BibTeX records: Abid Khan

download as .bib file

@article{DBLP:journals/iot/GilaniAKSMS24,
  author       = {Syeda Mahnoor Gilani and
                  Adeel Anjum and
                  Abid Khan and
                  Madiha Haider Syed and
                  Syed Atif Moqurrab and
                  Gautam Srivastava},
  title        = {A robust Internet of Drones security surveillance communication network
                  based on {IOTA}},
  journal      = {Internet Things},
  volume       = {25},
  pages        = {101066},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.iot.2024.101066},
  doi          = {10.1016/J.IOT.2024.101066},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/GilaniAKSMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/BatoolAKIMJ24,
  author       = {Hajira Batool and
                  Adeel Anjum and
                  Abid Khan and
                  Stefano Izzo and
                  Carlo Mazzocca and
                  Gwanggil Jeon},
  title        = {A secure and privacy preserved infrastructure for VANETs based on
                  federated learning with local differential privacy},
  journal      = {Inf. Sci.},
  volume       = {652},
  pages        = {119717},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.119717},
  doi          = {10.1016/J.INS.2023.119717},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/BatoolAKIMJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/IftikharAKSJ23,
  author       = {Zainab Iftikhar and
                  Adeel Anjum and
                  Abid Khan and
                  Munam Ali Shah and
                  Gwanggil Jeon},
  title        = {Privacy preservation in the internet of vehicles using local differential
                  privacy and {IOTA} ledger},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {6},
  pages        = {3361--3377},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-023-04002-0},
  doi          = {10.1007/S10586-023-04002-0},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/IftikharAKSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/IftikharAKSJ23a,
  author       = {Zainab Iftikhar and
                  Adeel Anjum and
                  Abid Khan and
                  Munam Ali Shah and
                  Gwanggil Jeon},
  title        = {Correction: Privacy preservation in the internet of vehicles using
                  local differential privacy and {IOTA} ledger},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {6},
  pages        = {3379},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-023-04051-5},
  doi          = {10.1007/S10586-023-04051-5},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/IftikharAKSJ23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZafarRJUAK23,
  author       = {Waseeq Ul Islam Zafar and
                  Muhammad Atif Ur Rehman and
                  Farhana Jabeen and
                  Rehmat Ullah and
                  Ghulam Abbas and
                  Abid Khan},
  title        = {Decentralized Receiver-based Link Stability-aware Forwarding Scheme
                  for NDN-based VANETs},
  journal      = {Comput. Networks},
  volume       = {236},
  pages        = {109996},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109996},
  doi          = {10.1016/J.COMNET.2023.109996},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ZafarRJUAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssc/KhanBRUA23,
  author       = {Abid Khan and
                  Zahid Bashir and
                  H. M. Kashif Rasheed and
                  Mahmood Ulhassan and
                  Rashid Ahmed},
  title        = {Construction of minimal circular nearly strongly balanced repeated
                  measurements designs and their conversion},
  journal      = {Commun. Stat. Simul. Comput.},
  volume       = {52},
  number       = {12},
  pages        = {5749--5758},
  year         = {2023},
  url          = {https://doi.org/10.1080/03610918.2021.2016831},
  doi          = {10.1080/03610918.2021.2016831},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cssc/KhanBRUA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/YakubuKKJJ23,
  author       = {Bello Musa Yakubu and
                  Majid Iqbal Khan and
                  Abid Khan and
                  Farhana Jabeen and
                  Gwanggil Jeon},
  title        = {Blockchain-based DDoS attack mitigation protocol for device-to-device
                  interaction in smart home},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {2},
  pages        = {383--392},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2023.01.013},
  doi          = {10.1016/J.DCAN.2023.01.013},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/YakubuKKJJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/KanwalAAKJ23,
  author       = {Tehsin Kanwal and
                  Hasina Attaullah and
                  Adeel Anjum and
                  Abid Khan and
                  Gwanggil Jeon},
  title        = {Fuzz-classification (\emph{p}, \emph{l})-Angel: An enhanced hybrid
                  artificial intelligence based fuzzy logic for multiple sensitive attributes
                  against privacy breaches},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {5},
  pages        = {1131--1140},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.09.025},
  doi          = {10.1016/J.DCAN.2022.09.025},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcan/KanwalAAKJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/SikandarMAKJ23,
  author       = {Hira S. Sikandar and
                  Saif Ur Rehman Malik and
                  Adeel Anjum and
                  Abid Khan and
                  Gwanggil Jeon},
  title        = {Cohort-based kernel principal component analysis with Multi-path Service
                  Routing in Federated Learning},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {149},
  pages        = {518--530},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2023.07.037},
  doi          = {10.1016/J.FUTURE.2023.07.037},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/SikandarMAKJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/FazalKASKR23,
  author       = {Rabeeha Fazal and
                  Razaullah Khan and
                  Adeel Anjum and
                  Madiha Haider Syed and
                  Abid Khan and
                  Semeen Rehman},
  title        = {Improved angelization technique against background knowledge attack
                  for 1:M microdata},
  journal      = {PeerJ Comput. Sci.},
  volume       = {9},
  pages        = {e1255},
  year         = {2023},
  url          = {https://doi.org/10.7717/peerj-cs.1255},
  doi          = {10.7717/PEERJ-CS.1255},
  timestamp    = {Thu, 18 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/FazalKASKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/quantum/GustafsonLKKKAORI23,
  author       = {Erik J. Gustafson and
                  Andy C. Y. Li and
                  Abid Khan and
                  Joonho Kim and
                  Doga Murat Kurkcuoglu and
                  M. Sohaib Alam and
                  Peter P. Orth and
                  Armin Rahmani and
                  Thomas Iadecola},
  title        = {Preparing quantum many-body scar states on quantum computers},
  journal      = {Quantum},
  volume       = {7},
  pages        = {1171},
  year         = {2023},
  url          = {https://doi.org/10.22331/q-2023-11-07-1171},
  doi          = {10.22331/Q-2023-11-07-1171},
  timestamp    = {Thu, 28 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/quantum/GustafsonLKKKAORI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AhmedDHKK23,
  author       = {Mansoor Ahmed and
                  Amil Rohani Dar and
                  Markus Helfert and
                  Abid Khan and
                  Jungsuk Kim},
  title        = {Data Provenance in Healthcare: Approaches, Challenges, and Future
                  Directions},
  journal      = {Sensors},
  volume       = {23},
  number       = {14},
  pages        = {6495},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23146495},
  doi          = {10.3390/S23146495},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AhmedDHKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-07743,
  author       = {Abid Khan and
                  Chia{-}Hao Lee and
                  Pinshane Y. Huang and
                  Bryan K. Clark},
  title        = {Using CycleGANs to Generate Realistic {STEM} Images for Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2301.07743},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.07743},
  doi          = {10.48550/ARXIV.2301.07743},
