMST.2017.2787609},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/DinHKGGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/ShujaGKSMMK18,
  author       = {Junaid Shuja and
                  Abdullah Gani and
                  Kwangman Ko and
                  Kyoungyoung So and
                  Saad Mustafa and
                  Sajjad Ahmad Madani and
                  Muhammad Khurram Khan},
  title        = {{SIMDOM:} {A} framework for {SIMD} instruction translation and offloading
                  in heterogeneous mobile architectures},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {29},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1002/ett.3174},
  doi          = {10.1002/ETT.3174},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/ShujaGKSMMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AminIBKK18,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Neeraj Kumar},
  title        = {A robust and anonymous patient monitoring system using wireless medical
                  sensor networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {80},
  pages        = {483--495},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.05.032},
  doi          = {10.1016/J.FUTURE.2016.05.032},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AminIBKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/00020KX0018,
  author       = {Xiong Li and
                  Fan Wu and
                  Muhammad Khurram Khan and
                  Lili Xu and
                  Jian Shen and
                  Minho Jo},
  title        = {A secure chaotic map-based remote authentication scheme for telecare
                  medicine information systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {84},
  pages        = {149--159},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.08.029},
  doi          = {10.1016/J.FUTURE.2017.08.029},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/00020KX0018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/IslamDK18,
  author       = {SK Hafizul Islam and
                  Ashok Kumar Das and
                  Muhammad Khurram Khan},
  title        = {A novel biometric-based password authentication scheme for client-server
                  environment using {ECC} and fuzzy extractor},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {27},
  number       = {2},
  pages        = {138--155},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJAHUC.2015.10001794},
  doi          = {10.1504/IJAHUC.2015.10001794},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/IslamDK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/AnwarMQAAK18,
  author       = {Syed Muhammad Anwar and
                  Muhammad Majid and
                  Adnan Qayyum and
                  Muhammad Awais and
                  Majdi R. Alnowami and
                  Muhammad Khurram Khan},
  title        = {Medical Image Analysis using Convolutional Neural Networks: {A} Review},
  journal      = {J. Medical Syst.},
  volume       = {42},
  number       = {11},
  pages        = {226},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10916-018-1088-1},
  doi          = {10.1007/S10916-018-1088-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/AnwarMQAAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/EmmanuelKAKK18,
  author       = {Naina Emmanuel and
                  Abid Khan and
                  Masoom Alam and
                  Tanveer Khan and
                  Muhammad Khurram Khan},
  title        = {Structures and data preserving homomorphic signatures},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {102},
  pages        = {58--70},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2017.11.005},
  doi          = {10.1016/J.JNCA.2017.11.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/EmmanuelKAKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SaleemKSAK18,
  author       = {Ahsan Saleem and
                  Abid Khan and
                  Furqan Shahid and
                  Masoom Alam and
                  Muhammad Khurram Khan},
  title        = {Recent advancements in garbled computing: How far have we come towards
                  achieving secure, efficient and reusable garbled circuits},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {108},
  pages        = {1--19},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.02.006},
  doi          = {10.1016/J.JNCA.2018.02.006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/SaleemKSAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AalsalemKGKA18,
  author       = {Mohammed Y. Aalsalem and
                  Wazir Zada Khan and
                  Wajeb Gharibi and
                  Muhammad Khurram Khan and
                  Quratul{-}Ain Arshad},
  title        = {Wireless Sensor Networks in oil and gas industry: Recent advances,
                  taxonomy, requirements, and open challenges},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {113},
  pages        = {87--97},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.04.004},
  doi          = {10.1016/J.JNCA.2018.04.004},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AalsalemKGKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/GoudarziHAKS18,
  author       = {Shidrokh Goudarzi and
                  Wan Haslina Hassan and
                  Mohammad Hossein Anisi and
                  Muhammad Khurram Khan and
                  Seyed Ahmad Soleymani},
  title        = {Intelligent Technique for Seamless Vertical Handover in Vehicular
                  Networks},
  journal      = {Mob. Networks Appl.},
  volume       = {23},
  number       = {6},
  pages        = {1462--1477},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11036-017-0979-6},
  doi          = {10.1007/S11036-017-0979-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/GoudarziHAKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZakariahKM18,
  author       = {Mohammed Zakariah and
                  Muhammad Khurram Khan and
                  Hafiz Malik},
  title        = {Digital multimedia audio forensics: past, present and future},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {1},
  pages        = {1009--1040},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-016-4277-2},
  doi          = {10.1007/S11042-016-4277-2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/ZakariahKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KumariDLWKJI18,
  author       = {Saru Kumari and
                  Ashok Kumar Das and
                  Xiong Li and
                  Fan Wu and
                  Muhammad Khurram Khan and
                  Qi Jiang and
                  SK Hafizul Islam},
  title        = {A provably secure biometrics-based authenticated key agreement scheme
                  for multi-server environments},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {2},
  pages        = {2359--2389},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4390-x},
  doi          = {10.1007/S11042-017-4390-X},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KumariDLWKJI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChaudhryNK18,
  author       = {Shehzad Ashraf Chaudhry and
                  Husnain Naqvi and
                  Muhammad Khurram Khan},
  title        = {An enhanced lightweight anonymous biometric based authentication scheme
                  for {TMIS}},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {5},
  pages        = {5503--5524},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4464-9},
  doi          = {10.1007/S11042-017-4464-9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ChaudhryNK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AminIVK018,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  Pandi Vijayakumar and
                  Muhammad Khurram Khan and
                  Victor Chang},
  title        = {A robust and efficient bilinear pairing based mutual authentication
                  and session key verification over insecure communication},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {9},
  pages        = {11041--11066},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4996-z},
  doi          = {10.1007/S11042-017-4996-Z},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/AminIVK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/LiZLKKKNZ18,
  author       = {Shichao Li and
                  Ning Zhang and
                  Siyu Lin and
                  Linghe Kong and
                  Ajay K. Katangur and
                  Muhammad Khurram Khan and
                  Minming Ni and
                  Gang Zhu},
  title        = {Joint Admission Control and Resource Allocation in Edge Computing
                  for Internet of Things},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {1},
  pages        = {72--79},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1700163},
  doi          = {10.1109/MNET.2018.1700163},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/LiZLKKKNZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/He0KW018,
  author       = {Debiao He and
                  Neeraj Kumar and
                  Muhammad Khurram Khan and
                  Lina Wang and
                  Jian Shen},
  title        = {Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing
                  Services},
  journal      = {{IEEE} Syst. J.},
  volume       = {12},
  number       = {2},
  pages        = {1621--1631},
  year         = {2018},
  url          = {https://doi.org/10.1109/JSYST.2016.2633809},
  doi          = {10.1109/JSYST.2016.2633809},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/He0KW018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/DasWKKCP18,
  author       = {Ashok Kumar Das and
                  Mohammad Wazid and
                  Neeraj Kumar and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo and
                  YoungHo Park},
  title        = {Design of Secure and Lightweight Authentication Protocol for Wearable
                  Devices Environment},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {22},
  number       = {4},
  pages        = {1310--1322},
  year         = {2018},
  url          = {https://doi.org/10.1109/JBHI.2017.2753464},
  doi          = {10.1109/JBHI.2017.2753464},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/titb/DasWKKCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KhanCSKK18,
  author       = {Imran Khan and
                  Shehzad Ashraf Chaudhry and
                  Muhammad Sher and
                  Muhammad Khurram Khan},
  title        = {An anonymous and provably secure biometric-based authentication scheme
                  using chaotic maps for accessing medical drop box data},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {8},
  pages        = {3685--3703},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-016-1886-5},
  doi          = {10.1007/S11227-016-1886-5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KhanCSKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/LiCZKRKH18,
  author       = {JiLiang Li and
                  Kim{-}Kwang Raymond Choo and
                  WeiGuo Zhang and
                  Saru Kumari and
                  Joel J. P. C. Rodrigues and
                  Muhammad Khurram Khan and
                  Dieter Hogrefe},
  title        = {{EPA-CPPA:} An efficient, provably-secure and anonymous conditional
                  privacy-preserving authentication scheme for vehicular ad hoc networks},
  journal      = {Veh. Commun.},
  volume       = {13},
  pages        = {104--113},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.vehcom.2018.07.001},
  doi          = {10.1016/J.VEHCOM.2018.07.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/LiCZKRKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/KhanAK18,
  author       = {Wazir Zada Khan and
                  Mohammed Y. Aalsalem and
                  Muhammad Khurram Khan},
  title        = {Five acts of consumer behavior: {A} potential security and privacy
                  threat to Internet of Things},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2018,
                  Las Vegas, NV, USA, January 12-14, 2018},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCE.2018.8326124},
  doi          = {10.1109/ICCE.2018.8326124},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccel/KhanAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/OdeluDKCJ17,
  author       = {Vanga Odelu and
                  Ashok Kumar Das and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo and
                  Minho Jo},
  title        = {Expressive {CP-ABE} Scheme for Mobile Devices in IoT Satisfying Constant-Size
                  Keys and Ciphertexts},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {3273--3283},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2669940},
  doi          = {10.1109/ACCESS.2017.2669940},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/OdeluDKCJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SoleymaniAZAVKG17,
  author       = {Seyed Ahmad Soleymani and
                  Abdul Hanan Abdullah and
                  Mahdi Zareei and
                  Mohammad Hossein Anisi and
                  C{\'{e}}sar Vargas Rosales and
                  Muhammad Khurram Khan and
                  Shidrokh Goudarzi},
  title        = {A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks
                  With Fog Computing},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {15619--15629},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2733225},
  doi          = {10.1109/ACCESS.2017.2733225},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SoleymaniAZAVKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShujaMAMGK17,
  author       = {Junaid Shuja and
                  Saad Mustafa and
                  Raja Wasim Ahmad and
                  Sajjad Ahmad Madani and
                  Abdullah Gani and
                  Muhammad Khurram Khan},
  title        = {Analysis of Vector Code Offloading Framework in Heterogeneous Cloud
                  and Edge Architectures},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {24542--24554},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2713818},
  doi          = {10.1109/ACCESS.2017.2713818},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShujaMAMGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZahraAJWJMK17,
  author       = {Samman Zahra and
                  Masoom Alam and
                  Qaisar Javaid and
                  Abdul Wahid and
                  Nadeem Javaid and
                  Saif Ur Rehman Malik and
                  Muhammad Khurram Khan},
  title        = {Fog Computing Over IoT: {A} Secure Deployment and Formal Verification},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {27132--27144},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2766180},
  doi          = {10.1109/ACCESS.2017.2766180},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZahraAJWJMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/WuXKLKD17,
  author       = {Fan Wu and
                  Lili Xu and
                  Saru Kumari and
                  Xiong Li and
                  Muhammad Khurram Khan and
                  Ashok Kumar Das},
  title        = {An enhanced mutual authentication and key agreement scheme for mobile
                  user roaming service in global mobility networks},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {72},
  number       = {3-4},
  pages        = {131--144},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12243-016-0547-2},
  doi          = {10.1007/S12243-016-0547-2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/WuXKLKD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/TahirKHAKJ17,
  author       = {Mouzna Tahir and
                  Abid Khan and
                  Abdul Hameed and
                  Masoom Alam and
                  Muhammad Khurram Khan and
                  Farhana Jabeen},
  title        = {Towards a set aggregation-based data integrity scheme for smart grids},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {72},
  number       = {9-10},
  pages        = {551--561},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12243-017-0602-7},
  doi          = {10.1007/S12243-017-0602-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/TahirKHAKJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/KhanAKA17,
  author       = {Wazir Zada Khan and
                  Mohammed Y. Aalsalem and
                  Muhammad Khurram Khan and
                  Quratul{-}Ain Arshad},
  title        = {When social objects collaborate: Concepts, processing elements, attacks
                  and challenges},
  journal      = {Comput. Electr. Eng.},
  volume       = {58},
  pages        = {397--411},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.compeleceng.2016.11.014},
  doi          = {10.1016/J.COMPELECENG.2016.11.014},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/KhanAKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/AbiodunAAAK17,
  author       = {Akande Sheriff Abiodun and
                  Mohammad Hossein Anisi and
                  Ihsan Ali and
                  Adnan Akhunzada and
                  Muhammad Khurram Khan},
  title        = {Reducing Power Consumption in Wireless Body Area Networks: {A} Novel
                  Data Segregation and Classification Technique},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {6},
  number       = {4},
  pages        = {38--47},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCE.2017.2715518},
  doi          = {10.1109/MCE.2017.2715518},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/AbiodunAAAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AbdelazizFGKAK17,
  author       = {Ahmed Abdelaziz and
                  Tan Fong Ang and
                  Abdullah Gani and
                  Suleman Khan and
                  Faiz Alotaibi and
                  Muhammad Khurram Khan},
  title        = {On Software-Defined Wireless Network {(SDWN)} Network Virtualization:
                  Challenges and Open Issues},
  journal      = {Comput. J.},
  volume       = {60},
  number       = {10},
  pages        = {1510--1519},
  year         = {2017},
  url          = {https://doi.org/10.1093/comjnl/bxx063},
  doi          = {10.1093/COMJNL/BXX063},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/AbdelazizFGKAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/NazirAMACKZKK17,
  author       = {Anam Nazir and
                  Masoom Alam and
                  Saif Ur Rehman Malik and
                  Adnan Akhunzada and
                  Muhammad Nadeem Cheema and
                  Muhammad Khurram Khan and
                  Yang Ziang and
                  Tanveer Khan and
                  Abid Khan},
  title        = {A high-level domain-specific language for {SIEM} (design, development
                  and formal verification)},
  journal      = {Clust. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2423--2437},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10586-017-0819-2},
  doi          = {10.1007/S10586-017-0819-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/NazirAMACKZKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/KongKWCZ17,
  author       = {Linghe Kong and
                  Muhammad Khurram Khan and
                  Fan Wu and
                  Guihai Chen and
                  Peng Zeng},
  title        = {Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous
                  Vehicles: Overview, Design, and Challenges},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {1},
  pages        = {62--68},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.1600422CM},
  doi          = {10.1109/MCOM.2017.1600422CM},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/KongKWCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/KongRKLRDN17,
  author       = {Linghe Kong and
                  Kui Ren and
                  Muhammad Khurram Khan and
                  Qi Li and
                  Ammar Rayes and
                  M{\'{e}}rouane Debbah and
                  Yuichi Nakamura},
  title        = {Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {3},
  pages        = {60--61},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.7876958},
  doi          = {10.1109/MCOM.2017.7876958},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/KongRKLRDN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/KongRKLRDN17a,
  author       = {Linghe Kong and
                  Kui Ren and
                  Muhammad Khurram Khan and
                  Qi Li and
                  Ammar Rayes and
                  M{\'{e}}rouane Debbah and
                  Yuichi Nakamura},
  title        = {Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {6},