  eprinttype    = {arXiv},
  eprint       = {2301.07743},
  timestamp    = {Fri, 27 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-07743.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WaheedSMKMAS22,
  author       = {Abdul Waheed and
                  Munam Ali Shah and
                  Syed Muhammad Mohsin and
                  Abid Khan and
                  Carsten Maple and
                  Sheraz Aslam and
                  Shahab Shamshirband},
  title        = {A Comprehensive Review of Computing Paradigms, Enabling Computation
                  Offloading and Task Execution in Vehicular Networks},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {3580--3600},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2021.3138219},
  doi          = {10.1109/ACCESS.2021.3138219},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WaheedSMKMAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/AliKAJ22,
  author       = {Ahmad Ali and
                  Abid Khan and
                  Mansoor Ahmed and
                  Gwanggil Jeon},
  title        = {{BCALS:} Blockchain-based secure log management system for cloud computing},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {33},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/ett.4272},
  doi          = {10.1002/ETT.4272},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/AliKAJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/KhanTAMYKRM22,
  author       = {Razaullah Khan and
                  Xiaofeng Tao and
                  Adeel Anjum and
                  Saif Ur Rehman Malik and
                  Shui Yu and
                  Abid Khan and
                  Waheed ur Rehman and
                  Hassan Malik},
  title        = {({\(\tau\)}, m)-slicedBucket privacy model for sequential anonymization
                  for improving privacy and utility},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {33},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/ett.4130},
  doi          = {10.1002/ETT.4130},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/KhanTAMYKRM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/KanwalMAKRJ22,
  author       = {Tehsin Kanwal and
                  Syed Atif Moqurrab and
                  Adeel Anjum and
                  Abid Khan and
                  Joel J. P. C. Rodrigues and
                  Gwanggil Jeon},
  title        = {Formal verification and complexity analysis of confidentiality aware
                  textual clinical documents framework},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {12},
  pages        = {10380--10399},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22533},
  doi          = {10.1002/INT.22533},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/KanwalMAKRJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HameedGAKK22,
  author       = {Khizar Hameed and
                  Saurabh Garg and
                  Muhammad Bilal Amin and
                  Byeong Kang and
                  Abid Khan},
  title        = {A context-aware information-based clone node attack detection scheme
                  in Internet of Things},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {197},
  pages        = {103271},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jnca.2021.103271},
  doi          = {10.1016/J.JNCA.2021.103271},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/HameedGAKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/ArifKAKGKY22,
  author       = {Muhammad Arif and
                  Muhammad Kabir and
                  Saeed Ahmed and
                  Abid Khan and
                  Fang Ge and
                  Adel Khelifi and
                  Dong{-}Jun Yu},
  title        = {DeepCPPred: {A} Deep Learning Framework for the Discrimination of
                  Cell-Penetrating Peptides and Their Uptake Efficiencies},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {19},
  number       = {5},
  pages        = {2749--2759},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCBB.2021.3102133},
  doi          = {10.1109/TCBB.2021.3102133},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcbb/ArifKAKGKY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/KhanSMAJ22,
  author       = {Abid Khan and
                  Furqan Shahid and
                  Carsten Maple and
                  Awais Ahmad and
                  Gwanggil Jeon},
  title        = {Toward Smart Manufacturing Using Spiral Digital Twin Framework and
                  Twinchain},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {2},
  pages        = {1359--1366},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2020.3047840},
  doi          = {10.1109/TII.2020.3047840},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/KhanSMAJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/MoqurrabAKAAJ22,
  author       = {Syed Atif Moqurrab and
                  Adeel Anjum and
                  Abid Khan and
                  Mansoor Ahmed and
                  Awais Ahmad and
                  Gwanggil Jeon},
  title        = {\emph{Deep-Confidentiality}: An IoT-Enabled Privacy-Preserving Framework
                  for Unstructured Big Biomedical Data},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {2},
  pages        = {42:1--42:21},
  year         = {2022},
  url          = {https://doi.org/10.1145/3421509},
  doi          = {10.1145/3421509},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/MoqurrabAKAAJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-00074,
  author       = {M. Rahman and
                  Abid Khan and
                  Sayeed Anowar and
                  Md. Al Imran and
                  Richa Verma and
                  Dinesh Kumar and
                  Kazuma Kobayashi and
                  Syed B. Alam},
  title        = {Leveraging Industry 4.0 - Deep Learning, Surrogate Model and Transfer
                  Learning with Uncertainty Quantification Incorporated into Digital
                  Twin for Nuclear System},
  journal      = {CoRR},
  volume       = {abs/2210.00074},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.00074},
  doi          = {10.48550/ARXIV.2210.00074},
  eprinttype    = {arXiv},
  eprint       = {2210.00074},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-00074.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/KhanKJAJ21,
  author       = {Hayat Mohammad Khan and
                  Abid Khan and
                  Farhana Jabeen and
                  Adeel Anjum and
                  Gwanggil Jeon},
  title        = {Fog-enabled secure multiparty computation based aggregation scheme
                  in smart grid},
  journal      = {Comput. Electr. Eng.},
  volume       = {94},
  pages        = {107358},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.compeleceng.2021.107358},
  doi          = {10.1016/J.COMPELECENG.2021.107358},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/KhanKJAJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/KhanKASJ21,
  author       = {Nasir Ali Khan and
                  Abid Khan and
                  Mansoor Ahmad and
                  Munam Ali Shah and
                  Gwanggil Jeon},
  title        = {{URL} filtering using big data analytics in 5G networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {95},
  pages        = {107379},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.compeleceng.2021.107379},
  doi          = {10.1016/J.COMPELECENG.2021.107379},
  timestamp    = {Tue, 26 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/KhanKASJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/NasirSAKJ21,
  author       = {Adeena Nasir and
                  Munam Ali Shah and
                  Ummarah Ashraf and
                  Abid Khan and
                  Gwanggil Jeon},
  title        = {An intelligent framework to predict socioeconomic impacts of {COVID-19}
                  and public sentiments},
  journal      = {Comput. Electr. Eng.},
  volume       = {96},
  number       = {Part},
  pages        = {107526},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.compeleceng.2021.107526},
  doi          = {10.1016/J.COMPELECENG.2021.107526},
  timestamp    = {Wed, 26 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/NasirSAKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/SuhailHKH21,
  author       = {Sabah Suhail and
                  Rasheed Hussain and
                  Abid Khan and
                  Choong Seon Hong},
  title        = {Corrigendum to "Orchestrating product provenance story: When
                  {IOTA} ecosystem meets electronics supply chain space" [Comput.
                  Ind. 123 (December) {(2020)} 103334]},
  journal      = {Comput. Ind.},
  volume       = {128},
  pages        = {103392},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.compind.2020.103392},
  doi          = {10.1016/J.COMPIND.2020.103392},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cii/SuhailHKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/KanwalAK21,
  author       = {Tehsin Kanwal and
                  Adeel Anjum and
                  Abid Khan},
  title        = {Privacy preservation in e-health cloud: taxonomy, privacy requirements,
                  feasibility analysis, and opportunities},
  journal      = {Clust. Comput.},
  volume       = {24},
  number       = {1},
  pages        = {293--317},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10586-020-03106-1},
  doi          = {10.1007/S10586-020-03106-1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/KanwalAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KanwalAMHKMA21,
  author       = {Tehsin Kanwal and
                  Adeel Anjum and
                  Saif Ur Rehman Malik and
                  Sajjad Haider and
                  Abid Khan and
                  Umar Manzoor and
                  Alia Asheralieva},
  title        = {A robust privacy preserving approach for electronic health records
                  using multiple dataset with multiple sensitive attributes},
  journal      = {Comput. Secur.},
  volume       = {105},
  pages        = {102224},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102224},
  doi          = {10.1016/J.COSE.2021.102224},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KanwalAMHKMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/YakubuKJK21,
  author       = {Bello Musa Yakubu and
                  Majid I. Khan and
                  Nadeem Javaid and
                  Abid Khan},
  title        = {Blockchain-based secure multi-resource trading model for smart marketplace},
  journal      = {Computing},
  volume       = {103},
  number       = {3},
  pages        = {379--400},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00607-020-00886-7},
  doi          = {10.1007/S00607-020-00886-7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computing/YakubuKJK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/KanwalAMKK21,
  author       = {Tehsin Kanwal and
                  Adeel Anjum and
                  Saif Ur Rehman Malik and
                  Abid Khan and
                  Muazzam Ali Khan Khattak},
  title        = {Privacy preservation of electronic health records with adversarial
                  attacks identification in hybrid cloud},
  journal      = {Comput. Stand. Interfaces},
  volume       = {78},
  pages        = {103522},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.csi.2021.103522},
  doi          = {10.1016/J.CSI.2021.103522},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/KanwalAMKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/UllahSKJ21,
  author       = {Ikram Ullah and
                  Munam Ali Shah and
                  Abid Khan and
                  Gwanggil Jeon},
  title        = {Privacy-preserving multilevel obfuscation scheme for vehicular network},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.4204},
  doi          = {10.1002/ETT.4204},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/UllahSKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/KanwalAKAJ21,
  author       = {Tehsin Kanwal and
                  Adeel Anjum and
                  Abid Khan and
                  Alia Asheralieva and
                  Gwanggil Jeon},
  title        = {A formal adversarial perspective: Secure and efficient electronic
                  health records collection scheme for multi-records datasets},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {8},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.4180},
  doi          = {10.1002/ETT.4180},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/KanwalAKAJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/JabeenKHRK21,
  author       = {Farhana Jabeen and
                  Zia{-}ur{-}Rehman Khan and
                  Zara Hamid and
                  Zobia Rehman and
                  Abid Khan},
  title        = {Adaptive and survivable trust management for Internet of Things systems},
  journal      = {{IET} Inf. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {375--394},
  year         = {2021},
  url          = {https://doi.org/10.1049/ise2.12029},
  doi          = {10.1049/ISE2.12029},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/JabeenKHRK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SuhailHKH21,
  author       = {Sabah Suhail and
                  Rasheed Hussain and
                  Abid Khan and
                  Choong Seon Hong},
  title        = {On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things:
                  Current Solutions and Future Directions},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {1},
  pages        = {1--17},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3013019},
  doi          = {10.1109/JIOT.2020.3013019},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/SuhailHKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/AliAKAIH21,
  author       = {Ahmad Ali and
                  Mansoor Ahmed and
                  Abid Khan and
                  Adeel Anjum and
                  Muhammad Ilyas and
                  Markus Helfert},
  title        = {VisTAS: blockchain-based visible and trusted remote authentication
                  system},
  journal      = {PeerJ Comput. Sci.},
  volume       = {7},
  pages        = {e516},
  year         = {2021},
  url          = {https://doi.org/10.7717/peerj-cs.516},
  doi          = {10.7717/PEERJ-CS.516},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/AliAKAIH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/AhmedAMKAT21,
  author       = {Mansoor Ahmed and
                  Kainat Ansar and
                  Cal B. Muckley and
                  Abid Khan and
                  Adeel Anjum and
                  Muhammad Talha},
  title        = {A semantic rule based digital fraud detection},
  journal      = {PeerJ Comput. Sci.},
  volume       = {7},
  pages        = {e649},
  year         = {2021},
  url          = {https://doi.org/10.7717/peerj-cs.649},
  doi          = {10.7717/PEERJ-CS.649},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/AhmedAMKAT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WaheedSKMU21,
  author       = {Abdul Waheed and
                  Munam Ali Shah and
                  Abid Khan and
                  Carsten Maple and
                  Ikram Ullah},
  title        = {Hybrid Task Coordination Using Multi-Hop Communication in Volunteer
                  Computing-Based VANETs},
  journal      = {Sensors},
  volume       = {21},
  number       = {8},
  pages        = {2718},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21082718},
  doi          = {10.3390/S21082718},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WaheedSKMU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/UllahSKMW21,
  author       = {Ikram Ullah and
                  Munam Ali Shah and
                  Abid Khan and
                  Carsten Maple and
                  Abdul Waheed},
  title        = {Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy
                  Preservation in VANETs},
  journal      = {Sensors},
  volume       = {21},
  number       = {9},
  pages        = {3077},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21093077},
  doi          = {10.3390/S21093077},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/UllahSKMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZafarKMAMA21,
  author       = {Faheem Zafar and
                  Abid Khan and
                  Saif Ur Rehman Malik and
                  Mansoor Ahmed and
                  Carsten Maple and
                  Adeel Anjum},
  title        = {MobChain: Three-Way Collusion Resistance in Witness-Oriented Location
                  Proof Systems Using Distributed Consensus},
  journal      = {Sensors},
  volume       = {21},
  number       = {15},
  pages        = {5096},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21155096},
  doi          = {10.3390/S21155096},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ZafarKMAMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/KhanDJP21,
  author       = {Abid Khan and
                  Sadia Din and
                  Gwanggil Jeon and
                  Francesco Piccialli},
  title        = {Lucy With Agents in the Sky: Trustworthiness of Cloud Storage for
                  Industrial Internet of Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {2},
  pages        = {953--960},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.2974493},
  doi          = {10.1109/TII.2020.2974493},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/KhanDJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/UllahSK21,
  author       = {Ikram Ullah and
                  Munam Ali Shah and
                  Abid Khan},
  title        = {Adaptive Grouping and Pseudonym Changing Policy for Protection of
                  Vehicles Location Information in VANETs},
  booktitle    = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2021,
                  Orlando, FL, USA, December 5-7, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SSCI50451.2021.9659852},
  doi          = {10.1109/SSCI50451.2021.9659852},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssci/UllahSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-15890,
  author       = {Khizar Hameed and
                  Saurabh Garg and
                  Muhammad Bilal Amin and
                  Byeong Kang and
                  Abid Khan},
  title        = {A Context-Aware Information-Based Clone Node Attack Detection Scheme
                  in Internet of Things},
  journal      = {CoRR},
  volume       = {abs/2106.15890},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.15890},
  eprinttype    = {arXiv},
  eprint       = {2106.15890},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-15890.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AmjidKS20,
  author       = {Ayesha Amjid and
                  Abid Khan and