  pages        = {118--119},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.7946931},
  doi          = {10.1109/MCOM.2017.7946931},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/KongRKLRDN17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AkhunzadaK17,
  author       = {Adnan Akhunzada and
                  Muhammad Khurram Khan},
  title        = {Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements,
                  and Open Issues},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {7},
  pages        = {110--118},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.1601158},
  doi          = {10.1109/MCOM.2017.1601158},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AkhunzadaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KhanGWGK17,
  author       = {Suleman Khan and
                  Abdullah Gani and
                  Ainuddin Wahid Abdul Wahab and
                  Mohsen Guizani and
                  Muhammad Khurram Khan},
  title        = {Topology Discovery in Software Defined Networks: Threats, Taxonomy,
                  and State-of-the-Art},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {19},
  number       = {1},
  pages        = {303--324},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMST.2016.2597193},
  doi          = {10.1109/COMST.2016.2597193},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/KhanGWGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/KumariDWL0CK17,
  author       = {Saru Kumari and
                  Ashok Kumar Das and
                  Mohammad Wazid and
                  Xiong Li and
                  Fan Wu and
                  Kim{-}Kwang Raymond Choo and
                  Muhammad Khurram Khan},
  title        = {On the design of a secure user authentication and key agreement scheme
                  for wireless sensor networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {23},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3930},
  doi          = {10.1002/CPE.3930},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/KumariDWL0CK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/OdeluDRKKC17,
  author       = {Vanga Odelu and
                  Ashok Kumar Das and
                  Y. Sreenivasa Rao and
                  Saru Kumari and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {Pairing-based {CP-ABE} with constant-size ciphertexts and secret keys
                  for cloud environment},
  journal      = {Comput. Stand. Interfaces},
  volume       = {54},
  pages        = {3--9},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.csi.2016.05.002},
  doi          = {10.1016/J.CSI.2016.05.002},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/OdeluDRKKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/SookhakYKXB17,
  author       = {Mehdi Sookhak and
                  F. Richard Yu and
                  Muhammad Khurram Khan and
                  Yang Xiang and
                  Rajkumar Buyya},
  title        = {Attribute-based data access control in mobile cloud computing: Taxonomy
                  and open issues},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {72},
  pages        = {273--287},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.08.018},
  doi          = {10.1016/J.FUTURE.2016.08.018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/SookhakYKXB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/IslamFBKO17,
  author       = {SK Hafizul Islam and
                  Mohammad Sabzinejad Farash and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Mohammad S. Obaidat},
  title        = {A pairing-free certificateless digital multisignature scheme using
                  elliptic curve cryptography},
  journal      = {Int. J. Comput. Math.},
  volume       = {94},
  number       = {1},
  pages        = {39--55},
  year         = {2017},
  url          = {https://doi.org/10.1080/00207160.2015.1088148},
  doi          = {10.1080/00207160.2015.1088148},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/IslamFBKO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/MishraKKM17,
  author       = {Dheerendra Mishra and
                  Saru Kumari and
                  Muhammad Khurram Khan and
                  Sourav Mukhopadhyay},
  title        = {An anonymous biometric-based remote user-authenticated key agreement
                  scheme for multimedia systems},
  journal      = {Int. J. Commun. Syst.},
  volume       = {30},
  number       = {1},
  year         = {2017},
  url          = {https://doi.org/10.1002/dac.2946},
  doi          = {10.1002/DAC.2946},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/MishraKKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/FarashCHSKK17,
  author       = {Mohammad Sabzinejad Farash and
                  Shehzad Ashraf Chaudhry and
                  Mohammad Heydari and
                  Seyed Mohammad Sajad Sadough and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {A lightweight anonymous authentication scheme for consumer roaming
                  in ubiquitous networks with provable security},
  journal      = {Int. J. Commun. Syst.},
  volume       = {30},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.1002/dac.3019},
  doi          = {10.1002/DAC.3019},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/FarashCHSKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/LuoZKH17,
  author       = {Min Luo and
                  Yunru Zhang and
                  Muhammad Khurram Khan and
                  Debiao He},
  title        = {An efficient chaos-based 2-party key agreement protocol with provable
                  security},
  journal      = {Int. J. Commun. Syst.},
  volume       = {30},
  number       = {14},
  year         = {2017},
  url          = {https://doi.org/10.1002/dac.3288},
  doi          = {10.1002/DAC.3288},
  timestamp    = {Thu, 10 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/LuoZKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/LuoZKH17a,
  author       = {Min Luo and
                  Yunru Zhang and
                  Muhammad Khurram Khan and
                  Debiao He},
  title        = {A secure and efficient identity-based mutual authentication scheme
                  with smart card using elliptic curve cryptography},
  journal      = {Int. J. Commun. Syst.},
  volume       = {30},
  number       = {16},
  year         = {2017},
  url          = {https://doi.org/10.1002/dac.3333},
  doi          = {10.1002/DAC.3333},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/LuoZKH17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/GoudarziHASSKHZ17,
  author       = {Shidrokh Goudarzi and
                  Wan Haslina Hassan and
                  Mohammad Hossein Anisi and
                  Seyed Ahmad Soleymani and
                  Mehdi Sookhak and
                  Muhammad Khurram Khan and
                  Aisha{-}Hassan A. Hashim and
                  Mahdi Zareei},
  title        = {{ABC-PSO} for vertical handover in heterogeneous wireless networks},
  journal      = {Neurocomputing},
  volume       = {256},
  pages        = {63--81},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.neucom.2016.08.136},
  doi          = {10.1016/J.NEUCOM.2016.08.136},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/GoudarziHASSKHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WazidDKAKV17,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Muhammad Khurram Khan and
                  Abdulatif Al{-}Dhawailie Al{-}Ghaiheb and
                  Neeraj Kumar and
                  Athanasios V. Vasilakos},
  title        = {Secure Authentication Scheme for Medicine Anti-Counterfeiting System
                  in IoT Environment},
  journal      = {{IEEE} Internet Things J.},
  volume       = {4},
  number       = {5},
  pages        = {1634--1646},
  year         = {2017},
  url          = {https://doi.org/10.1109/JIOT.2017.2706752},
  doi          = {10.1109/JIOT.2017.2706752},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WazidDKAKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/MohitAKBK17,
  author       = {Prerna Mohit and
                  Ruhul Amin and
                  Arijit Karati and
                  G. P. Biswas and
                  Muhammad Khurram Khan},
  title        = {A Standard Mutual Authentication Protocol for Cloud Computing Based
                  Health Care System},
  journal      = {J. Medical Syst.},
  volume       = {41},
  number       = {4},
  pages        = {50:1--50:13},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10916-017-0699-2},
  doi          = {10.1007/S10916-017-0699-2},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/MohitAKBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/RehmanLWK17,
  author       = {Muhammad Habib Ur Rehman and
                  Chee Sun Liew and
                  Teh Ying Wah and
                  Muhammad Khurram Khan},
  title        = {Towards next-generation heterogeneous mobile data stream mining applications:
                  Opportunities, challenges, and future research directions},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {79},
  pages        = {1--24},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.11.031},
  doi          = {10.1016/J.JNCA.2016.11.031},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/RehmanLWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AnwarIZZGAKC17,
  author       = {Shahid Anwar and
                  Zakira Inayat and
                  Mohamed Fadli Bin Zolkipli and
                  Jasni Mohamad Zain and
                  Abdullah Gani and
                  Nor Badrul Anuar and
                  Muhammad Khurram Khan and
                  Victor Chang},
  title        = {Cross-VM cache-based side channel attacks and proposed prevention
                  mechanisms: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {93},
  pages        = {259--279},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2017.06.001},
  doi          = {10.1016/J.JNCA.2017.06.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AnwarIZZGAKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KhanSBGK17,
  author       = {Suleman Khan and
                  Muhammad Shiraz and
                  Laleh Boroumand and
                  Abdullah Gani and
                  Muhammad Khurram Khan},
  title        = {Towards port-knocking authentication methods for mobile cloud computing},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {97},
  pages        = {66--78},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2017.08.018},
  doi          = {10.1016/J.JNCA.2017.08.018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/KhanSBGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SyedGAKA17,
  author       = {Hassan Jamil Syed and
                  Abdullah Gani and
                  Raja Wasim Ahmad and
                  Muhammad Khurram Khan and
                  Abdelmuttlib Ibrahim Abdallaahmed},
  title        = {Cloud monitoring: {A} review, taxonomy, and open research issues},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {98},
  pages        = {11--26},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2017.08.021},
  doi          = {10.1016/J.JNCA.2017.08.021},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/SyedGAKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AslamIKAAK17,
  author       = {Sidra Aslam and
                  Saif ul Islam and
                  Abid Khan and
                  Mansoor Ahmed and
                  Adnan Akhunzada and
                  Muhammad Khurram Khan},
  title        = {Information collection centric techniques for cloud resource management:
                  Taxonomy, analysis and challenges},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {100},
  pages        = {80--94},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2017.10.021},
  doi          = {10.1016/J.JNCA.2017.10.021},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AslamIKAAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/WuWHK17,
  author       = {Libing Wu and
                  Jing Wang and
                  Debiao He and
                  Muhammad Khurram Khan},
  title        = {Cryptanalysis of an identity-based public auditing protocol for cloud
                  storage},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {18},
  number       = {12},
  pages        = {1972--1977},
  year         = {2017},
  url          = {https://doi.org/10.1631/FITEE.1601530},
  doi          = {10.1631/FITEE.1601530},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/WuWHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/YousafzaiGNSTSK17,
  author       = {Abdullah Yousafzai and
                  Abdullah Gani and
                  Rafidah Md Noor and
                  Mehdi Sookhak and
                  Hamid Talebian and
                  Muhammad Shiraz and
                  Muhammad Khurram Khan},
  title        = {Cloud resource allocation schemes: review, taxonomy, and opportunities},
  journal      = {Knowl. Inf. Syst.},
  volume       = {50},
  number       = {2},
  pages        = {347--381},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10115-016-0951-y},
  doi          = {10.1007/S10115-016-0951-Y},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/YousafzaiGNSTSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AlamMJKKAJAK17,
  author       = {Masoom Alam and
                  Saif Ur Rehman Malik and
                  Qaisar Javed and
                  Abid Khan and
                  Shamaila Bisma Khan and
                  Adeel Anjum and
                  Nadeem Javed and
                  Adnan Akhunzada and
                  Muhammad Khurram Khan},
  title        = {Formal modeling and verification of security controls for multimedia
                  systems in the cloud},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {21},
  pages        = {22845--22870},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-017-4853-0},
  doi          = {10.1007/S11042-017-4853-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AlamMJKKAJAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/KumariCWLFK17,
  author       = {Saru Kumari and
                  Shehzad Ashraf Chaudhry and
                  Fan Wu and
                  Xiong Li and
                  Mohammad Sabzinejad Farash and
                  Muhammad Khurram Khan},
  title        = {An improved smart card based authentication scheme for session initiation
                  protocol},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {10},
  number       = {1},
  pages        = {92--105},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12083-015-0409-0},
  doi          = {10.1007/S12083-015-0409-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/KumariCWLFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/LiSKWSK17,
  author       = {Xiong Li and
                  Arun Kumar Sangaiah and
                  Saru Kumari and
                  Fan Wu and
                  Jian Shen and
                  Muhammad Khurram Khan},
  title        = {An efficient authentication and key agreement scheme with user anonymity
                  for roaming service in smart city},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {21},
  number       = {5},
  pages        = {791--805},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00779-017-1054-9},
  doi          = {10.1007/S00779-017-1054-9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/LiSKWSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AminIKKGK17,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  Muhammad Khurram Khan and
                  Arijit Karati and
                  Debasis Giri and
                  Saru Kumari},
  title        = {A Two-Factor RSA-Based Robust Authentication System for Multiserver
                  Environments},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {5989151:1--5989151:15},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/5989151},
  doi          = {10.1155/2017/5989151},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/AminIKKGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/AminSGIK17,
  author       = {Ruhul Amin and
                  R. Simon Sherratt and
                  Debasis Giri and
                  SK Hafizul Islam and
                  Muhammad Khurram Khan},
  title        = {A software agent enabled biometric security algorithm for secure file
                  access in consumer storage devices},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {63},
  number       = {1},
  pages        = {53--61},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCE.2017.014735},
  doi          = {10.1109/TCE.2017.014735},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tce/AminSGIK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0001HHKSZ17,
  author       = {Zhe Liu and
                  Xinyi Huang and
                  Zhi Hu and
                  Muhammad Khurram Khan and
                  Hwajeong Seo and
                  Lu Zhou},
  title        = {On Emerging Family of Elliptic Curves to Secure Internet of Things:
                  {ECC} Comes of Age},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {3},
  pages        = {237--248},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2016.2577022},
  doi          = {10.1109/TDSC.2016.2577022},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/0001HHKSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/XuWHK17,
  author       = {Zhiyan Xu and
                  Libing Wu and
                  Debiao He and
                  Muhammad Khurram Khan},
  title        = {Security analysis of a publicly verifiable data possession scheme
                  for remote storage},
  journal      = {J. Supercomput.},
  volume       = {73},
  number       = {11},
  pages        = {4923--4930},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11227-017-2061-3},
  doi          = {10.1007/S11227-017-2061-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/XuWHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/XuWKCH17,
  author       = {Zhiyan Xu and
                  Libing Wu and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo and
                  Debiao He},
  title        = {A secure and efficient public auditing scheme using {RSA} algorithm
                  for cloud storage},
  journal      = {J. Supercomput.},
  volume       = {73},
  number       = {12},
  pages        = {5285--5309},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11227-017-2085-8},
  doi          = {10.1007/S11227-017-2085-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/XuWKCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/TzengHLWHK17,
  author       = {Shiang{-}Feng Tzeng and
                  Shi{-}Jinn Horng and
                  Tianrui Li and
                  Xian Wang and
                  Po{-}Hsian Huang and
                  Muhammad Khurram Khan},
  title        = {Enhancing Security and Privacy for Identity-Based Batch Verification
                  Scheme in VANETs},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {66},
  number       = {4},
  pages        = {3235--3248},
  year         = {2017},
  url          = {https://doi.org/10.1109/TVT.2015.2406877},
  doi          = {10.1109/TVT.2015.2406877},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/TzengHLWHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vtm/SookhakYHTSZKK17,
  author       = {Mehdi Sookhak and
                  F. Richard Yu and
                  Ying He and
                  Hamid Talebian and
                  Nader Sohrabi Safa and
                  Nan Zhao and
                  Muhammad Khurram Khan and
                  Neeraj Kumar},
  title        = {Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular
                  Cloud Computing},
  journal      = {{IEEE} Veh. Technol. Mag.},
  volume       = {12},
  number       = {3},
  pages        = {55--64},
  year         = {2017},
  url          = {https://doi.org/10.1109/MVT.2017.2667499},
  doi          = {10.1109/MVT.2017.2667499},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vtm/SookhakYHTSZKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/LinKGKZJZ17,
  author       = {Siyu Lin and
                  Linghe Kong and
                  Qian Gao and
                  Muhammad Khurram Khan and
                  Zhangdui Zhong and
                  Xi Jin and
                  Peng Zeng},
  title        = {Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G Systems},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {24},
  number       = {5},
  pages        = {74--80},
  year         = {2017},
  url          = {https://doi.org/10.1109/MWC.2017.1700091},
  doi          = {10.1109/MWC.2017.1700091},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/LinKGKZJZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/KaruppiahKLWDKS17,
  author       = {Marimuthu Karuppiah and
                  Saru Kumari and
                  Xiong Li and
                  Fan Wu and
                  Ashok Kumar Das and
                  Muhammad Khurram Khan and
                  R. Saravanan and
                  Sayantani Basu},
  title        = {A Dynamic ID-Based Generic Framework for Anonymous Authentication
                  Scheme for Roaming Service in Global Mobility Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {93},
  number       = {2},
  pages        = {383--407},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-016-3672-3},
  doi          = {10.1007/S11277-016-3672-3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/KaruppiahKLWDKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ShenSKL17,
  author       = {Han Shen and
                  Jian Shen and
                  Muhammad Khurram Khan and
                  Jong{-}Hyouk Lee},
  title        = {Efficient {RFID} Authentication Using Elliptic Curve Cryptography
                  for the Internet of Things},
  journal      = {Wirel. Pers. Commun.},
  volume       = {96},
  number       = {4},
  pages        = {5253--5266},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-016-3739-1},
  doi          = {10.1007/S11277-016-3739-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ShenSKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ChaudhryNMAK17,
  author       = {Shehzad Ashraf Chaudhry and
                  Husnain Naqvi and
                  Khalid Mahmood and
                  Hafiz Farooq Ahmad and
                  Muhammad Khurram Khan},
  title        = {An Improved Remote User Authentication Scheme Using Elliptic Curve
                  Cryptography},
  journal      = {Wirel. Pers. Commun.},
  volume       = {96},
  number       = {4},
  pages        = {5355--5373},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-016-3745-3},
  doi          = {10.1007/S11277-016-3745-3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ChaudhryNMAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/KhanST17,
  author       = {Muhammad Khurram Khan and
                  Zeeshan Siddiqui and
                  Omar Tayan},
  title        = {A secure framework for digital Quran certification},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2017,
                  Las Vegas, NV, USA, January 8-10, 2017},
  pages        = {59--60},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICCE.2017.7889229},
  doi          = {10.1109/ICCE.2017.7889229},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccel/KhanST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icin/AlizadehTSBAZZC17,
  author       = {Mojtaba Alizadeh and
                  Mohammad Hesam Tadayon and
                  Kouichi Sakurai and
                  Sabariah Baharun and
                  Hiroaki Anada and
                  Mazdak Zamani and
                  Akram M. Zeki and
                  Shehzad Ashraf Chaudhry and
                  Muhammad Khurram Khan},
  editor       = {No{\"{e}}l Crespi and
                  Antonio Manzalini and
                  Stefano Secci},
  title        = {Comments and improvements of "HOTA: Handover optimized ticket-based
                  authentication in network-based mobility management"},
  booktitle    = {20th Conference on Innovations in Clouds, Internet and Networks, {ICIN}
                  2017, Paris, France, March 7-9, 2017},
  pages        = {112--116},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICIN.2017.7899399},
  doi          = {10.1109/ICIN.2017.7899399},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icin/AlizadehTSBAZZC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZareeiMARTK16,
  author       = {Mahdi Zareei and
                  Ehab Mahmoud Mohamed and
                  Mohammad Hossein Anisi and
                  C{\'{e}}sar Vargas Rosales and
                  Kazuya Tsukamoto and
                  Muhammad Khurram Khan},
  title        = {On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc Network},
  journal      = {{IEEE} Access},
  volume       = {4},
  pages        = {8294--8302},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACCESS.2016.2626721},
  doi          = {10.1109/ACCESS.2016.2626721},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZareeiMARTK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanGWIAMASAKKK16,
  author       = {Suleman Khan and
                  Abdullah Gani and
                  Ainuddin Wahid Abdul Wahab and
                  Salman Iqbal and
                  Ahmed Abdelaziz and
                  Omar Adil Mahdi and
                  Abdelmuttlib Ibrahim Abdallaahmed and
                  Muhammad Shiraz and
                  Yusor Rafid Bahar Al{-}Mayouf and
                  Ziar Khan and
                  Kwangman Ko and
                  Muhammad Khurram Khan and
                  Victor Chang},
  title        = {Towards an Applicability of Current Network Forensics for Cloud Networks:
                  {A} {SWOT} Analysis},
  journal      = {{IEEE} Access},
  volume       = {4},
  pages        = {9800--9820},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACCESS.2016.2631543},
  doi          = {10.1109/ACCESS.2016.2631543},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanGWIAMASAKKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AminIBKLK16,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Lu Leng and
                  Neeraj Kumar},
  title        = {Design of an anonymity-preserving three-factor authenticated key exchange
                  protocol for wireless sensor networks},
  journal      = {Comput. Networks},
  volume       = {101},
  pages        = {42--62},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.01.006},
  doi          = {10.1016/J.COMNET.2016.01.006},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AminIBKLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/KumariLWDAK16,
  author       = {Saru Kumari and
                  Xiong Li and
                  Fan Wu and
                  Ashok Kumar Das and
                  Hamed Arshad and
                  Muhammad Khurram Khan},
  title        = {A user friendly mutual authentication and key agreement scheme for
                  wireless sensor networks using chaotic maps},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {63},
  pages        = {56--75},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2016.04.016},
  doi          = {10.1016/J.FUTURE.2016.04.016},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/KumariLWDAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/HeWKW16,
  author       = {Debiao He and
                  Huaqun Wang and
                  Muhammad Khurram Khan and
                  Lina Wang},
  title        = {Lightweight anonymous key distribution scheme for smart grid using
                  elliptic curve cryptography},
  journal      = {{IET} Commun.},
  volume       = {10},
  number       = {14},
  pages        = {1795--1802},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-com.2016.0091},
  doi          = {10.1049/IET-COM.2016.0091},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/HeWKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/KumariKLW16,
  author       = {Saru Kumari and
                  Muhammad Khurram Khan and
                  Xiong Li and
                  Fan Wu},
  title        = {Design of a user anonymous password authentication scheme without
                  smart card},
  journal      = {Int. J. Commun. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {441--458},
  year         = {2016},
  url          = {https://doi.org/10.1002/dac.2853},
  doi          = {10.1002/DAC.2853},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/KumariKLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/IslamK16,
  author       = {SK Hafizul Islam and
                  Muhammad Khurram Khan},
  title        = {Provably secure and pairing-free identity-based handover authentication
                  protocol for wireless mobile networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {29},
  number       = {17},
  pages        = {2442--2456},
  year         = {2016},
  url          = {https://doi.org/10.1002/dac.2847},
  doi          = {10.1002/DAC.2847},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/IslamK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/KumariL0DOK16,
  author       = {Saru Kumari and
                  Xiong Li and
                  Fan Wu and
                  Ashok Kumar Das and
                  Vanga Odelu and
                  Muhammad Khurram Khan},
  title        = {A User Anonymous Mutual Authentication Protocol},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {10},
  number       = {9},
  pages        = {4508--4528},
  year         = {2016},
  url          = {https://doi.org/10.3837/tiis.2016.09.026},
  doi          = {10.3837/TIIS.2016.09.026},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/KumariL0DOK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/FarashNMCK16,
  author       = {Mohammad Sabzinejad Farash and
                  Omer Nawaz and
                  Khalid Mahmood and
                  Shehzad Ashraf Chaudhry and
                  Muhammad Khurram Khan},
  title        = {A Provably Secure {RFID} Authentication Protocol Based on Elliptic
                  Curve for Healthcare Environments},
  journal      = {J. Medical Syst.},
  volume       = {40},
  number       = {7},
  pages        = {165:1--165:7},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10916-016-0521-6},
  doi          = {10.1007/S10916-016-0521-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/FarashNMCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/ChaudhryKKS16,
  author       = {Shehzad Ashraf Chaudhry and
                  Muhammad Tawab Khan and
                  Muhammad Khurram Khan and
                  Taeshik Shon},
  title        = {A Multiserver Biometric Authentication Scheme for {TMIS} using Elliptic
                  Curve Cryptography},
  journal      = {J. Medical Syst.},
  volume       = {40},
  number       = {11},
  pages        = {230:1--230:13},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10916-016-0592-4},
  doi          = {10.1007/S10916-016-0592-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/ChaudhryKKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AkhunzadaGAAKHK16,
  author       = {Adnan Akhunzada and
                  Abdullah Gani and
                  Nor Badrul Anuar and
                  Ahmed Abdelaziz and
                  Muhammad Khurram Khan and
                  Amir Hayat and
                  Samee U. Khan},
  title        = {Secure and dependable software defined networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {61},
  pages        = {199--221},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2015.11.012},
  doi          = {10.1016/J.JNCA.2015.11.012},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AkhunzadaGAAKHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/InayatGAKA16,
  author       = {Zakira Inayat and
                  Abdullah Gani and
                  Nor Badrul Anuar and
                  Muhammad Khurram Khan and
                  Shahid Anwar},
  title        = {Intrusion response systems: Foundations, design, and challenges},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {62},
  pages        = {53--74},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2015.12.006},
  doi          = {10.1016/J.JNCA.2015.12.006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/InayatGAKA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/IqbalKDHKKC16,
  author       = {Salman Iqbal and
                  Miss Laiha Mat Kiah and
                  Babak Dhaghighi and
                  Muzammil Hussain and
                  Suleman Khan and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {On cloud security attacks: {A} taxonomy and intrusion detection and
                  prevention as a service},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {74},
  pages        = {98--120},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.08.016},
  doi          = {10.1016/J.JNCA.2016.08.016},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/IqbalKDHKKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ShujaGRAMKK16,
  author       = {Junaid Shuja and
                  Abdullah Gani and
                  Muhammad Habib Ur Rehman and
                  Ejaz Ahmed and
                  Sajjad Ahmad Madani and
                  Muhammad Khurram Khan and
                  Kwangman Ko},
  title        = {Towards native code offloading based {MCC} frameworks for multimedia
                  applications: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {75},
  pages        = {335--354},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.08.021},
  doi          = {10.1016/J.JNCA.2016.08.021},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ShujaGRAMKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/KarimSKSC16,
  author       = {Ahmad Karim and
                  Rosli Salleh and
                  Muhammad Khurram Khan and
                  Aisha Siddiqa and
                  Kim{-}Kwang Raymond Choo},
  title        = {On the Analysis and Detection of Mobile Botnet Applications},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {22},
  number       = {4},
  pages        = {567--588},
  year         = {2016},
  url          = {http://www.jucs.org/jucs\_22\_4/on\_the\_analysis\_and},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/KarimSKSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/WanKQZ16,
  author       = {Jiafu Wan and
                  Muhammad Khurram Khan and
                  Meikang Qiu and
                  Daqiang Zhang},
  title        = {Cloud-assisted Industrial Systems and Applications},
  journal      = {Mob. Networks Appl.},
  volume       = {21},
  number       = {5},
  pages        = {822--824},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11036-016-0744-2},
  doi          = {10.1007/S11036-016-0744-2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/WanKQZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KumariKL16,
  author       = {Saru Kumari and
                  Muhammad Khurram Khan and
                  Xiong Li},
  title        = {A more secure digital rights management authentication scheme based
                  on smart card},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {2},
  pages        = {1135--1158},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-014-2361-z},
  doi          = {10.1007/S11042-014-2361-Z},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KumariKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KumariWLFJKD16,
  author       = {Saru Kumari and
                  Fan Wu and
                  Xiong Li and
                  Mohammad Sabzinejad Farash and
                  Qi Jiang and
                  Muhammad Khurram Khan and
                  Ashok Kumar Das},
  title        = {Single round-trip {SIP} authentication scheme with provable security
                  for Voice over Internet Protocol using smart card},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {24},
  pages        = {17215--17245},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2988-4},
  doi          = {10.1007/S11042-015-2988-4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KumariWLFJKD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/KhanGWAKKG16,
  author       = {Suleman Khan and
                  Abdullah Gani and
                  Ainuddin Wahid Abdul Wahab and
                  Ahmed Abdelaziz and
                  Kwangman Ko and
                  Muhammad Khurram Khan and
                  Mohsen Guizani},
  title        = {Software-Defined Network Forensics: Motivation, Potential Locations,
                  Requirements, and Challenges},
  journal      = {{IEEE} Netw.},
  volume       = {30},
  number       = {6},
  pages        = {6--13},
  year         = {2016},
  url          = {https://doi.org/10.1109/MNET.2016.1600051NM},
  doi          = {10.1109/MNET.2016.1600051NM},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/KhanGWAKKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/SiddiquiAKA16,
  author       = {Zeeshan Siddiqui and
                  Abdul Hanan Abdullah and
                  Muhammad Khurram Khan and
                  Abdullah Sharaf Alghamdi},
  title        = {Cryptanalysis and improvement of 'a secure authentication scheme for
                  telecare medical information system' with nonce verification},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {9},
  number       = {5},
  pages        = {841--853},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12083-015-0364-9},
  doi          = {10.1007/S12083-015-0364-9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/SiddiquiAKA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiNKLZ16,
  author       = {Xiong Li and
                  Jianwei Niu and
                  Muhammad Khurram Khan and
                  Junguo Liao and
                  Xiaoke Zhao},
  title        = {Robust three-factor remote user authentication scheme with key agreement
                  for multimedia systems},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {13},
  pages        = {1916--1927},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.961},
  doi          = {10.1002/SEC.961},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiNKLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiNKLLK16,
  author       = {Xiong Li and
                  Jianwei Niu and
                  Saru Kumari and
                  Junguo Liao and
                  Wei Liang and
                  Muhammad Khurram Khan},
  title        = {A new authentication protocol for healthcare applications using wireless
                  medical sensor networks with user anonymity},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {15},
  pages        = {2643--2655},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1214},
  doi          = {10.1002/SEC.1214},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiNKLLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/IslamDK16,
  author       = {SK Hafizul Islam and
                  Ashok Kumar Das and
                  Muhammad Khurram Khan},
  title        = {Design of a provably secure identity-based digital multi-signature
                  scheme using biometrics and fuzzy extractor},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3229--3238},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1528},
  doi          = {10.1002/SEC.1528},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/IslamDK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuXKLDKKB16,
  author       = {Fan Wu and
                  Lili Xu and
                  Saru Kumari and
                  Xiong Li and
                  Ashok Kumar Das and
                  Muhammad Khurram Khan and
                  Marimuthu Karuppiah and
                  Renuka Baliyan},
  title        = {A novel and provably secure authentication and key agreement scheme
                  with user anonymity for global mobility networks},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3527--3542},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1558},
  doi          = {10.1002/SEC.1558},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WuXKLDKKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WazidDKK16,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {Design of sinkhole node detection mechanism for hierarchical wireless
                  sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {17},
  pages        = {4596--4614},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1652},
  doi          = {10.1002/SEC.1652},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WazidDKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaitraIAGKK16,
  author       = {Tanmoy Maitra and
                  SK Hafizul Islam and
                  Ruhul Amin and
                  Debasis Giri and
                  Muhammad Khurram Khan and
                  Neeraj Kumar},
  title        = {An enhanced multi-server authentication protocol using password and
                  smart-card: cryptanalysis and design},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {17},
  pages        = {4615--4638},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1653},
  doi          = {10.1002/SEC.1653},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MaitraIAGKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AminIBGKK16,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Debasis Giri and