                  Munam Ali Shah},
  title        = {VANET-Based Volunteer Computing {(VBVC):} {A} Computational Paradigm
                  for Future Autonomous Vehicles},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {71763--71774},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2974500},
  doi          = {10.1109/ACCESS.2020.2974500},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AmjidKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cam/KhanZ20,
  author       = {Abid Khan and
                  Yuanguo Zhu},
  title        = {New algorithms for parameter reduction of intuitionistic fuzzy soft
                  sets},
  journal      = {Comput. Appl. Math.},
  volume       = {39},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1007/s40314-020-01279-4},
  doi          = {10.1007/S40314-020-01279-4},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cam/KhanZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ShahidKJ20,
  author       = {Furqan Shahid and
                  Abid Khan and
                  Gwanggil Jeon},
  title        = {Post-quantum distributed ledger for internet of things},
  journal      = {Comput. Electr. Eng.},
  volume       = {83},
  pages        = {106581},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.compeleceng.2020.106581},
  doi          = {10.1016/J.COMPELECENG.2020.106581},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/ShahidKJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/SuhailHKH20,
  author       = {Sabah Suhail and
                  Rasheed Hussain and
                  Abid Khan and
                  Choong Seon Hong},
  title        = {Orchestrating product provenance story: When {IOTA} ecosystem meets
                  electronics supply chain space},
  journal      = {Comput. Ind.},
  volume       = {123},
  pages        = {103334},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.compind.2020.103334},
  doi          = {10.1016/J.COMPIND.2020.103334},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cii/SuhailHKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SuhailHAPKH20,
  author       = {Sabah Suhail and
                  Rasheed Hussain and
                  Mohammad M. Abdellatif and
                  Shashi Raj Pandey and
                  Abid Khan and
                  Choong Seon Hong},
  title        = {Provenance-enabled packet path tracing in the RPL-based internet of
                  things},
  journal      = {Comput. Networks},
  volume       = {173},
  pages        = {107189},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107189},
  doi          = {10.1016/J.COMNET.2020.107189},
  timestamp    = {Mon, 23 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/SuhailHAPKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ShahidK20,
  author       = {Furqan Shahid and
                  Abid Khan},
  title        = {Smart Digital Signatures {(SDS):} {A} post-quantum digital signature
                  scheme for distributed ledgers},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {111},
  pages        = {241--253},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2020.04.042},
  doi          = {10.1016/J.FUTURE.2020.04.042},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ShahidK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpp/AhmedKAAH20,
  author       = {Idrees Ahmed and
                  Abid Khan and
                  Adeel Anjum and
                  Mansoor Ahmed and
                  Muhammad Asif Habib},
  title        = {A Secure Provenance Scheme for Detecting Consecutive Colluding Users
                  in Distributed Networks},
  journal      = {Int. J. Parallel Program.},
  volume       = {48},
  number       = {2},
  pages        = {344--366},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10766-018-0601-y},
  doi          = {10.1007/S10766-018-0601-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpp/AhmedKAAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SaleemKMPMAJ20,
  author       = {Ahsan Saleem and
                  Abid Khan and
                  Saif Ur Rehman Malik and
                  Haris Pervaiz and
                  Hassan Malik and
                  Masoom Alam and
                  Anish Jindal},
  title        = {{FESDA:} Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {7},
  pages        = {6132--6142},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2957314},
  doi          = {10.1109/JIOT.2019.2957314},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/SaleemKMPMAJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShahidKMC20,
  author       = {Furqan Shahid and
                  Abid Khan and
                  Saif Ur Rehman Malik and
                  Kim{-}Kwang Raymond Choo},
  title        = {{WOTS-S:} {A} Quantum Secure Compact Signature Scheme for Distributed
                  Ledger},
  journal      = {Inf. Sci.},
  volume       = {539},
  pages        = {229--249},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.05.024},
  doi          = {10.1016/J.INS.2020.05.024},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ShahidKMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/BegAAAKBK20,
  author       = {Saira Beg and
                  Naveed Ahmad and
                  Adeel Anjum and
                  Mansoor Ahmad and
                  Abid Khan and
                  Faisal Baig and
                  Ahmed Khan},
  title        = {S-box design based on optimize {LFT} parameter selection: a practical
                  approach in recommendation system domain},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {17-18},
  pages        = {11667--11684},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-019-08464-6},
  doi          = {10.1007/S11042-019-08464-6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/BegAAAKBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/NazKAKDAJ20,
  author       = {Farah Naz and
                  Abid Khan and
                  Mansoor Ahmed and
                  Majid Iqbal Khan and
                  Sadia Din and
                  Awais Ahmad and
                  Gwanggil Jeon},
  title        = {Watermarking as a service (WaaS) with anonymity},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {23-24},
  pages        = {16051--16075},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-018-7074-2},
  doi          = {10.1007/S11042-018-7074-2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/NazKAKDAJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AslamA0K00A020,
  author       = {Sidra Aslam and
                  Mansoor Ahmed and
                  Imran Ahmed and
                  Abid Khan and
                  Awais Ahmad and
                  Muhammad Imran and
                  Adeel Anjum and
                  Shahid Hussain},
  title        = {{OBAC:} towards agent-based identification and classification of roles,
                  objects, permissions {(ROP)} in distributed environment},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {45-46},
  pages        = {34363--34384},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-020-08764-2},
  doi          = {10.1007/S11042-020-08764-2},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/AslamA0K00A020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/WaheedSKIKMK20,
  author       = {Abdul Waheed and
                  Munam Ali Shah and
                  Abid Khan and
                  Saif ul Islam and
                  Suleman Khan and
                  Carsten Maple and
                  Muhammad Khurram Khan},
  title        = {Volunteer Computing in Connected Vehicles: Opportunities and Challenges},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {5},
  pages        = {212--218},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.011.1900603},
  doi          = {10.1109/MNET.011.1900603},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/WaheedSKIKMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tem/ShafeeqZAK20,
  author       = {Sehrish Shafeeq and
                  Sherali Zeadally and
                  Masoom Alam and
                  Abid Khan},
  title        = {Curbing Address Reuse in the {IOTA} Distributed Ledger: {A} Cuckoo-Filter-Based
                  Approach},
  journal      = {{IEEE} Trans. Engineering Management},
  volume       = {67},
  number       = {4},
  pages        = {1244--1255},
  year         = {2020},
  url          = {https://doi.org/10.1109/TEM.2019.2922710},
  doi          = {10.1109/TEM.2019.2922710},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tem/ShafeeqZAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/KhanTAHMKA20,
  author       = {Razaullah Khan and
                  Xiaofeng Tao and
                  Adeel Anjum and
                  Sajjad Haider and
                  Saif Ur Rehman Malik and
                  Abid Khan and
                  Fatemeh Amiri},
  title        = {Privacy Preserving for Multiple Sensitive Attributes against Fingerprint
                  Correlation Attack Satisfying c-Diversity},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {8416823:1--8416823:18},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8416823},
  doi          = {10.1155/2020/8416823},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/KhanTAHMKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-10435,
  author       = {Sabah Suhail and
                  Rasheed Hussain and
                  Abid Khan and
                  Choong Seon Hong},
  title        = {On the Role of Hash-based Signatures in Quantum-Safe Internet of Things:
                  Current Solutions and Future Directions},
  journal      = {CoRR},
  volume       = {abs/2004.10435},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.10435},
  eprinttype    = {arXiv},
  eprint       = {2004.10435},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-10435.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-08538,
  author       = {Faheem Zafar and
                  Abid Khan and
                  Saif Ur Rehman Malik and
                  Adeel Anjum and
                  Mansoor Ahmed},
  title        = {MobChain: Three-Way Collusion Resistance in Witness-Oriented Location
                  Proof Systems Using Distributed Consensus},
  journal      = {CoRR},