                  Muhammad Khurram Khan and
                  Neeraj Kumar},
  title        = {A more secure and privacy-aware anonymous user authentication scheme
                  for distributed mobile cloud computing environments},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {17},
  pages        = {4650--4666},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1655},
  doi          = {10.1002/SEC.1655},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/AminIBGKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChaudhryKIAKA16,
  author       = {Shehzad Ashraf Chaudhry and
                  Imran Khan and
                  Azeem Irshad and
                  Muhammad Usman Ashraf and
                  Muhammad Khurram Khan and
                  Hafiz Farooq Ahmad},
  title        = {A provably secure anonymous authentication scheme for Session Initiation
                  Protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {5016--5027},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1672},
  doi          = {10.1002/SEC.1672},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ChaudhryKIAKA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/0001KLMH16,
  author       = {Qi Jiang and
                  Muhammad Khurram Khan and
                  Xiang Lu and
                  Jianfeng Ma and
                  Debiao He},
  title        = {A privacy preserving three-factor authentication protocol for e-Health
                  clouds},
  journal      = {J. Supercomput.},
  volume       = {72},
  number       = {10},
  pages        = {3826--3849},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11227-015-1610-x},
  doi          = {10.1007/S11227-015-1610-X},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/0001KLMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiNKIWKD16,
  author       = {Xiong Li and
                  Jianwei Niu and
                  Saru Kumari and
                  SK Hafizul Islam and
                  Fan Wu and
                  Muhammad Khurram Khan and
                  Ashok Kumar Das},
  title        = {A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol
                  for Multi-server Environments with Provable Security},
  journal      = {Wirel. Pers. Commun.},
  volume       = {89},
  number       = {2},
  pages        = {569--597},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11277-016-3293-x},
  doi          = {10.1007/S11277-016-3293-X},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LiNKIWKD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/CaoLKWK16,
  author       = {Yifeng Cao and
                  Xiao{-}Yang Liu and
                  Linghe Kong and
                  Min{-}You Wu and
                  Muhammad Khurram Khan},
  title        = {{EHR:} Routing Protocol for Energy Harvesting Wireless Sensor Networks},
  booktitle    = {22nd {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2016, Wuhan, China, December 13-16, 2016},
  pages        = {56--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICPADS.2016.0017},
  doi          = {10.1109/ICPADS.2016.0017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/CaoLKWK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FayedK16a,
  author       = {Mahmoud Samir Fayed and
                  Muhammad Khurram Khan},
  title        = {SNKnock: {A} free security tool for Facebook users},
  journal      = {CoRR},
  volume       = {abs/1612.05923},
  year         = {2016},
  url          = {http://arxiv.org/abs/1612.05923},
  eprinttype    = {arXiv},
  eprint       = {1612.05923},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FayedK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/KumariKA15,
  author       = {Saru Kumari and
                  Muhammad Khurram Khan and
                  Mohammed Atiquzzaman},
  title        = {User authentication schemes for wireless sensor networks: {A} review},
  journal      = {Ad Hoc Networks},
  volume       = {27},
  pages        = {159--194},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2014.11.018},
  doi          = {10.1016/J.ADHOC.2014.11.018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/KumariKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/HalboobAKKP15,
  author       = {Waleed Halboob and
                  Haider Abbas and
                  Muhammad Khurram Khan and
                  Farrukh Aslam Khan and
                  Maruf Pasha},
  title        = {A framework to address inconstant user requirements in cloud SLAs
                  management},
  journal      = {Clust. Comput.},
  volume       = {18},
  number       = {1},
  pages        = {123--133},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10586-014-0408-6},
  doi          = {10.1007/S10586-014-0408-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/HalboobAKKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AkhunzadaAGKRG15,
  author       = {Adnan Akhunzada and
                  Ejaz Ahmed and
                  Abdullah Gani and
                  Muhammad Khurram Khan and
                  Muhammad Imran and
                  Sghaier Guizani},
  title        = {Securing software defined networks: taxonomy, requirements, and open
                  issues},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {53},
  number       = {4},
  pages        = {36--44},
  year         = {2015},
  url          = {https://doi.org/10.1109/MCOM.2015.7081073},
  doi          = {10.1109/MCOM.2015.7081073},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AkhunzadaAGKRG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/KhanCMK15,
  author       = {Muhammad Khurram Khan and
                  Ankita Chaturvedi and
                  Dheerendra Mishra and
                  Saru Kumari},
  title        = {On the security enhancement of integrated electronic patient records
                  information systems},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {12},
  number       = {2},
  pages        = {857--872},
  year         = {2015},
  url          = {https://doi.org/10.2298/CSIS141029030K},
  doi          = {10.2298/CSIS141029030K},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/KhanCMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KhanKMAC15,
  author       = {Wazir Zada Khan and
                  Muhammad Khurram Khan and
                  Fahad T. Bin Muhaya and
                  Mohammed Y. Aalsalem and
                  Han{-}Chieh Chao},
  title        = {A Comprehensive Study of Email Spam Botnet Detection},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {17},
  number       = {4},
  pages        = {2271--2295},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMST.2015.2459015},
  doi          = {10.1109/COMST.2015.2459015},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/KhanKMAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/HeKK15,
  author       = {Debiao He and
                  Muhammad Khurram Khan and
                  Neeraj Kumar},
  title        = {A new handover authentication protocol based on bilinear pairing functions
                  for wireless networks},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {18},
  number       = {1/2},
  pages        = {67--74},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJAHUC.2015.067774},
  doi          = {10.1504/IJAHUC.2015.067774},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/HeKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KhanXHC15,
  author       = {Muhammad Khurram Khan and
                  Yang Xiang and
                  Shi{-}Jinn Horng and
                  Hsiao{-}Hwa Chen},
  title        = {Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks
                  2014},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {958190:1--958190:2},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/958190},
  doi          = {10.1155/2015/958190},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KhanXHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HorngTHWLK15,
  author       = {Shi{-}Jinn Horng and
                  Shiang{-}Feng Tzeng and
                  Po{-}Hsian Huang and
                  Xian Wang and
                  Tianrui Li and
                  Muhammad Khurram Khan},
  title        = {An efficient certificateless aggregate signature with conditional
                  privacy-preserving for vehicular sensor networks},
  journal      = {Inf. Sci.},
  volume       = {317},
  pages        = {48--66},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.04.033},
  doi          = {10.1016/J.INS.2015.04.033},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HorngTHWLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/AminIBKO15,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Mohammad S. Obaidat},
  title        = {Design and Analysis of an Enhanced Patient-Server Mutual Authentication
                  Protocol for Telecare Medical Information System},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {11},
  pages        = {137:1--137:20},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0307-2},
  doi          = {10.1007/S10916-015-0307-2},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/AminIBKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/AminIBKL15,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Xiong Li},
  title        = {Cryptanalysis and Enhancement of Anonymity Preserving Remote User
                  Mutual Authentication and Session Key Agreement Scheme for E-Health
                  Care Systems},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {11},
  pages        = {140:1--140:21},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0318-z},
  doi          = {10.1007/S10916-015-0318-Z},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/AminIBKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/ChaudhryMNK15,
  author       = {Shehzad Ashraf Chaudhry and
                  Khalid Mahmood and
                  Husnain Naqvi and
                  Muhammad Khurram Khan},
  title        = {An Improved and Secure Biometric Authentication Scheme for Telecare
                  Medicine Information Systems Based on Elliptic Curve Cryptography},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {11},
  pages        = {175},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0335-y},
  doi          = {10.1007/S10916-015-0335-Y},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/ChaudhryMNK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/AminIBKK15,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Neeraj Kumar},
  title        = {An Efficient and Practical Smart Card Based Anonymity Preserving User
                  Authentication Scheme for {TMIS} using Elliptic Curve Cryptography},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {11},
  pages        = {180},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0351-y},
  doi          = {10.1007/S10916-015-0351-Y},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/AminIBKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AkhunzadaSAGASFHK15,
  author       = {Adnan Akhunzada and
                  Mehdi Sookhak and
                  Nor Badrul Anuar and
                  Abdullah Gani and
                  Ejaz Ahmed and
                  Muhammad Shiraz and
                  Steven Furnell and
                  Amir Hayat and
                  Muhammad Khurram Khan},
  title        = {Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation
                  and future directions},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {48},
  pages        = {44--57},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jnca.2014.10.009},
  doi          = {10.1016/J.JNCA.2014.10.009},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AkhunzadaSAGASFHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AhmedGKBK15,
  author       = {Ejaz Ahmed and
                  Abdullah Gani and
                  Muhammad Khurram Khan and
                  Rajkumar Buyya and
                  Samee Ullah Khan},
  title        = {Seamless application execution in mobile cloud computing: Motivation,
                  taxonomy, and open challenges},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {52},
  pages        = {154--172},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jnca.2015.03.001},
  doi          = {10.1016/J.JNCA.2015.03.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AhmedGKBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LengTLK15,
  author       = {Lu Leng and
                  Andrew Beng Jin Teoh and
                  Ming Li and
                  Muhammad Khurram Khan},
  title        = {Orientation range of transposition for vertical correlation suppression
                  of 2DPalmPhasor Code},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {24},
  pages        = {11683--11701},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-014-2255-0},
  doi          = {10.1007/S11042-014-2255-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LengTLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangWK15,
  author       = {Wenfang Zhang and
                  Xiaomin Wang and
                  Muhammad Khurram Khan},
  title        = {A virtual bridge certificate authority-based cross-domain authentication
                  mechanism for distributed collaborative manufacturing systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {937--951},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1051},
  doi          = {10.1002/SEC.1051},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangWK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/IslamKA15,
  author       = {SK Hafizul Islam and
                  Muhammad Khurram Khan and
                  Ali M. Al{-}Khouri},
  title        = {Anonymous and provably secure certificateless multireceiver encryption
                  without bilinear pairing},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2214--2231},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1165},
  doi          = {10.1002/SEC.1165},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/IslamKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChaudhryFNKK15,
  author       = {Shehzad Ashraf Chaudhry and
                  Mohammad Sabzinejad Farash and
                  Husnain Naqvi and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {An enhanced privacy preserving remote user authentication scheme with
                  provable security},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3782--3795},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1299},
  doi          = {10.1002/SEC.1299},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChaudhryFNKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/IslamKOM15,
  author       = {SK Hafizul Islam and
                  Muhammad Khurram Khan and
                  Mohammad S. Obaidat and
                  Fahad T. Bin Muhaya},
  title        = {Provably Secure and Anonymous Password Authentication Protocol for
                  Roaming Service in Global Mobility Networks Using Extended Chaotic
                  Maps},
  journal      = {Wirel. Pers. Commun.},
  volume       = {84},
  number       = {3},
  pages        = {2013--2034},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11277-015-2542-8},
  doi          = {10.1007/S11277-015-2542-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/IslamKOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/HuangKWMH15,
  author       = {Baojun Huang and
                  Muhammad Khurram Khan and
                  Libing Wu and
                  Fahad T. Bin Muhaya and
                  Debiao He},
  title        = {An Efficient Remote User Authentication with Key Agreement Scheme
                  Using Elliptic Curve Cryptography},
  journal      = {Wirel. Pers. Commun.},
  volume       = {85},
  number       = {1},
  pages        = {225--240},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11277-015-2735-1},
  doi          = {10.1007/S11277-015-2735-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/HuangKWMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiLKLWK15,
  author       = {Xiong Li and
                  Junguo Liao and
                  Saru Kumari and
                  Wei Liang and
                  Fan Wu and
                  Muhammad Khurram Khan},
  title        = {A New Dynamic ID-Based User Authentication Scheme Using Mobile Device:
                  Cryptanalysis, the Principles and Design},
  journal      = {Wirel. Pers. Commun.},
  volume       = {85},
  number       = {1},
  pages        = {263--288},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11277-015-2737-z},
  doi          = {10.1007/S11277-015-2737-Z},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LiLKLWK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/AminIBK15,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan},
  title        = {An efficient remote mutual authentication scheme using smart mobile
                  phone over insecure networks},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166114},
  doi          = {10.1109/CYBERSA.2015.7166114},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/AminIBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AburummanS0KC15,
  author       = {Ala' F. A. Aburumman and
                  Wei Jye Seo and
                  Md. Rafiqul Islam and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {A Secure Cross-Domain {SIP} Solution for Mobile Ad Hoc Network Using
                  Dynamic Clustering},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {649--664},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_43},
  doi          = {10.1007/978-3-319-28865-9\_43},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AburummanS0KC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candie/JiaDK14,
  author       = {Dongli Jia and
                  Xintao Duan and
                  Muhammad Khurram Khan},
  title        = {Binary Artificial Bee Colony optimization using bitwise operation},
  journal      = {Comput. Ind. Eng.},
  volume       = {76},
  pages        = {360--365},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cie.2014.08.016},
  doi          = {10.1016/J.CIE.2014.08.016},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candie/JiaDK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/KumariKL14,
  author       = {Saru Kumari and
                  Muhammad Khurram Khan and
                  Xiong Li},
  title        = {An improved remote user authentication scheme with key agreement},
  journal      = {Comput. Electr. Eng.},
  volume       = {40},
  number       = {6},
  pages        = {1997--2012},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.compeleceng.2014.05.007},
  doi          = {10.1016/J.COMPELECENG.2014.05.007},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/KumariKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/KhanKG14,
  author       = {Muhammad Khurram Khan and
                  Saru Kumari and
                  Mridul Kumar Gupta},
  title        = {More efficient key-hash based fingerprint remote authentication scheme
                  using mobile device},
  journal      = {Computing},
  volume       = {96},
  number       = {9},
  pages        = {793--816},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00607-013-0308-2},
  doi          = {10.1007/S00607-013-0308-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/KhanKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/KumariK14,
  author       = {Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {Cryptanalysis and improvement of 'a robust smart-card-based remote
                  user password authentication scheme'},
  journal      = {Int. J. Commun. Syst.},
  volume       = {27},
  number       = {12},
  pages        = {3939--3955},
  year         = {2014},
  url          = {https://doi.org/10.1002/dac.2590},
  doi          = {10.1002/DAC.2590},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/KumariK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KhanK14,
  author       = {Muhammad Khurram Khan and
                  Saru Kumari},
  title        = {An Improved User Authentication Protocol for Healthcare Services via
                  Wireless Medical Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/347169},
  doi          = {10.1155/2014/347169},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KhanK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HeKW14,
  author       = {Debiao He and
                  Muhammad Khurram Khan and
                  Shuhua Wu},
  title        = {On the Security of a RSA-based Certificateless Signature Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {78--80},
  year         = {2014},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v16-n1/ijns-2014-v16-n1-p78-80.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HeKW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/LengTLK14,
  author       = {Lu Leng and
                  Andrew Beng Jin Teoh and
                  Ming Li and
                  Muhammad Khurram Khan},
  title        = {Analysis of correlation of 2DPalmHash Code and orientation range suitable
                  for transposition},
  journal      = {Neurocomputing},
  volume       = {131},
  pages        = {377--387},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.neucom.2013.10.005},
  doi          = {10.1016/J.NEUCOM.2013.10.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/LengTLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/SiddiquiAKA14,
  author       = {Zeeshan Siddiqui and
                  Abdul Hanan Abdullah and
                  Muhammad Khurram Khan and
                  Abdullah S. Alghamdi},
  title        = {Smart Environment as a Service: Three Factor Cloud Based User Authentication
                  for Telecare Medical Information System},
  journal      = {J. Medical Syst.},
  volume       = {38},
  number       = {1},
  pages        = {9997},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10916-013-9997-5},
  doi          = {10.1007/S10916-013-9997-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/SiddiquiAKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/MishraMKKC14,
  author       = {Dheerendra Mishra and
                  Sourav Mukhopadhyay and
                  Saru Kumari and
                  Muhammad Khurram Khan and
                  Ankita Chaturvedi},
  title        = {Security Enhancement of a Biometric based Authentication Scheme for
                  Telecare Medicine Information Systems with Nonce},
  journal      = {J. Medical Syst.},
  volume       = {38},
  number       = {5},
  pages        = {41},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10916-014-0041-1},
  doi          = {10.1007/S10916-014-0041-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/MishraMKKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/MishraMCKK14,
  author       = {Dheerendra Mishra and
                  Sourav Mukhopadhyay and
                  Ankita Chaturvedi and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication
                  Scheme for Telecare Medicine Information Systems},
  journal      = {J. Medical Syst.},
  volume       = {38},
  number       = {6},
  pages        = {24},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10916-014-0024-2},
  doi          = {10.1007/S10916-014-0024-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/MishraMCKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/IslamK14,
  author       = {SK Hafizul Islam and
                  Muhammad Khurram Khan},
  title        = {Cryptanalysis and Improvement of Authentication and Key Agreement
                  Protocols for Telecare Medicine Information Systems},
  journal      = {J. Medical Syst.},
  volume       = {38},
  number       = {10},
  pages        = {135},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10916-014-0135-9},
  doi          = {10.1007/S10916-014-0135-9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/IslamK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SookhakTAGK14,
  author       = {Mehdi Sookhak and
                  Hamid Talebian and
                  Ejaz Ahmed and
                  Abdullah Gani and
                  Muhammad Khurram Khan},
  title        = {A review on remote data auditing in single cloud server: Taxonomy
                  and open issues},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {43},
  pages        = {121--141},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jnca.2014.04.011},
  doi          = {10.1016/J.JNCA.2014.04.011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/SookhakTAGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HorngRFWK14,
  author       = {Shi{-}Jinn Horng and
                  Didi Rosiyadi and
                  Pingzhi Fan and
                  Xian Wang and
                  Muhammad Khurram Khan},
  title        = {An adaptive watermarking scheme for e-government document images},
  journal      = {Multim. Tools Appl.},
  volume       = {72},
  number       = {3},
  pages        = {3085--3103},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-013-1579-5},
  doi          = {10.1007/S11042-013-1579-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HorngRFWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KhanK14,
  author       = {Muhammad Khurram Khan and
                  Saru Kumari},
  title        = {Cryptanalysis and Improvement of "An Efficient and Secure Dynamic
                  ID-based Authentication Scheme for Telecare Medical Information Systems"},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {2},
  pages        = {399--408},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.791},
  doi          = {10.1002/SEC.791},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KhanK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LengTLK14,
  author       = {Lu Leng and
                  Andrew Beng Jin Teoh and
                  Ming Li and
                  Muhammad Khurram Khan},
  title        = {A remote cancelable palmprint authentication protocol based on multi-directional
                  two-dimensional PalmPhasor-fusion},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {1860--1871},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.900},
  doi          = {10.1002/SEC.900},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LengTLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KumariGKL14,
  author       = {Saru Kumari and
                  Mridul Kumar Gupta and
                  Muhammad Khurram Khan and
                  Xiong Li},
  title        = {An improved timestamp-based password authentication scheme: comments,
                  cryptanalysis, and improvement},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {1921--1932},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.906},
  doi          = {10.1002/SEC.906},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KumariGKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KumariK14,
  author       = {Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {More secure smart card-based remote user password authentication scheme
                  with user anonymity},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {2039--2053},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.916},
  doi          = {10.1002/SEC.916},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KumariK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/TsaiKPL14,
  author       = {Pei{-}wei Tsai and
                  Muhammad Khurram Khan and
                  Jeng{-}Shyang Pan and
                  Bin{-}Yih Liao},
  title        = {Interactive Artificial Bee Colony Supported Passive Continuous Authentication
                  System},
  journal      = {{IEEE} Syst. J.},
  volume       = {8},
  number       = {2},
  pages        = {395--405},
  year         = {2014},
  url          = {https://doi.org/10.1109/JSYST.2012.2208153},
  doi          = {10.1109/JSYST.2012.2208153},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/TsaiKPL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/AzamKSAK14,
  author       = {Farzana Azam and
                  Zeeshan Shafi Khan and
                  Muhammad Sher and
                  Khaled Alghathbar and
                  Muhammad Khurram Khan},
  title        = {Attack containment in mobile ad-hoc networks through fair distribution
                  of processing resources},
  journal      = {Telecommun. Syst.},
  volume       = {55},
  number       = {1},
  pages        = {93--103},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11235-013-9754-6},
  doi          = {10.1007/S11235-013-9754-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/AzamKSAK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/HorngTWQGK14,
  author       = {Shi{-}Jinn Horng and
                  Shiang{-}Feng Tzeng and
                  Xian Wang and
                  Shaojie Qiao and
                  Xun Gong and
                  Muhammad Khurram Khan},
  title        = {Cryptanalysis on a Portable Privacy-Preserving Authentication and
                  Access Control Protocol in VANETs},
  journal      = {Wirel. Pers. Commun.},
  volume       = {79},
  number       = {2},
  pages        = {1445--1454},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11277-014-1939-0},
  doi          = {10.1007/S11277-014-1939-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/HorngTWQGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/KhanKWK14,
  author       = {Muhammad Khurram Khan and
                  Saru Kumari and
                  Xiaomin Wang and
                  Rahul Kumar},
  title        = {Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme},
  booktitle    = {{IEEE} 12th International Conference on Dependable, Autonomic and
                  Secure Computing, {DASC} 2014, Dalian, China, August 24-27, 2014},
  pages        = {125--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DASC.2014.31},
  doi          = {10.1109/DASC.2014.31},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dasc/KhanKWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/DerhabBMKX14,
  author       = {Abdelouahid Derhab and
                  Abdelghani Bouras and
                  Fahad Bin Muhaya and
                  Muhammad Khurram Khan and
                  Yang Xiang},
  title        = {Spam Trapping System: Novel security framework to fight against spam
                  botnets},
  booktitle    = {21st International Conference on Telecommunications, {ICT} 2014, Lisbon,
                  Portugal, 4-7 May, 2014},
  pages        = {467--471},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICT.2014.6845160},
  doi          = {10.1109/ICT.2014.6845160},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict/DerhabBMKX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/KumariKLK14,
  author       = {Saru Kumari and
                  Muhammad Khurram Khan and
                  Xiong Li and
                  Rahul Kumar},
  title        = {Notes on "a password-based remote user authentication scheme
                  without smart card"},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {116--119},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013105},
  doi          = {10.1109/ISBAST.2014.7013105},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/KumariKLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LiKKLL14,
  author       = {Xiong Li and
                  Muhammad Khurram Khan and
                  Saru Kumari and
                  Junguo Liao and
                  Wei Liang},
  title        = {Cryptanalysis of a robust smart card authentication scheme for multi-server
                  architecture},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {120--123},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013106},
  doi          = {10.1109/ISBAST.2014.7013106},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LiKKLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/KurniawanKKA14,
  author       = {Fajri Kurniawan and
                  Mohammed S. Khalil and
                  Muhammad Khurram Khan and
                  Yasser M. Alginahi},
  title        = {DWT+LSB-based fragile watermarking method for digital Quran images},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {290--297},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013137},
  doi          = {10.1109/ISBAST.2014.7013137},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/KurniawanKKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/EldefrawyKE14,
  author       = {Mohamed Hamdy Eldefrawy and
                  Muhammad Khurram Khan and
                  Hassan M. Elkamchouchi},
  editor       = {Shahram Latifi},
  title        = {The Use of Two Authentication Factors to Enhance the Security of Mass
                  Storage Devices},
  booktitle    = {11th International Conference on Information Technology: New Generations,
                  {ITNG} 2014, Las Vegas, NV, USA, April 7-9, 2014},
  pages        = {196--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ITNG.2014.13},
  doi          = {10.1109/ITNG.2014.13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itng/EldefrawyKE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/LengLLKA14,
  author       = {Lu Leng and
                  Gang Liu and
                  Ming Li and
                  Muhammad Khurram Khan and
                  Ali M. Al{-}Khouri},
  editor       = {Shahram Latifi},
  title        = {Logical Conjunction of Triple-Perpendicular-Directional Translation
                  Residual for Contactless Palmprint Preprocessing},
  booktitle    = {11th International Conference on Information Technology: New Generations,
                  {ITNG} 2014, Las Vegas, NV, USA, April 7-9, 2014},
  pages        = {523--528},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ITNG.2014.18},
  doi          = {10.1109/ITNG.2014.18},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itng/LengLLKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiMKT13,
  author       = {Fagen Li and
                  Fahad Bin Muhaya and
                  Muhammad Khurram Khan and
                  Tsuyoshi Takagi},
  title        = {Lattice-based signcryption},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {25},
  number       = {14},
  pages        = {2112--2122},
  year         = {2013},
  url          = {https://doi.org/10.1002/cpe.2826},
  doi          = {10.1002/CPE.2826},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiMKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/KhanAKAA13,
  author       = {Bilal Khan and
                  Khaled Alghathbar and
                  Muhammad Khurram Khan and
                  Abdullah M. AlKelabi and
                  Abdulaziz Alajaji},
  title        = {Cyber security using arabic captcha scheme},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {10},
  number       = {1},
  pages        = {76--84},
  year         = {2013},
  url          = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=84\&\#38;Itemid=333},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/KhanAKAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcisys/JiaDK13,
  author       = {Dongli Jia and
                  Xintao Duan and
                  Muhammad Khurram Khan},
  title        = {An Efficient Binary Differential Evolution with Parameter Adaptation},
  journal      = {Int. J. Comput. Intell. Syst.},
  volume       = {6},
  number       = {2},
  pages        = {328--336},
  year         = {2013},
  url          = {https://doi.org/10.1080/18756891.2013.769769},
  doi          = {10.1080/18756891.2013.769769},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcisys/JiaDK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KhanXHC13,
  author       = {Muhammad Khurram Khan and
                  Yang Xiang and
                  Shi{-}Jinn Horng and
                  Hsiao{-}Hwa Chen},
  title        = {Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/956736},
  doi          = {10.1155/2013/956736},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KhanXHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HeK13,
  author       = {Debiao He and
                  Muhammad Khurram Khan},
  title        = {Cryptanalysis of a key agreement protocol based on chaotic Hash},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {5},
  number       = {3/4},
  pages        = {172--177},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJESDF.2013.058650},
  doi          = {10.1504/IJESDF.2013.058650},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/HeK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HeCSK13,
  author       = {Debiao He and
                  Jianhua Chen and
                  Wenbo Shi and
                  Muhammad Khurram Khan},
  title        = {On the security of an authentication scheme for multi-server architecture},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {5},
  number       = {3/4},
  pages        = {288--296},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJESDF.2013.058669},
  doi          = {10.1504/IJESDF.2013.058669},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/HeCSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/0003XF13a,
  author       = {Muhammad Khurram Khan and
                  Saru Kumari and
                  Pitam Singh},
  title        = {Cryptanalysis of an 'Efficient-Strong Authentiction Protocol {(E-SAP)}
                  for Healthcare Applications Using Wireless Medical Sensor Networks'},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {7},
  number       = {5},
  pages        = {967--979},
  year         = {2013},
  url          = {https://doi.org/10.3837/tiis.2013.05.002},
  doi          = {10.3837/TIIS.2013.05.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/0003XF13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HorngTFWLK13,
  author       = {Shi{-}Jinn Horng and
                  Shiang{-}Feng Tzeng and
                  Pingzhi Fan and
                  Xian Wang and
                  Tianrui Li and
                  Muhammad Khurram Khan},
  title        = {Secure Convertible Undeniable Signature Scheme Using Extended Euclidean
                  Algorithm without Random Oracles},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {7},
  number       = {6},
  pages        = {1512--1532},
  year         = {2013},
  url          = {https://doi.org/10.3837/tiis.2013.06.010},
  doi          = {10.3837/TIIS.2013.06.010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/HorngTFWLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsci/HalboobMMK13,
  author       = {Waleed Halboob and
                  Ali Mamat and
                  Ramlan Mahmod and
                  Muhammad Khurram Khan},
  title        = {Temporal, Delegable and Cheap Update Access control to published {XML}
                  Documents},
  journal      = {J. Comput. Sci.},
  volume       = {9},
  number       = {4},
  pages        = {427--432},
  year         = {2013},
  url          = {https://doi.org/10.3844/jcssp.2013.427.432},
  doi          = {10.3844/JCSSP.2013.427.432},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsci/HalboobMMK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WaqarRAK13,
  author       = {Adeela Waqar and
                  Asad Raza and
                  Haider Abbas and
                  Muhammad Khurram Khan},
  title        = {A framework for preservation of cloud users' data privacy using dynamic
                  reconstruction of metadata},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {235--248},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.09.001},
  doi          = {10.1016/J.JNCA.2012.09.001},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WaqarRAK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiNKL13,
  author       = {Xiong Li and
                  Jianwei Niu and
                  Muhammad Khurram Khan and
                  Junguo Liao},
  title        = {An enhanced smart card based remote user password authentication scheme},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1365--1371},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.034},
  doi          = {10.1016/J.JNCA.2013.02.034},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiNKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/HorngHLQGCK13,
  author       = {Shi{-}Jinn Horng and
                  Ling{-}Yuan Hsu and
                  Tianrui Li and
                  Shaojie Qiao and
                  Xun Gong and
                  Hsien{-}Hsin Chou and
                  Muhammad Khurram Khan},
  title        = {Using Sorted Switching Median Filter to remove high-density impulse
                  noises},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {24},
  number       = {7},
  pages        = {956--967},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jvcir.2013.06.012},
  doi          = {10.1016/J.JVCIR.2013.06.012},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/HorngHLQGCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/HorngRLTGK13,
  author       = {Shi{-}Jinn Horng and
                  Didi Rosiyadi and
                  Tianrui Li and
                  Takao Terano and
                  Minyi Guo and
                  Muhammad Khurram Khan},
  title        = {A blind image copyright protection scheme for e-government},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {24},
  number       = {7},
  pages        = {1099--1105},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jvcir.2013.07.008},