  volume       = {abs/2011.08538},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.08538},
  eprinttype    = {arXiv},
  eprint       = {2011.08538},
  timestamp    = {Wed, 18 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-08538.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AmeerSKSMIA19,
  author       = {Saba Ameer and
                  Munam Ali Shah and
                  Abid Khan and
                  Houbing Song and
                  Carsten Maple and
                  Saif ul Islam and
                  Muhammad Nabeel Asghar},
  title        = {Comparative Analysis of Machine Learning Techniques for Predicting
                  Air Quality in Smart Cities},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {128325--128338},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2925082},
  doi          = {10.1109/ACCESS.2019.2925082},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AmeerSKSMIA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanZ19,
  author       = {Abid Khan and
                  Yuanguo Zhu},
  title        = {A Novel Approach to Parameter Reduction of Fuzzy Soft Set},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {128956--128967},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2940484},
  doi          = {10.1109/ACCESS.2019.2940484},
  timestamp    = {Sat, 12 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SarfrazAZK19,
  author       = {Umair Sarfraz and
                  Masoom Alam and
                  Sherali Zeadally and
                  Abid Khan},
  title        = {Privacy aware {IOTA} ledger: Decentralized mixing and unlinkable {IOTA}
                  transactions},
  journal      = {Comput. Networks},
  volume       = {148},
  pages        = {361--372},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comnet.2018.11.019},
  doi          = {10.1016/J.COMNET.2018.11.019},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/SarfrazAZK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhmedKAM19,
  author       = {Idrees Ahmed and
                  Abid Khan and
                  Mansoor Ahmed and
                  Saif Ur Rehman Malik},
  title        = {Order preserving secure provenance scheme for distributed networks},
  journal      = {Comput. Secur.},
  volume       = {82},
  pages        = {99--117},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2018.12.008},
  doi          = {10.1016/J.COSE.2018.12.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhmedKAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HaiderKAMKKM19,
  author       = {Sajjad Haider and
                  Tehsin Kanwal and
                  Adeel Anjum and
                  Saif Ur Rehman Malik and
                  Ahmed Khan and
                  Abid Khan and
                  Umar Manzoor},
  title        = {An efficient privacy preserving protocol for dynamic continuous data
                  collection},
  journal      = {Comput. Secur.},
  volume       = {86},
  pages        = {358--371},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.06.017},
  doi          = {10.1016/J.COSE.2019.06.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HaiderKAMKKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssc/KhanASTG19,
  author       = {Abid Khan and
                  Rashid Ahmed and
                  Farrukh Shehzad and
                  Muhammad Hussain Tahir and
                  Syed Shakir Ali Ghazali},
  title        = {Construction of circular partially balanced-Repeated measurement designs
                  using cyclic shifts},
  journal      = {Commun. Stat. Simul. Comput.},
  volume       = {48},
  number       = {2},
  pages        = {506--515},
  year         = {2019},
  url          = {https://doi.org/10.1080/03610918.2017.1387661},
  doi          = {10.1080/03610918.2017.1387661},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cssc/KhanASTG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ShafeeqAK19,
  author       = {Sehrish Shafeeq and
                  Masoom Alam and
                  Abid Khan},
  title        = {Privacy aware decentralized access control system},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {101},
  pages        = {420--433},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.06.025},
  doi          = {10.1016/J.FUTURE.2019.06.025},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ShafeeqAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KanwalJAMKAMSB19,
  author       = {Tehsin Kanwal and
                  Ather Abdul Jabbar and
                  Adeel Anjum and
                  Saif Ur Rehman Malik and
                  Abid Khan and
                  Naveed Ahmad and
                  Umar Manzoor and
                  Muhammad Naeem Shehzad and
                  Muhammad A. Balubaid},
  title        = {Privacy-aware relationship semantics-based {XACML} access control
                  model for electronic health records in hybrid cloud},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {15},
  number       = {6},
  year         = {2019},
  url          = {https://doi.org/10.1177/1550147719846050},
  doi          = {10.1177/1550147719846050},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KanwalJAMKAMSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/KanwalSAMCKAAK19,
  author       = {Tehsin Kanwal and
                  Sayed Ali Asjad Shaukat and
                  Adeel Anjum and
                  Saif Ur Rehman Malik and
                  Kim{-}Kwang Raymond Choo and
                  Abid Khan and
                  Naveed Ahmad and
                  Mansoor Ahmad and
                  Samee U. Khan},
  title        = {Privacy-preserving model and generalization correlation attacks for
                  1: {M} data with multiple sensitive attributes},
  journal      = {Inf. Sci.},
  volume       = {488},
  pages        = {238--256},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.03.004},
  doi          = {10.1016/J.INS.2019.03.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/KanwalSAMCKAAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/KhanZ19,
  author       = {Abid Khan and
                  Yuanguo Zhu},
  title        = {An improved algorithm for normal parameter reduction of soft set},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {37},
  number       = {2},
  pages        = {2953--2968},
  year         = {2019},
  url          = {https://doi.org/10.3233/JIFS-190071},
  doi          = {10.3233/JIFS-190071},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/KhanZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-04314,
  author       = {Sabah Suhail and
                  Choong Seon Hong and
                  Abid Khan},
  title        = {Orchestrating Product Provenance Story: When {IOTA} {ECOSYSTEM} Meets
                  The Electronics Supply Chain Space},
  journal      = {CoRR},
  volume       = {abs/1902.04314},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.04314},
  eprinttype    = {arXiv},
  eprint       = {1902.04314},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-04314.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YaseenAASKMASB18,
  author       = {Saba Yaseen and
                  Syed M. Ali Abbas and
                  Adeel Anjum and
                  Tanzila Saba and
                  Abid Khan and
                  Saif Ur Rehman Malik and
                  Naveed Ahmad and
                  Basit Shahzad and
                  Ali Kashif Bashir},
  title        = {Improved Generalization for Secure Data Publishing},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {27156--27165},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2828398},
  doi          = {10.1109/ACCESS.2018.2828398},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YaseenAASKMASB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/ShafiqueKRBA18,
  author       = {Usman Shafique and
                  Abid Khan and
                  Abdur Rehman and
                  Faisal Bashir and
                  Masoom Alam},
  title        = {Detection of rank attack in routing protocol for Low Power and Lossy
                  Networks},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {73},
  number       = {7-8},
  pages        = {429--438},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12243-018-0645-4},
  doi          = {10.1007/S12243-018-0645-4},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/ShafiqueKRBA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/HussainAKII18,
  author       = {Altaf Hussain and
                  Muhammad Aleem and
                  Abid Khan and
                  Muhammad Azhar Iqbal and
                  Muhammad Arshad Islam},
  title        = {{RALBA:} a computation-aware load balancing scheduler for cloud computing},
  journal      = {Clust. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1667--1680},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10586-018-2414-6},
  doi          = {10.1007/S10586-018-2414-6},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/HussainAKII18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AnjumMCKHKKAR18,
  author       = {Adeel Anjum and
                  Saif Ur Rehman Malik and
                  Kim{-}Kwang Raymond Choo and
                  Abid Khan and
                  Asma Haroon and
                  Sangeen Khan and
                  Samee U. Khan and
                  Naveed Ahmad and
                  Basit Raza},
  title        = {An efficient privacy mechanism for electronic health records},
  journal      = {Comput. Secur.},
  volume       = {72},
  pages        = {196--211},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.09.014},
  doi          = {10.1016/J.COSE.2017.09.014},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AnjumMCKHKKAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JamilKAAJJ18,
  author       = {Fuzel Jamil and
                  Abid Khan and
                  Adeel Anjum and
                  Mansoor Ahmed and
                  Farhana Jabeen and
                  Nadeem Javaid},
  title        = {Secure provenance using an authenticated data structure approach},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {34--56},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.005},
  doi          = {10.1016/J.COSE.2017.10.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JamilKAAJJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HameedKAAR18,