  doi          = {10.1016/J.JVCIR.2013.07.008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/HorngRLTGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/HeKKL13,
  author       = {Debiao He and
                  Neeraj Kumar and
                  Muhammad Khurram Khan and
                  Jong{-}Hyouk Lee},
  title        = {Anonymous two-factor authentication for consumer roaming service in
                  global mobility networks},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {59},
  number       = {4},
  pages        = {811--817},
  year         = {2013},
  url          = {https://doi.org/10.1109/TCE.2013.6689693},
  doi          = {10.1109/TCE.2013.6689693},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/HeKKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/Khan13,
  author       = {Muhammad Khurram Khan},
  title        = {Editorial - Chaotic cryptography and its applications in telecommunication
                  systems},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {2},
  pages        = {513--514},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9456-x},
  doi          = {10.1007/S11235-011-9456-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/Khan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/WangGZKA13,
  author       = {Xiaomin Wang and
                  Wei Guo and
                  Wenfang Zhang and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  title        = {Cryptanalysis and improvement on a parallel keyed hash function based
                  on chaotic neural network},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {2},
  pages        = {515--524},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9457-9},
  doi          = {10.1007/S11235-011-9457-9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/WangGZKA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HorngTPFWLK13,
  author       = {Shi{-}Jinn Horng and
                  Shiang{-}Feng Tzeng and
                  Yi Pan and
                  Pingzhi Fan and
                  Xian Wang and
                  Tianrui Li and
                  Muhammad Khurram Khan},
  title        = {b-SPECS+: Batch Verification for Secure Pseudonymous Authentication
                  in {VANET}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {11},
  pages        = {1860--1875},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2277471},
  doi          = {10.1109/TIFS.2013.2277471},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HorngTPFWLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bics/KhanKGM13,
  author       = {Muhammad Khurram Khan and
                  Saru Kumari and
                  Mridul Kumar Gupta and
                  Fahad Bin Muhaya},
  editor       = {Derong Liu and
                  Cesare Alippi and
                  Dongbin Zhao and
                  Amir Hussain},
  title        = {Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication
                  Scheme Using Mobile Device},
  booktitle    = {Advances in Brain Inspired Cognitive Systems - 6th International Conference,
                  {BICS} 2013, Beijing, China, June 9-11, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7888},
  pages        = {271--277},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38786-9\_31},
  doi          = {10.1007/978-3-642-38786-9\_31},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bics/KhanKGM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LiNKL13,
  author       = {Xiong Li and
                  Jianwei Niu and
                  Muhammad Khurram Khan and
                  Junguo Liao},
  title        = {Robust Biometrics Based Three-Factor Remote User Authentication Scheme
                  with Key Agreement},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {105--110},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.20},
  doi          = {10.1109/ISBAST.2013.20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LiNKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LengTLK13,
  author       = {Lu Leng and
                  Andrew Beng Jin Teoh and
                  Ming Li and
                  Muhammad Khurram Khan},
  title        = {Orientation Range for Transposition According to the Correlation Analysis
                  of 2DPalmHash Code},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {230--234},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.40},
  doi          = {10.1109/ISBAST.2013.40},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LengTLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/KurniawanKK13,
  author       = {Fajri Kurniawan and
                  Mohammed Sayim Khalil and
                  Muhammad Khurram Khan},
  title        = {Core-Point Detection on Camera-Based Fingerprint Image},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {241--246},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.42},
  doi          = {10.1109/ISBAST.2013.42},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/KurniawanKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/KumariMKK13,
  author       = {Saru Kumari and
                  Fahad Bin Muhaya and
                  Muhammad Khurram Khan and
                  R. Kumar},
  title        = {Cryptanalysis of "A Robust Smart-Card-Based Remote User Password
                  Authentication Scheme"},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {247--250},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.43},
  doi          = {10.1109/ISBAST.2013.43},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/KumariMKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/KurniawanKKA13,
  author       = {Fajri Kurniawan and
                  Mohammed Sayim Khalil and
                  Muhammad Khurram Khan and
                  Yasser M. Alginahi},
  title        = {Authentication and Tamper Detection of Digital Holy Quran Images},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {291--296},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.51},
  doi          = {10.1109/ISBAST.2013.51},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/KurniawanKKA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LiNKL13a,
  author       = {Xiong Li and
                  Jianwei Niu and
                  Muhammad Khurram Khan and
                  Junguo Liao},
  title        = {Security Analysis and Enhancement of a Dynamic Identity Based Authentication
                  Scheme Using Smart Cards},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.27},
  doi          = {10.1109/ISBAST.2013.27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LiNKL13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhanH13,
  author       = {Muhammad Khurram Khan and
                  Debiao He},
  title        = {Cryptanalysis of "An Improved Remote Password Authentication
                  Scheme with Smartcard"},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {1708--1710},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.212},
  doi          = {10.1109/TRUSTCOM.2013.212},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhanH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/FarfouraHLRCK12,
  author       = {Mahmoud E. Farfoura and
                  Shi{-}Jinn Horng and
                  Jui{-}Lin Lai and
                  Ray{-}Shine Run and
                  Rong{-}Jian Chen and
                  Muhammad Khurram Khan},
  title        = {A blind reversible method for watermarking relational databases based
                  on a time-stamping protocol},
  journal      = {Expert Syst. Appl.},
  volume       = {39},
  number       = {3},
  pages        = {3185--3196},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.eswa.2011.09.005},
  doi          = {10.1016/J.ESWA.2011.09.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/FarfouraHLRCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Khan12,
  author       = {Muhammad Khurram Khan},
  title        = {High performance biometrics recognition algorithms and systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {210--211},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.future.2011.08.010},
  doi          = {10.1016/J.FUTURE.2011.08.010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/Khan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YanPCK12,
  author       = {Lijun Yan and
                  Jeng{-}Shyang Pan and
                  Shu{-}Chuan Chu and
                  Muhammad Khurram Khan},
  title        = {Adaptively weighted sub-directional two-dimensional linear discriminant
                  analysis for face recognition},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {232--235},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.future.2010.11.010},
  doi          = {10.1016/J.FUTURE.2010.11.010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/YanPCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiK12,
  author       = {Fagen Li and
                  Muhammad Khurram Khan},
  title        = {A biometric identity-based signcryption scheme},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {306--310},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.future.2010.11.004},
  doi          = {10.1016/J.FUTURE.2010.11.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/MahmudKAAI12,
  author       = {Maqsood Mahmud and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Abdul Hanan Abdullah and
                  Mohammad Yazid Bin Idris},
  title        = {Intrinsic authentication of multimedia objects using biometric data
                  manipulation},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {9},
  number       = {4},
  pages        = {336--342},
  year         = {2012},
  url          = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=81\&\#38;Itemid=327},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/MahmudKAAI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/RosiyadiHFWKP12,
  author       = {Didi Rosiyadi and
                  Shi{-}Jinn Horng and
                  Pingzhi Fan and
                  Xian Wang and
                  Muhammad Khurram Khan and
                  Yi Pan},
  title        = {Copyright Protection for E-Government Document Images},
  journal      = {{IEEE} Multim.},
  volume       = {19},
  number       = {3},
  pages        = {62--73},
  year         = {2012},
  url          = {https://doi.org/10.1109/MMUL.2011.41},
  doi          = {10.1109/MMUL.2011.41},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeemm/RosiyadiHFWKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jim/KangPKK12,
  author       = {Soo{-}Young Kang and
                  Jong Hyuk Park and
                  Muhammad Khurram Khan and
                  Jin Kwak},
  title        = {Study on the common criteria methodology for secure ubiquitous environment
                  construction},
  journal      = {J. Intell. Manuf.},
  volume       = {23},
  number       = {4},
  pages        = {933--939},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10845-009-0363-x},
  doi          = {10.1007/S10845-009-0363-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jim/KangPKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/KumariKK12,
  author       = {Saru Kumari and
                  Muhammad Khurram Khan and
                  Rahul Kumar},
  title        = {Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare
                  Medical Information Systems'},
  journal      = {J. Medical Syst.},
  volume       = {37},
  number       = {4},
  pages        = {9952},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10916-013-9952-5},
  doi          = {10.1007/S10916-013-9952-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/KumariKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/KhanK12,
  author       = {Muhammad Khurram Khan and
                  Saru Kumari},
  title        = {An Authentication Scheme for Secure Access to Healthcare Services},
  journal      = {J. Medical Syst.},
  volume       = {37},
  number       = {4},
  pages        = {9954},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10916-013-9954-3},
  doi          = {10.1007/S10916-013-9954-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/KhanK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiKAT12,
  author       = {Fagen Li and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Tsuyoshi Takagi},
  title        = {Identity-based online/offline signcryption for low power devices},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {35},
  number       = {1},
  pages        = {340--347},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jnca.2011.08.001},
  doi          = {10.1016/J.JNCA.2011.08.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiKAT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/EldefrawyKAKE12,
  author       = {Mohamed Hamdy Eldefrawy and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Tai{-}Hoon Kim and
                  Hassan M. Elkamchouchi},
  title        = {Mobile one-time passwords: two-factor authentication using mobile
                  phones},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {5},
  pages        = {508--516},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.340},
  doi          = {10.1002/SEC.340},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/EldefrawyKAKE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AlamAK0ANHKA12,
  author       = {Masoom Alam and
                  Tamleek Ali and
                  Sanaullah Khan and
                  Shahbaz Khan and
                  Muhammad Ali and
                  Mohammad Nauman and
                  Amir Hayat and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  title        = {Analysis of existing remote attestation techniques},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {9},
  pages        = {1062--1082},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.393},
  doi          = {10.1002/SEC.393},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AlamAK0ANHKA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KhanH12,
  author       = {Muhammad Khurram Khan and
                  Debiao He},
  title        = {A new dynamic identity-based authentication protocol for multi-server
                  environment using elliptic curve cryptography},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {11},
  pages        = {1260--1266},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.573},
  doi          = {10.1002/SEC.573},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KhanH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cason/KhanKG12,
  author       = {Muhammad Khurram Khan and
                  Saru Kumari and
                  Mridul Kumar Gupta},
  title        = {Further cryptanalysis of 'A remote authentication scheme using mobile
                  device'},
  booktitle    = {Fourth International Conference on Computational Aspects of Social
                  Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012},
  pages        = {234--237},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CASoN.2012.6412408},
  doi          = {10.1109/CASON.2012.6412408},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cason/KhanKG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdke/KhanH12,
  author       = {Muhammad Khurram Khan and
                  Debiao He},
  editor       = {Yang Xiang and
                  Mukaddim Pathan and
                  Xiaohui Tao and
                  Hua Wang},
  title        = {Weaknesses of "Security Analysis and Enhancement for Three-Party
                  Password-Based Authenticated Key Exchange Protocol"},
  booktitle    = {Data and Knowledge Engineering - Third International Conference, {ICDKE}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7696},
  pages        = {243--249},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34679-8\_22},
  doi          = {10.1007/978-3-642-34679-8\_22},
  timestamp    = {Thu, 09 Mar 2023 09:06:09 +0100},
  biburl       = {https://dblp.org/rec/conf/icdke/KhanH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EldefrawyK12,
  author       = {Mohamed Hamdy Eldefrawy and
                  Muhammad Khurram Khan},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Detecting counterfeit-money using RFID-enabled mobile devices},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {74--79},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470988/},
  timestamp    = {Thu, 10 Mar 2022 09:31:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/EldefrawyK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/EldefrawyAK12,
  author       = {Mohamed Hamdy Eldefrawy and
                  Khaled Alghathbar and
                  Muhammad Khurram Khan},
  title        = {Hardcopy Document Authentication Based on Public Key Encryption and
                  2D Barcodes},
  booktitle    = {2012 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2012, Taipei, Taiwan, March 26-29, 2012},
  pages        = {77--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISBAST.2012.16},
  doi          = {10.1109/ISBAST.2012.16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/EldefrawyAK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candie/JiaZQK11,
  author       = {Dongli Jia and
                  Guoxin Zheng and
                  Boyang Qu and
                  Muhammad Khurram Khan},
  title        = {A hybrid particle swarm optimization algorithm for high-dimensional
                  problems},
  journal      = {Comput. Ind. Eng.},
  volume       = {61},
  number       = {4},
  pages        = {1117--1122},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cie.2011.06.024},
  doi          = {10.1016/J.CIE.2011.06.024},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candie/JiaZQK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KhanKA11,
  author       = {Muhammad Khurram Khan and
                  Soo{-}Kyun Kim and
                  Khaled Alghathbar},
  title        = {Cryptanalysis and security enhancement of a 'more efficient {\&}
                  secure dynamic ID-based remote user authentication scheme'},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {3},
  pages        = {305--309},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.02.011},
  doi          = {10.1016/J.COMCOM.2010.02.011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/KhanKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/HsuHFKWRLC11,
  author       = {Ling{-}Yuan Hsu and
                  Shi{-}Jinn Horng and
                  Pingzhi Fan and
                  Muhammad Khurram Khan and
                  Yuh{-}Rau Wang and
                  Ray{-}Shine Run and
                  Jui{-}Lin Lai and
                  Rong{-}Jian Chen},
  title        = {{MTPSO} algorithm for solving planar graph coloring problem},
  journal      = {Expert Syst. Appl.},
  volume       = {38},
  number       = {5},
  pages        = {5525--5531},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.eswa.2010.10.084},
  doi          = {10.1016/J.ESWA.2010.10.084},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/HsuHFKWRLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/HeHFKRLC11,
  author       = {Mingxing He and
                  Shi{-}Jinn Horng and
                  Pingzhi Fan and
                  Muhammad Khurram Khan and
                  Ray{-}Shine Run and
                  Jui{-}Lin Lai and
                  Rong{-}Jian Chen},
  title        = {A fast {RFID} tag identification algorithm based on counter and stack},
  journal      = {Expert Syst. Appl.},
  volume       = {38},
  number       = {6},
  pages        = {6829--6838},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.eswa.2010.12.056},
  doi          = {10.1016/J.ESWA.2010.12.056},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/HeHFKRLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/HsuHHFKKRLC11,
  author       = {Ling{-}Yuan Hsu and
                  Shi{-}Jinn Horng and
                  Mingxing He and
                  Pingzhi Fan and
                  Tzong{-}Wann Kao and
                  Muhammad Khurram Khan and
                  Ray{-}Shine Run and
                  Jui{-}Lin Lai and
                  Rong{-}Jian Chen},
  title        = {Mutual funds trading strategy based on particle swarm optimization},
  journal      = {Expert Syst. Appl.},
  volume       = {38},
  number       = {6},
  pages        = {7582--7602},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.eswa.2010.12.105},
  doi          = {10.1016/J.ESWA.2010.12.105},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/HsuHHFKKRLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/HuangHHFKKLK11,
  author       = {Yao{-}Lin Huang and
                  Shi{-}Jinn Horng and
                  Mingxing He and
                  Pingzhi Fan and
                  Tzong{-}Wann Kao and
                  Muhammad Khurram Khan and
                  Jui{-}Lin Lai and
                  I{-}Hong Kuo},
  title        = {A hybrid forecasting model for enrollments based on aggregated fuzzy
                  time series and particle swarm optimization},
  journal      = {Expert Syst. Appl.},
  volume       = {38},
  number       = {7},
  pages        = {8014--8023},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.eswa.2010.12.127},
  doi          = {10.1016/J.ESWA.2010.12.127},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/HuangHHFKKLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/HeHFKRLCS11,
  author       = {Mingxing He and
                  Shi{-}Jinn Horng and
                  Pingzhi Fan and
                  Muhammad Khurram Khan and
                  Ray{-}Shine Run and
                  Jui{-}Lin Lai and
                  Rong{-}Jian Chen and
                  Adi Sutanto},
  title        = {An efficient phishing webpage detector},
  journal      = {Expert Syst. Appl.},
  volume       = {38},
  number       = {10},
  pages        = {12018--12027},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.eswa.2011.01.046},
  doi          = {10.1016/J.ESWA.2011.01.046},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/HeHFKRLCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/RunHLKFK11,
  author       = {Ray{-}Shine Run and
                  Shi{-}Jinn Horng and
                  Wei{-}Hung Lin and
                  Tzong{-}Wann Kao and
                  Pingzhi Fan and
                  Muhammad Khurram Khan},
  title        = {An efficient wavelet-tree-based watermarking method},
  journal      = {Expert Syst. Appl.},
  volume       = {38},
  number       = {12},
  pages        = {14357--14366},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.eswa.2011.03.024},
  doi          = {10.1016/J.ESWA.2011.03.024},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/RunHLKFK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/KhanZA11,
  author       = {Muhammad Khurram Khan and
                  Jiashu Zhang and
                  Khaled Alghathbar},
  title        = {Challenge-response-based biometric image scrambling for secure personal
                  identification},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {27},
  number       = {4},
  pages        = {411--418},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.future.2010.05.019},
  doi          = {10.1016/J.FUTURE.2010.05.019},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/KhanZA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JiaZK11,
  author       = {Dongli Jia and
                  Guoxin Zheng and
                  Muhammad Khurram Khan},
  title        = {An effective memetic differential evolution algorithm based on chaotic
                  local search},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {15},
  pages        = {3175--3187},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2011.03.018},
  doi          = {10.1016/J.INS.2011.03.018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/JiaZK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ivc/LinHKFFCKBT11,
  author       = {Shih{-}Ying Lin and
                  Shi{-}Jinn Horng and
                  Tzong{-}Wann Kao and
                  Chin{-}Shyurng Fahn and
                  Pingzhi Fan and
                  Yuan{-}Hsin Chen and
                  Muhammad Khurram Khan and
                  Anu G. Bourgeois and
                  Takao Terano},
  title        = {3D block-based medial axis transform and chessboard distance transform
                  based on dominance},
  journal      = {Image Vis. Comput.},
  volume       = {29},
  number       = {4},
  pages        = {272--285},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.imavis.2010.11.005},
  doi          = {10.1016/J.IMAVIS.2010.11.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ivc/LinHKFFCKBT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/Khan11,
  author       = {Muhammad Khurram Khan},
  title        = {Research advances in data hiding for multimedia security},
  journal      = {Multim. Tools Appl.},
  volume       = {52},
  number       = {2-3},
  pages        = {257--261},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11042-011-0741-1},
  doi          = {10.1007/S11042-011-0741-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/Khan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhaoWK11,
  author       = {Hong Zhao and
                  Hongxia Wang and
                  Muhammad Khurram Khan},
  title        = {Statistical analysis of several reversible data hiding algorithms},
  journal      = {Multim. Tools Appl.},
  volume       = {52},
  number       = {2-3},
  pages        = {277--290},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11042-009-0380-y},
  doi          = {10.1007/S11042-009-0380-Y},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhaoWK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GuoZKA11,
  author       = {Xianfeng Guo and
                  Jiashu Zhang and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  title        = {Secure Chaotic Map Based Block Cryptosystem with Application to Camera
                  Sensor Networks},
  journal      = {Sensors},
  volume       = {11},
  number       = {2},
  pages        = {1607--1619},
  year         = {2011},
  url          = {https://doi.org/10.3390/s110201607},
  doi          = {10.3390/S110201607},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/GuoZKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/ZhaoWK11,
  author       = {Hong Zhao and
                  Hongxia Wang and
                  Muhammad Khurram Khan},
  title        = {Steganalysis for palette-based images using generalized difference
                  image and color correlogram},
  journal      = {Signal Process.},
  volume       = {91},
  number       = {11},
  pages        = {2595--2605},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.sigpro.2011.05.015},
  doi          = {10.1016/J.SIGPRO.2011.05.015},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/ZhaoWK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/Khan11,
  author       = {Muhammad Khurram Khan},
  title        = {Guest editorial for special issue on biometric systems and applications},
  journal      = {Telecommun. Syst.},
  volume       = {47},
  number       = {3-4},
  pages        = {183--184},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11235-010-9310-6},
  doi          = {10.1007/S11235-010-9310-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/Khan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/KhanAZ11,
  author       = {Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Jiashu Zhang},
  title        = {Privacy-preserving and tokenless chaotic revocable face authentication
                  scheme},
  journal      = {Telecommun. Syst.},
  volume       = {47},
  number       = {3-4},
  pages        = {227--234},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11235-010-9314-2},
  doi          = {10.1007/S11235-010-9314-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/KhanAZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/RazzakKAP11,
  author       = {Muhammad Imran Razzak and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Jong Hyuk Park},
  title        = {Energy Efficient Distributed Face Recognition in Wireless Sensor Network},
  journal      = {Wirel. Pers. Commun.},
  volume       = {60},
  number       = {3},
  pages        = {571--582},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11277-011-0310-y},
  doi          = {10.1007/S11277-011-0310-Y},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/RazzakKAP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KhanTPL11,
  author       = {Muhammad Khurram Khan and
                  Pei{-}wei Tsai and
                  Jeng{-}Shyang Pan and
                  Bin{-}Yih Liao},
  title        = {Biometric driven initiative system for passive continuous authentication},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {139--144},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122809},
  doi          = {10.1109/ISIAS.2011.6122809},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KhanTPL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/MuhayaKX11,
  author       = {Fahad Bin Muhaya and
                  Muhammad Khurram Khan and
                  Yang Xiang},
  title        = {Polymorphic Malware Detection Using Hierarchical Hidden Markov Model},
  booktitle    = {{IEEE} Ninth International Conference on Dependable, Autonomic and
                  Secure Computing, {DASC} 2011, 12-14 December 2011, Sydney, Australia},
  pages        = {151--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DASC.2011.47},
  doi          = {10.1109/DASC.2011.47},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dasc/MuhayaKX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/RafiqueAK11,
  author       = {M. Zubair Rafique and
                  Nasser Alrayes and
                  Muhammad Khurram Khan},
  editor       = {Natalio Krasnogor and
                  Pier Luca Lanzi},
  title        = {Application of evolutionary algorithms in detecting {SMS} spam at
                  access layer},
  booktitle    = {13th Annual Genetic and Evolutionary Computation Conference, {GECCO}
                  2011, Proceedings, Dublin, Ireland, July 12-16, 2011},
  pages        = {1787--1794},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2001576.2001816},
  doi          = {10.1145/2001576.2001816},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/RafiqueAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/LengZCKA11,
  author       = {Lu Leng and
                  Jiashu Zhang and
                  Gao Chen and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  editor       = {Beniamino Murgante and
                  Osvaldo Gervasi and
                  Andr{\'{e}}s Iglesias and
                  David Taniar and
                  Bernady O. Apduhan},
  title        = {Two-Directional Two-Dimensional Random Projection and Its Variations
                  for Face and Palmprint Recognition},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2011 - International
                  Conference, Santander, Spain, June 20-23, 2011. Proceedings, Part
                  {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6786},
  pages        = {458--470},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21934-4\_37},
  doi          = {10.1007/978-3-642-21934-4\_37},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/LengZCKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/EldefrawyAK11,
  author       = {Mohamed Hamdy Eldefrawy and
                  Khaled Alghathbar and
                  Muhammad Khurram Khan},
  editor       = {Shahram Latifi},
  title        = {OTP-Based Two-Factor Authentication Using Mobile Phones},
  booktitle    = {Eighth International Conference on Information Technology: New Generations,
                  {ITNG} 2011, Las Vegas, Nevada, USA, 11-13 April 2011},
  pages        = {327--331},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ITNG.2011.64},
  doi          = {10.1109/ITNG.2011.64},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itng/EldefrawyAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/RafiqueKKA11,
  author       = {M. Zubair Rafique and
                  Zeeshan Shafi Khan and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  editor       = {Shahram Latifi},
  title        = {Securing IP-Multimedia Subsystem {(IMS)} against Anomalous Message
                  Exploits by Using Machine Learning Algorithms},
  booktitle    = {Eighth International Conference on Information Technology: New Generations,
                  {ITNG} 2011, Las Vegas, Nevada, USA, 11-13 April 2011},
  pages        = {559--563},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ITNG.2011.102},
  doi          = {10.1109/ITNG.2011.102},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itng/RafiqueKKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/EldefrawyAKE11,
  author       = {Mohamed Hamdy Eldefrawy and
                  Khaled Alghathbar and
                  Muhammad Khurram Khan and
                  Hassan M. Elkamchouchi},
  title        = {Secure Instant Messaging Protocol for Centralized Communication Group},
  booktitle    = {4th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2011, Paris, France, February 7-10, 2011},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/NTMS.2011.5720590},
  doi          = {10.1109/NTMS.2011.5720590},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/EldefrawyAKE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/KhanAK11,
  author       = {Bilal Khan and
                  Khaled Alghathbar and
                  Muhammad Khurram Khan},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Rosslin John Robles and
                  Maricel O. Balitanas},
  title        = {Information Security Awareness Campaign: An Alternate Approach},
  booktitle    = {Information Security and Assurance - International Conference, {ISA}
                  2011, Brno, Czech Republic, August 15-17, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {200},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23141-4\_1},
  doi          = {10.1007/978-3-642-23141-4\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/KhanAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sta/RafiqueKAF11,
  author       = {M. Zubair Rafique and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Muddassar Farooq},
  editor       = {James J. Park and
                  Javier L{\'{o}}pez and
                  Sang{-}Soo Yeo and
                  Taeshik Shon and
                  David Taniar},
  title        = {Embedding High Capacity Covert Channels in Short Message Service {(SMS)}},
  booktitle    = {Secure and Trust Computing, Data Management and Applications - 8th
                  {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June
                  28-30, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {186},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22339-6\_1},
  doi          = {10.1007/978-3-642-22339-6\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sta/RafiqueKAF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sta/RafiqueKAF11a,
  author       = {M. Zubair Rafique and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Muddassar Farooq},
  editor       = {James J. Park and
                  Javier L{\'{o}}pez and
                  Sang{-}Soo Yeo and
                  Taeshik Shon and
                  David Taniar},
  title        = {A Framework for Detecting Malformed {SMS} Attack},
  booktitle    = {Secure and Trust Computing, Data Management and Applications - 8th
                  {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June
                  28-30, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {186},
  pages        = {11--20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22339-6\_2},
  doi          = {10.1007/978-3-642-22339-6\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sta/RafiqueKAF11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sta/LengZCKB11,
  author       = {Lu Leng and
                  Jiashu Zhang and
                  Gao Chen and
                  Muhammad Khurram Khan and
                  Ping Bai},
  editor       = {James J. Park and
                  Javier L{\'{o}}pez and
                  Sang{-}Soo Yeo and
                  Taeshik Shon and
                  David Taniar},
  title        = {Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level
                  Fusion},
  booktitle    = {Secure and Trust Computing, Data Management and Applications - 8th
                  {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June
                  28-30, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {186},
  pages        = {122--129},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22339-6\_15},
  doi          = {10.1007/978-3-642-22339-6\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sta/LengZCKB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fgit/2011sectech,
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Wai{-}Chi Fang and
                  L. Javier Garc{\'{\i}}a{-}Villalba and
                  Kirk P. Arnett and
                  Muhammad Khurram Khan},
  title        = {Security Technology - International Conference, SecTech 2011, Held
                  as Part of the Future Generation Information Technology Conference,
                  {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December
                  8-10, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {259},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27189-2},
  doi          = {10.1007/978-3-642-27189-2},
  isbn         = {978-3-642-27188-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/2011sectech.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/UsamaKAL10,
  author       = {Muhammad Usama and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Changhoon Lee},
  title        = {Chaos-based secure satellite imagery cryptosystem},
  journal      = {Comput. Math. Appl.},
  volume       = {60},
  number       = {2},
  pages        = {326--337},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.camwa.2009.12.033},
  doi          = {10.1016/J.CAMWA.2009.12.033},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/UsamaKAL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/KhanXZ10,
  author       = {Muhammad Khurram Khan and
                  Ling Xie and
                  Jiashu Zhang},
  title        = {Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric
                  data into audio signals},
  journal      = {Digit. Signal Process.},
  volume       = {20},
  number       = {1},
  pages        = {179--190},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.dsp.2009.05.004},
  doi          = {10.1016/J.DSP.2009.05.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/KhanXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/KhalilMKA10,
  author       = {Mohammed S. Khalil and
                  Dzulkifli Bin Mohamad and
                  Muhammad Khurram Khan and
                  Qais Al{-}Nuzaili},
  title        = {Fingerprint verification using statistical descriptors},
  journal      = {Digit. Signal Process.},
  volume       = {20},
  number       = {4},
  pages        = {1264--1273},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.dsp.2009.12.002},
  doi          = {10.1016/J.DSP.2009.12.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/KhalilMKA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoonKY10,
  author       = {Eun{-}Jun Yoon and
                  Muhammad Khurram Khan and
                  Kee{-}Young Yoo},
  title        = {Improvement of the Efficient Secret Broadcast Scheme},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {12},
  pages        = {3396--3399},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.3396},
  doi          = {10.1587/TRANSINF.E93.D.3396},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoonKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoonKY10a,
  author       = {Eun{-}Jun Yoon and
                  Muhammad Khurram Khan and
                  Kee{-}Young Yoo},
  title        = {Cryptanalysis of a Handover Authentication Scheme Using Credentials
                  Based on Chameleon Hashing},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {12},
  pages        = {3400--3402},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.3400},
  doi          = {10.1587/TRANSINF.E93.D.3400},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoonKY10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijccc/RahimKMSK10,
  author       = {Aneel Rahim and
                  Zeeshan Shafi Khan and
                  Fahad Bin Muhaya and
                  Muhammad Sher and
                  Muhammad Khurram Khan},
  title        = {Information Sharing in Vehicular AdHoc Network},
  journal      = {Int. J. Comput. Commun. Control},
  volume       = {5},
  number       = {5},
  pages        = {892--899},
  year         = {2010},
  url          = {https://doi.org/10.15837/ijccc.2010.5.2252},
  doi          = {10.15837/IJCCC.2010.5.2252},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijccc/RahimKMSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KhanKJ10,
  author       = {Muhammad Khurram Khan and
                  Mohamed Kamel and
                  Xudong Jiang},
  title        = {Special issue on: Recent advances and future directions in biometrics
                  personal identification},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {33},