  author       = {Khizar Hameed and
                  Abid Khan and
                  Mansoor Ahmed and
                  Goutham Reddy Alavalapati and
                  M. Mazhar Rathore},
  title        = {Towards a formally verified zero watermarking scheme for data integrity
                  in the Internet of Things based-wireless sensor networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {82},
  pages        = {274--289},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.12.009},
  doi          = {10.1016/J.FUTURE.2017.12.009},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/HameedKAAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AlamEKKJCB18,
  author       = {Masoom Alam and
                  Naina Emmanuel and
                  Tanveer Khan and
                  Abid Khan and
                  Nadeem Javaid and
                  Kim{-}Kwang Raymond Choo and
                  Rajkumar Buyya},
  title        = {Secure policy execution using reusable garbled circuit in the cloud},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {87},
  pages        = {488--501},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.12.067},
  doi          = {10.1016/J.FUTURE.2017.12.067},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AlamEKKJCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/EmmanuelKAKK18,
  author       = {Naina Emmanuel and
                  Abid Khan and
                  Masoom Alam and
                  Tanveer Khan and
                  Muhammad Khurram Khan},
  title        = {Structures and data preserving homomorphic signatures},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {102},
  pages        = {58--70},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2017.11.005},
  doi          = {10.1016/J.JNCA.2017.11.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/EmmanuelKAKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SaleemKSAK18,
  author       = {Ahsan Saleem and
                  Abid Khan and
                  Furqan Shahid and
                  Masoom Alam and
                  Muhammad Khurram Khan},
  title        = {Recent advancements in garbled computing: How far have we come towards
                  achieving secure, efficient and reusable garbled circuits},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {108},
  pages        = {1--19},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.02.006},
  doi          = {10.1016/J.JNCA.2018.02.006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/SaleemKSAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SheikhKAWH18,
  author       = {Umber Sheikh and
                  Abid Khan and
                  Bilal Ahmed and
                  Abdul Waheed and
                  Abdul Hameed},
  title        = {Provenance Inference Techniques: Taxonomy, comparative analysis and
                  design challenges},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {110},
  pages        = {11--26},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.03.004},
  doi          = {10.1016/J.JNCA.2018.03.004},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/SheikhKAWH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/HussainAKIKDAJA18,
  author       = {Mubashar Hussain and
                  Mansoor Ahmed and
                  Hasan Ali Khattak and
                  Muhammad Imran and
                  Abid Khan and
                  Sadia Din and
                  Awais Ahmad and
                  Gwanggil Jeon and
                  Goutham Reddy Alavalapati},
  title        = {Towards ontology-based multilingual {URL} filtering: a big data problem},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {10},
  pages        = {5003--5021},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-018-2338-1},
  doi          = {10.1007/S11227-018-2338-1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/HussainAKIKDAJA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/SuhailHLZKH18,
  author       = {Sabah Suhail and
                  Choong Seon Hong and
                  M. Ali Lodhi and
                  Faheem Zafar and
                  Abid Khan and
                  Faisal Bashir Hussain},
  title        = {Data trustworthiness in IoT},
  booktitle    = {2018 International Conference on Information Networking, {ICOIN} 2018,
                  Chiang Mai, Thailand, January 10-12, 2018},
  pages        = {414--419},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICOIN.2018.8343151},
  doi          = {10.1109/ICOIN.2018.8343151},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/SuhailHLZKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/AhmedKSH18,
  author       = {Mansoor Ahmed and
                  Abid Khan and
                  Osama Saleem and
                  Muhammad Haris},
  title        = {A Fault Tolerant Approach for Malicious {URL} Filtering},
  booktitle    = {2018 International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2018, Rome, Italy, June 19-21, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISNCC.2018.8530984},
  doi          = {10.1109/ISNCC.2018.8530984},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isncc/AhmedKSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-06143,
  author       = {Sabah Suhail and
                  Mohammad M. Abdellatif and
                  Shashi Raj Pandey and
                  Abid Khan and
                  Choong Seon Hong},
  title        = {Provenance-enabled Packet Path Tracing in the RPL-based Internet of
                  Things},
  journal      = {CoRR},
  volume       = {abs/1811.06143},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.06143},
  eprinttype    = {arXiv},
  eprint       = {1811.06143},
  timestamp    = {Mon, 23 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-06143.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JabeenHAGMKNG17,
  author       = {Farhana Jabeen and
                  Zara Hamid and
                  Wadood Abdul and
                  Sanaa Ghouzali and
                  Saif Ur Rehman Malik and
                  Abid Khan and
                  Sarfraz Nawaz and
                  Hina Ghafoor},
  title        = {Enhanced Architecture for Privacy Preserving Data Integration in a
                  Medical Research Environment},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {13308--13326},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2707584},
  doi          = {10.1109/ACCESS.2017.2707584},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/JabeenHAGMKNG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AslamASARAK17,
  author       = {Adeel Aslam and
                  Naveed Ahmad and
                  Tanzila Saba and
                  Abdulaziz S. Almazyad and
                  Amjad Rehman and
                  Adeel Anjum and
                  Abid Khan},
  title        = {Decision Support System for Risk Assessment and Management Strategies
                  in Distributed Software Development},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {20349--20373},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2757605},
  doi          = {10.1109/ACCESS.2017.2757605},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AslamASARAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/TahirKHAKJ17,
  author       = {Mouzna Tahir and
                  Abid Khan and
                  Abdul Hameed and
                  Masoom Alam and
                  Muhammad Khurram Khan and
                  Farhana Jabeen},
  title        = {Towards a set aggregation-based data integrity scheme for smart grids},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {72},
  number       = {9-10},
  pages        = {551--561},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12243-017-0602-7},
  doi          = {10.1007/S12243-017-0602-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/TahirKHAKJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/NazirAMACKZKK17,
  author       = {Anam Nazir and
                  Masoom Alam and
                  Saif Ur Rehman Malik and
                  Adnan Akhunzada and
                  Muhammad Nadeem Cheema and
                  Muhammad Khurram Khan and
                  Yang Ziang and
                  Tanveer Khan and
                  Abid Khan},
  title        = {A high-level domain-specific language for {SIEM} (design, development
                  and formal verification)},
  journal      = {Clust. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2423--2437},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10586-017-0819-2},
  doi          = {10.1007/S10586-017-0819-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/NazirAMACKZKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZafarKMAAKJAJ17,
  author       = {Faheem Zafar and
                  Abid Khan and
                  Saif Ur Rehman Malik and
                  Mansoor Ahmed and
                  Adeel Anjum and
                  Majid Iqbal Khan and
                  Nadeem Javed and
                  Masoom Alam and
                  Fuzel Jamil},
  title        = {A survey of cloud computing data integrity schemes: Design challenges,
                  taxonomy and future trends},
  journal      = {Comput. Secur.},
  volume       = {65},
  pages        = {29--49},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.10.006},
  doi          = {10.1016/J.COSE.2016.10.006},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZafarKMAAKJAJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AnjumRGKMAASA17,
  author       = {Adeel Anjum and
                  Guillaume Raschia and
                  Marc Gelgon and
                  Abid Khan and
                  Saif Ur Rehman Malik and
                  Naveed Ahmad and
                  Mansoor Ahmed and
                  Sabah Suhail and
                  Masoom Alam},
  title        = {{\(\tau\)}-safety: {A} privacy model for sequential publication with
                  arbitrary updates},
  journal      = {Comput. Secur.},
  volume       = {66},
  pages        = {20--39},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.12.014},
  doi          = {10.1016/J.COSE.2016.12.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AnjumRGKMAASA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JavaidHAIKG17,
  author       = {Nadeem Javaid and
                  Sheraz Hussain and
                  Ashfaq Ahmad and
                  Muhammad Imran and
                  Abid Khan and
                  Mohsen Guizani},
  title        = {Region based cooperative routing in underwater wireless sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {92},
  pages        = {31--41},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2017.01.013},
  doi          = {10.1016/J.JNCA.2017.01.013},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/JavaidHAIKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZafarKSAHKJA17,
  author       = {Faheem Zafar and
                  Abid Khan and
                  Sabah Suhail and
                  Idrees Ahmed and
                  Khizar Hameed and
                  Hayat Mohammad Khan and
                  Farhana Jabeen and
                  Adeel Anjum},
  title        = {Trustworthy data: {A} survey, taxonomy and future trends of secure
                  provenance schemes},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {94},
  pages        = {50--68},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2017.06.003},
  doi          = {10.1016/J.JNCA.2017.06.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ZafarKSAHKJA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AslamIKAAK17,
  author       = {Sidra Aslam and
                  Saif ul Islam and
                  Abid Khan and
                  Mansoor Ahmed and
                  Adnan Akhunzada and
                  Muhammad Khurram Khan},
  title        = {Information collection centric techniques for cloud resource management:
                  Taxonomy, analysis and challenges},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {100},
  pages        = {80--94},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2017.10.021},
  doi          = {10.1016/J.JNCA.2017.10.021},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AslamIKAAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/AkbarJAGKNI17,
  author       = {Mariam Akbar and
                  Nadeem Javaid and
                  Wadood Abdul and
                  Sanaa Ghouzali and
                  Abid Khan and
                  Iftikhar Azim Niaz and
                  Manzoor Ilahi},
  title        = {Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous
                  Wireless Sensor Networks},
  journal      = {J. Sensors},
  volume       = {2017},
  pages        = {4281597:1--4281597:16},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/4281597},
  doi          = {10.1155/2017/4281597},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/js/AkbarJAGKNI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AlamMJKKAJAK17,
  author       = {Masoom Alam and
                  Saif Ur Rehman Malik and
                  Qaisar Javed and
                  Abid Khan and
                  Shamaila Bisma Khan and
                  Adeel Anjum and
                  Nadeem Javed and
                  Adnan Akhunzada and
                  Muhammad Khurram Khan},
  title        = {Formal modeling and verification of security controls for multimedia
                  systems in the cloud},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {21},
  pages        = {22845--22870},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-017-4853-0},
  doi          = {10.1007/S11042-017-4853-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AlamMJKKAJAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ChughtaiBRK17,
  author       = {Muhammad Omer Chughtai and
                  Nasreen Badruddin and
                  Maaz Rehan and
                  Abid Khan},
  title        = {Congestion Detection and Alleviation in Multihop Wireless Sensor Networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2017},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/9243019},
  doi          = {10.1155/2017/9243019},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/ChughtaiBRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnc/KhanYSTA17,
  author       = {Abid Khan and
                  Ayyaz Yaqoob and
                  Kinza Sarwar and
                  Mouzna Tahir and
                  Mansoor Ahmed},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar},
  title        = {Secure Logging as a Service Using Reversible Watermarking},
  booktitle    = {14th International Conference on Mobile Systems and Pervasive Computing
                  (MobiSPC 2017) / 12th International Conference on Future Networks
                  and Communications {(FNC} 2017) / Affiliated Workshops, July 24-26,
                  2017, Leuven, Belgium},
  series       = {Procedia Computer Science},
  volume       = {110},
  pages        = {336--343},
  publisher    = {Elsevier},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.procs.2017.06.103},
  doi          = {10.1016/J.PROCS.2017.06.103},
  timestamp    = {Thu, 08 Jul 2021 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fnc/KhanYSTA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/AliAKIR17,
  author       = {Ahmad Ali and
                  Mansoor Ahmed and
                  Abid Khan and
                  Muhammad Ilyas and
                  Muhammad Saad Razzaq},
  title        = {A trust management system model for cloud},
  booktitle    = {2017 International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2017, Marrakech, Morocco, May 16-18, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISNCC.2017.8072029},
  doi          = {10.1109/ISNCC.2017.8072029},
  timestamp    = {Sun, 31 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isncc/AliAKIR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ZafarKAKJHAH16,
  author       = {Faheem Zafar and
                  Abid Khan and
                  Mansoor Ahmed and
                  Majid Iqbal Khan and
                  Farhana Jabeen and
                  Zara Hamid and
                  Naveed Ahmed and
                  Faisal Bashir Hussain},
  title        = {A Scalable Data Integrity Mechanism Based on Provable Data Possession
                  and JARs},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {10},
  number       = {6},
  pages        = {2851--2873},
  year         = {2016},
  url          = {https://doi.org/10.3837/tiis.2016.06.022},
  doi          = {10.3837/TIIS.2016.06.022},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/ZafarKAKJHAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KhanJNSAN16,
  author       = {Abid Khan and
                  Farhana Jabeen and
                  Farah Naz and
                  Sabah Suhail and
                  Mansoor Ahmed and
                  Sarfraz Nawaz},
  title        = {Buyer seller watermarking protocols issues and challenges - {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {75},
  pages        = {317--334},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.08.026},
  doi          = {10.1016/J.JNCA.2016.08.026},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/KhanJNSAN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/KhanLRKH16,
  author       = {Meer M. Khan and
                  M. Ali Lodhi and
                  Abdul Rehman and
                  Abid Khan and
                  Faisal Bashir Hussain},
  title        = {Sink-to-Sink Coordination Framework Using {RPL:} Routing Protocol
                  for Low Power and Lossy Networks},
  journal      = {J. Sensors},
  volume       = {2016},
  pages        = {2635429:1--2635429:11},
  year         = {2016},
  url          = {https://doi.org/10.1155/2016/2635429},
  doi          = {10.1155/2016/2635429},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/KhanLRKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconac/WaheedSK16,
  author       = {Abdul Waheed and
                  Munam Ali Shah and
                  Abid Khan},
  editor       = {Zhijie Xu and
                  Jing Wang},
  title        = {Secure login protocols: An analysis on modern attacks and solutions},
  booktitle    = {22nd International Conference on Automation and Computing, {ICAC}
                  2016, Colchester, United Kingdom, September 7-8, 2016},
  pages        = {535--541},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IConAC.2016.7604975},
  doi          = {10.1109/ICONAC.2016.7604975},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iconac/WaheedSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/HameedKAAKHJ16,
  author       = {Khizar Hameed and
                  Muhammad Saleem Khan and
                  Idrees Ahmed and
                  Zuhaib U. Ahmad and
                  Abid Khan and
                  Aun Haider and
                  Nadeem Javaid},
  title        = {A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks},
  booktitle    = {19th International Conference on Network-Based Information Systems,
                  NBiS 2016, Ostrava, Czech Republic, September 7-9, 2016},
  pages        = {119--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/NBiS.2016.35},
  doi          = {10.1109/NBIS.2016.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/HameedKAAKHJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siot/SuhailHAZK16,
  author       = {Sabah Suhail and
                  Choong Seong Hong and
                  Zuhaib Uddin Ahmad and
                  Faheem Zafar and
                  Abid Khan},
  title        = {Introducing Secure Provenance in IoT: Requirements and Challenges},
  booktitle    = {2016 International Workshop on Secure Internet of Things, SIoT 2016,
                  Heraklion, Greece, September 26-30, 2016},
  pages        = {39--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SIoT.2016.011},
  doi          = {10.1109/SIOT.2016.011},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/siot/SuhailHAZK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhanAKK16,
  author       = {Muhammad Saleem Khan and
                  Idrees Ahmed and
                  Abid Khan and
                  Majid Iqbal Khan},
  title        = {Adaptive Reputation Weights Assignment Scheme for MANETs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0059},
  doi          = {10.1109/TRUSTCOM.2016.0059},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhanAKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AhmedKKA16,
  author       = {Idrees Ahmed and
                  Abid Khan and
                  Muhammad Saleem Khan and
                  Mansoor Ahmed},
  title        = {Aggregated Signatures for Chaining: {A} Secure Provenance Scheme},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2012--2017},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0307},
  doi          = {10.1109/TRUSTCOM.2016.0307},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AhmedKKA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/HaiderJAAKK13,
  author       = {Arsalan Haider and
                  Nadeem Javaid and
                  N. Amjad and
                  A. A. Awan and
                  Abid Khan and
                  Nasir Khan},
  title        = {{REECH-ME:} Regional Energy Efficient Cluster Heads Based on Maximum
                  Energy Routing Protocol for WSNs},
  booktitle    = {2013 Eighth International Conference on Broadband and Wireless Computing,
                  Communication and Applications, Compiegne, France, October 28-30,
                  2013},
  pages        = {88--92},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/BWCCA.2013.23},
  doi          = {10.1109/BWCCA.2013.23},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bwcca/HaiderJAAKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HaiderJAAKK13,
  author       = {Arsalan Haider and
                  Nadeem Javaid and
                  N. Amjad and
                  A. A. Awan and
                  Abid Khan and
                  Nasir Khan},
  title        = {{REECH-ME:} Regional Energy Efficient Cluster Heads based on Maximum
                  Energy Routing Protocol for WSNs},
  journal      = {CoRR},
  volume       = {abs/1307.7052},
  year         = {2013},
  url          = {http://arxiv.org/abs/1307.7052},
  eprinttype    = {arXiv},
  eprint       = {1307.7052},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/HaiderJAAKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AslamRSRKQQHKJ13,
  author       = {Muhammad Aslam and
                  Muhammad Babar Rasheed and
                  Tauseef Shah and
                  Azizur Rahim and
                  Zahoor Ali Khan and
                  U. Qasim and
                  M. W. Qasim and
                  Ahmad Hassan and
                  Abid Khan and
                  Nadeem Javaid},
  title        = {Energy optimization and Performance Analysis of Cluster Based Routing
                  Protocols Extended from {LEACH} for WSNs},
  journal      = {CoRR},
  volume       = {abs/1309.4373},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.4373},
  eprinttype    = {arXiv},
  eprint       = {1309.4373},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AslamRSRKQQHKJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MahmoodJKQKQM13,
  author       = {Danish Mahmood and
                  Nadeem Javaid and
                  Zahoor Ali Khan and
                  U. Qasim and
                  Abid Khan and
                  S. Qurashi and
                  A. M. Memon},
  title        = {Modeling and Evaluating Performance of Routing Operations in Reactive
                  Routing Protocols},
  journal      = {CoRR},
  volume       = {abs/1309.4386},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.4386},
  eprinttype    = {arXiv},
  eprint       = {1309.4386},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MahmoodJKQKQM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MahmoodJQKKQM13,
  author       = {Danish Mahmood and
                  Nadeem Javaid and
                  U. Qasim and
                  Zahoor Ali Khan and
                  Abid Khan and
                  S. Qurashi and
                  A. M. Memon},
  title        = {Modeling and Evaluating Performance of Routing Operations in Proactive
                  Routing Protocols},
  journal      = {CoRR},
  volume       = {abs/1309.4389},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.4389},
  eprinttype    = {arXiv},
  eprint       = {1309.4389},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MahmoodJQKKQM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AhmedAATK10,
  author       = {Mansoor Ahmed and
                  Amin Anjomshoaa and
                  Muhammad Asfand{-}e{-}yar and
                  A Min Tjoa and
                  Abid Khan},
  title        = {Towards an Ontology-Based Solution for Managing License Agreement
                  Using Semantic Desktop},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {309--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.104},
  doi          = {10.1109/ARES.2010.104},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AhmedAATK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fit/KhanSAK09,
  author       = {Ali Nawaz Khan and
                  Xuejun Sha and
                  Muhammad Waqas Anwar and
                  Abid Khan},
  editor       = {Sajjad Ahmad Madani},
  title        = {Performance analysis of prioritized and non prioritized handoff call
                  queuing schemes in mobile cellular networks},
  booktitle    = {{FIT} '09, 7th International Conference on Frontiers of Information
                  Technology, Abbottabad, Pakistan, December 16-18, 2009},
  pages        = {11:1--11:6},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1838002.1838014},
  doi          = {10.1145/1838002.1838014},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fit/KhanSAK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fit/KhanNAAK09,
  author       = {Abid Khan and
                  Xiamu Niu and
                  Waqas Anwar and
                  Mansoor Ahmed and
                  Ali Nawaz Khan},
  editor       = {Sajjad Ahmad Madani},
  title        = {Mobile agent watermarking {(MAW):} security properties and attacks
                  revisited},
  booktitle    = {{FIT} '09, 7th International Conference on Frontiers of Information
                  Technology, Abbottabad, Pakistan, December 16-18, 2009},
  pages        = {32:1--32:6},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1838002.1838038},
  doi          = {10.1145/1838002.1838038},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fit/KhanNAAK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fit/SharifKAAK09,
  author       = {Usman Sharif and
                  Abid Khan and
                  Mansoor Ahmed and
                  Muhammad Waqas Anwar and
                  Ali Nawaz Khan},
  editor       = {Sajjad Ahmad Madani},
  title        = {{CLUSMA:} a mobile agent based clustering middleware for wireless
                  sensor networks},
  booktitle    = {{FIT} '09, 7th International Conference on Frontiers of Information
                  Technology, Abbottabad, Pakistan, December 16-18, 2009},
  pages        = {63:1--63:4},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1838002.1838074},
  doi          = {10.1145/1838002.1838074},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fit/SharifKAAK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/KhanANYA09,
  author       = {Abid Khan and
                  Qasim Arshad and
                  Xiamu Niu and
                  Yong Zhang and
                  Muhammad Waqas Anwar},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {On the Security Properties and Attacks against Mobile Agent Graph
                  Head Sealing {(MAGHS)}},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {223--228},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_23},
  doi          = {10.1007/978-3-642-02617-1\_23},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/KhanANYA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/KhanNAY08,
  author       = {Abid Khan and
                  Xiamu Niu and
                  Waqas Anwar and
                  Yong Zhang},
  title        = {On the security properties and attacks against Mobile agent watermark
                  encapsulation(MAWE)},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Singapore, 12-15 October 2008},
  pages        = {707--712},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICSMC.2008.4811361},
  doi          = {10.1109/ICSMC.2008.4811361},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smc/KhanNAY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/KhanNY07,
  author       = {Abid Khan and
                  Xiamu Niu and
                  Yong Zhang},
  editor       = {Bin{-}Yih Liao and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain and
                  Mark Liao and
                  Hideki Noda and
                  Anthony T. S. Ho},
  title        = {Protecting Mobile Agent's Computation Results with Reversible Watermarking
                  and Digital Signature},
  booktitle    = {3rd International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan,
                  26-28 November 2007, Proceedings},
  pages        = {566--569},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IIH-MSP.2007.250},
  doi          = {10.1109/IIH-MSP.2007.250},
  timestamp    = {Fri, 24 Mar 2023 08:33:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/KhanNY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aia/ZhangNKLH06,
  author       = {Yong Zhang and
                  Xiamu Niu and
                  Abid Khan and
                  Qiong Li and
                  Qi Han},
  editor       = {Vladan Devedzic},
  title        = {A Novel Method of Watermarking Relational Databases using Character
                  String},
  booktitle    = {{IASTED} International Conference on Artificial Intelligence and Applications,
                  part of the 24th Multi-Conference on Applied Informatics, Innsbruck,
                  Austria, February 13-16, 2006},
  pages        = {120--124},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  url          = {https://dl.acm.org/doi/10.5555/1166890.1166911},
  doi          = {10.5555/1166890.1166911},
  timestamp    = {Wed, 04 May 2022 13:03:25 +0200},
  biburl       = {https://dblp.org/rec/conf/aia/ZhangNKLH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KhanAGBY97,
  author       = {Abid Khan and
                  Nasir Al{-}Darwish and
                  Mohsen Guizani and
                  M. Benten and
                  H. Youssef},
  title        = {Design and implementation