  number       = {3},
  pages        = {205--206},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jnca.2010.03.019},
  doi          = {10.1016/J.JNCA.2010.03.019},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/KhanKJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/HeHFRCLKS10,
  author       = {Mingxing He and
                  Shi{-}Jinn Horng and
                  Pingzhi Fan and
                  Ray{-}Shine Run and
                  Rong{-}Jian Chen and
                  Jui{-}Lin Lai and
                  Muhammad Khurram Khan and
                  Kevin Octavius Sentosa},
  title        = {Performance evaluation of score level fusion in multimodal biometric
                  systems},
  journal      = {Pattern Recognit.},
  volume       = {43},
  number       = {5},
  pages        = {1789--1800},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.patcog.2009.11.018},
  doi          = {10.1016/J.PATCOG.2009.11.018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pr/HeHFRCLKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KhanA10,
  author       = {Muhammad Khurram Khan and
                  Khaled Alghathbar},
  title        = {Cryptanalysis and Security Improvements of 'Two-Factor User Authentication
                  in Wireless Sensor Networks'},
  journal      = {Sensors},
  volume       = {10},
  number       = {3},
  pages        = {2450--2459},
  year         = {2010},
  url          = {https://doi.org/10.3390/s100302450},
  doi          = {10.3390/S100302450},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KhanA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/EldefrawyKAC10,
  author       = {Mohamed Hamdy Eldefrawy and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Eun{-}suk Cho},
  title        = {Broadcast Authentication for Wireless Sensor Networks Using Nested
                  Hashing and the Chinese Remainder Theorem},
  journal      = {Sensors},
  volume       = {10},
  number       = {9},
  pages        = {8683--8695},
  year         = {2010},
  url          = {https://doi.org/10.3390/s100908683},
  doi          = {10.3390/S100908683},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/EldefrawyKAC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/RazzakKAY10,
  author       = {Muhammad Imran Razzak and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Rubiyah Yousaf},
  title        = {Face Recognition using Layered Linear Discriminant Analysis and Small
                  Subspace},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {1407--1412},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.252},
  doi          = {10.1109/CIT.2010.252},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/RazzakKAY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KhanAKAA10,
  author       = {Bilal Khan and
                  Khaled Alghathbar and
                  Muhammad Khurram Khan and
                  Abdullah M. AlKelabi and
                  Abdulaziz Alajaji},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Using Arabic {CAPTCHA} for Cyber Security},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {8--17},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_2},
  doi          = {10.1007/978-3-642-17610-4\_2},
  timestamp    = {Sat, 30 Sep 2023 09:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/KhanAKAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/EldefrawyKA10,
  author       = {Mohamed Hamdy Eldefrawy and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {One-Time Password System with Infinite Nested Hash Chains},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {161--170},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_18},
  doi          = {10.1007/978-3-642-17610-4\_18},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/EldefrawyKA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/RazzakKA10,
  author       = {Muhammad Imran Razzak and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Contactless Biometrics in Wireless Sensor Network: {A} Survey},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {236--243},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_27},
  doi          = {10.1007/978-3-642-17610-4\_27},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgit/RazzakKA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/LengZXKA10,
  author       = {Lu Leng and
                  Jiashu Zhang and
                  Jing Xu and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  title        = {Dynamic weighted discrimination power analysis in {DCT} domain for
                  face and palmprint recognition},
  booktitle    = {International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2010, Jeju, South Korea, 17-19 November 2010},
  pages        = {467--471},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICTC.2010.5674791},
  doi          = {10.1109/ICTC.2010.5674791},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictc/LengZXKA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/RazzakKA10,
  author       = {Muhammad Imran Razzak and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  editor       = {Isao Echizen and
                  Jeng{-}Shyang Pan and
                  Dieter W. Fellner and
                  Alexander Nouak and
                  Arjan Kuijper and
                  Lakhmi C. Jain},
  title        = {Bio-inspired Hybrid Face Recognition System for Small Sample Size
                  and Large Dataset},
  booktitle    = {Sixth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany,
                  15-17 October, 2010, Proceedings},
  pages        = {384--388},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IIHMSP.2010.99},
  doi          = {10.1109/IIHMSP.2010.99},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/RazzakKA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/KhanKMA10,
  author       = {Bilal Khan and
                  Muhammad Khurram Khan and
                  Maqsood Mahmud and
                  Khaled Alghathbar},
  editor       = {Reijo Savola and
                  Masaru Takesue and
                  Rainer Falk and
                  Manuela Popescu},
  title        = {Security Analysis of Firewall Rule Sets in Computer Networks},
  booktitle    = {Fourth International Conference on Emerging Security Information Systems
                  and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010},
  pages        = {51--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SECURWARE.2010.16},
  doi          = {10.1109/SECURWARE.2010.16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securware/KhanKMA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/KhanA10,
  author       = {Muhammad Khurram Khan and
                  Khaled Alghathbar},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli},
  title        = {Security Analysis of 'Two-Factor User Authentication in Wireless Sensor
                  Networks'},
  booktitle    = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN}
                  2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6059},
  pages        = {55--60},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13577-4\_5},
  doi          = {10.1007/978-3-642-13577-4\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/KhanA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acn/2010,
  editor       = {Chin{-}Chen Chang and
                  Thanos Vasilakos and
                  Purnendu Das and
                  Tai{-}Hoon Kim and
                  Byeong{-}Ho Kang and
                  Muhammad Khurram Khan},
  title        = {Advanced Communication and Networking - Second International Conference,
                  {ACN} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {77},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13405-0},
  doi          = {10.1007/978-3-642-13405-0},
  isbn         = {978-3-642-13404-3},
  timestamp    = {Tue, 12 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acn/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fgit/2010asea,
  editor       = {Tai{-}Hoon Kim and
                  Haeng{-}Kon Kim and
                  Muhammad Khurram Khan and
                  Kiumi Akingbehin and
                  Wai{-}Chi Fang and
                  Dominik Slezak},
  title        = {Advances in Software Engineering - International Conference, {ASEA}
                  2010, Held as Part of the Future Generation Information Technology
                  Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010.
                  Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {117},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17578-7},
  doi          = {10.1007/978-3-642-17578-7},
  isbn         = {978-3-642-17577-0},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/2010asea.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fgit/2010sectech,
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4},
  doi          = {10.1007/978-3-642-17610-4},
  isbn         = {978-3-642-17609-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/2010sectech.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/AlghamdiUMK09,
  author       = {Abdullah Sharaf Alghamdi and
                  Hanif Ullah and
                  Maqsood Mahmud and
                  Muhammad Khurram Khan},
  title        = {Bio-chaotic Stream Cipher-Based Iris Image Encryption},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on Computational
                  Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
                  29-31, 2009},
  pages        = {739--744},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSE.2009.317},
  doi          = {10.1109/CSE.2009.317},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cse/AlghamdiUMK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/MahmudKA09,
  author       = {Maqsood Mahmud and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  editor       = {Dominik Slezak and
                  Tughrul Arslan and
                  Wai{-}Chi Fang and
                  Xiaofeng Song and
                  Tai{-}Hoon Kim},
  title        = {Biometric-Gaussian-Stream {(BGS)} Cipher with New Aspect of Image
                  Encryption (Data Hiding)},
  booktitle    = {Bio-Science and Bio-Technology - International Conference, {BSBT}
                  2009 Held as Part of the Future Generation Information Technology
                  Conference, {FGIT} 2009 Jeju Island, Korea, December 10-12, 2009 Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {57},
  pages        = {97--107},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10616-3\_14},
  doi          = {10.1007/978-3-642-10616-3\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/MahmudKA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icic/MuhayaUK09,
  author       = {Fahad Bin Muhaya and
                  Muhammad Usama and
                  Muhammad Khurram Khan},
  editor       = {De{-}Shuang Huang and
                  Kang{-}Hyun Jo and
                  Hong{-}Hee Lee and
                  Hee{-}Jun Kang and
                  Vitoantonio Bevilacqua},
  title        = {Modified {AES} Using Chaotic Key Generator for Satellite Imagery Encryption},
  booktitle    = {Emerging Intelligent Computing Technology and Applications, 5th International
                  Conference on Intelligent Computing, {ICIC} 2009, Ulsan, South Korea,
                  September 16-19, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5754},
  pages        = {1014--1024},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04070-2\_107},
  doi          = {10.1007/978-3-642-04070-2\_107},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icic/MuhayaUK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Khan09,
  author       = {Muhammad Khurram Khan},
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  Haining Wang and
                  Wanlei Zhou},
  title        = {Enhancing the Security of a 'More Efficient {\&} Secure Dynamic
                  ID-Based Remote User Authentication Scheme'},
  booktitle    = {Third International Conference on Network and System Security, {NSS}
                  2009, Gold Coast, Queensland, Australia, October 19-21, 2009},
  pages        = {420--424},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NSS.2009.100},
  doi          = {10.1109/NSS.2009.100},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Khan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/KhanZ08,
  author       = {Muhammad Khurram Khan and
                  Jiashu Zhang},
  title        = {Multimodal face and fingerprint biometrics authentication on space-limited
                  tokens},
  journal      = {Neurocomputing},
  volume       = {71},
  number       = {13-15},
  pages        = {3026--3031},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.neucom.2007.12.017},
  doi          = {10.1016/J.NEUCOM.2007.12.017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/KhanZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/KhanZ07,
  author       = {Muhammad Khurram Khan and
                  Jiashu Zhang},
  title        = {Improving the security of 'a flexible biometrics remote user authentication
                  scheme'},
  journal      = {Comput. Stand. Interfaces},
  volume       = {29},
  number       = {1},
  pages        = {82--85},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.csi.2006.01.002},
  doi          = {10.1016/J.CSI.2006.01.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/KhanZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/WangZZK07,
  author       = {Xiaomin Wang and
                  Wenfang Zhang and
                  Jiashu Zhang and
                  Muhammad Khurram Khan},
  title        = {Cryptanalysis and improvement on two efficient remote user authentication
                  scheme using smart cards},
  journal      = {Comput. Stand. Interfaces},
  volume       = {29},
  number       = {5},
  pages        = {507--512},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.csi.2006.11.005},
  doi          = {10.1016/J.CSI.2006.11.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/WangZZK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/KhanXZ07,
  author       = {Muhammad Khurram Khan and
                  Ling Xie and
                  Jiashu Zhang},
  editor       = {Seong{-}Whan Lee and
                  Stan Z. Li},
  title        = {Robust Hiding of Fingerprint-Biometric Data into Audio Signals},
  booktitle    = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul,
                  Korea, August 27-29, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4642},
  pages        = {702--712},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74549-5\_74},
  doi          = {10.1007/978-3-540-74549-5\_74},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/KhanXZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icic/KhanZ07,
  author       = {Muhammad Khurram Khan and
                  Jiashu Zhang},
  editor       = {De{-}Shuang Huang and
                  Laurent Heutte and
                  Marco Loog},
  title        = {An Intelligent Fingerprint-Biometric Image Scrambling Scheme},
  booktitle    = {Advanced Intelligent Computing Theories and Applications. With Aspects
                  of Artificial Intelligence, Third International Conference on Intelligent
                  Computing, {ICIC} 2007, Qingdao, China, August 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4682},
  pages        = {1141--1151},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74205-0\_118},
  doi          = {10.1007/978-3-540-74205-0\_118},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icic/KhanZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/KhanZ06,
  author       = {Muhammad Khurram Khan and
                  Jiashu Zhang},
  title        = {Pointing a Finger toward Standardized and Automated Biometrics},
  journal      = {{IEEE} Multim.},
  volume       = {13},
  number       = {4},
  pages        = {73--75},
  year         = {2006},
  url          = {https://doi.org/10.1109/MMUL.2006.90},
  doi          = {10.1109/MMUL.2006.90},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeemm/KhanZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/JosephBBCDJGGLSIFLKFGGSNPWWSSLYKZ06,
  author       = {Anthony D. Joseph and
                  Alastair R. Beresford and
                  Jean Bacon and
                  David Naveen Cottingham and
                  Jonathan J. Davies and
                  Brian D. Jones and
                  Haitao Guo and
                  Wei Guan and
                  Yong Lin and
                  Houbing Song and
                  Liviu Iftode and
                  Simone Fuchs and
                  Bernhard Lamprecht and
                  Kyandoghere Kyamakya and
                  Jorge Gonz{\'{a}}lez Fern{\'{a}}ndez and
                  Juan Carlos Yelmo Garc{\'{\i}}a and
                  Yod Samuel Mart{\'{\i}}n Garc{\'{\i}}a and
                  Jorge de Gracia Santos and
                  Milind Nimesh and
                  Gang Pan and
                  Zhaohui Wu and
                  Qing Wu and
                  Zhenyu Shan and
                  Jie Sun and
                  Jian Lu and
                  Guoqing Yang and
                  Muhammad Khurram Khan and
                  Jiashu Zhang},
  title        = {Intelligent Transportation Systems},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {5},
  number       = {4},
  pages        = {63--67},
  year         = {2006},
  url          = {https://doi.org/10.1109/MPRV.2006.77},
  doi          = {10.1109/MPRV.2006.77},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/JosephBBCDJGGLSIFLKFGGSNPWWSSLYKZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isnn/KhanZ06,
  author       = {Muhammad Khurram Khan and
                  Jiashu Zhang},
  editor       = {Jun Wang and
                  Zhang Yi and
                  Jacek M. Zurada and
                  Bao{-}Liang Lu and
                  Hujun Yin},
  title        = {Enhancing the Transmission Security of Content-Based Hidden Biometric
                  Data},
  booktitle    = {Advances in Neural Networks - {ISNN} 2006, Third International Symposium
                  on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3973},
  pages        = {214--223},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11760191\_32},
  doi          = {10.1007/11760191\_32},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isnn/KhanZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KhanZ06,
  author       = {Muhammad Khurram Khan and
                  Jiashu Zhang},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {An Efficient and Practical Fingerprint-Based Remote User Authentication
                  Scheme with Smart Cards},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {260--268},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_24},
  doi          = {10.1007/11689522\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KhanZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icic/KhanZ05,
  author       = {Muhammad Khurram Khan and
                  Jiashu Zhang},
  editor       = {De{-}Shuang Huang and
                  Xiao{-}Ping (Steven) Zhang and
                  Guang{-}Bin Huang},
  title        = {Securing Biometric Templates for Reliable Identity Authentication},
  booktitle    = {Advances in Intelligent Computing, International Conference on Intelligent
                  Computing, {ICIC} 2005, Hefei, China, August 23-26, 2005, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3645},
  pages        = {723--732},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11538356\_75},
  doi          = {10.1007/11538356\_75},
  timestamp    = {Thu, 12 Dec 2019 16:43:34 +0100},
  biburl       = {https://dblp.org/rec/conf/icic/KhanZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sinobiometrics/KhanZT04,
  author       = {Muhammad Khurram Khan and
                  Jiashu Zhang and
                  Lei Tian},
  editor       = {Stan Z. Li and
                  Jian{-}Huang Lai and
                  Tieniu Tan and
                  Guo{-}Can Feng and
                  Yangsheng Wang},
  title        = {Protecting Biometric Data for Personal Identification},
  booktitle    = {Advances in Biometric Person Authentication, 5th Chinese Conference
                  on Biometric Recognition, {SINOBIOMETRICS} 2004, Guangzhou, China,
                  December 13-14, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3338},
  pages        = {629--638},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30548-4\_72},
  doi          = {10.1007/978-3-540-30548-4\_72},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/sinobiometrics/KhanZT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics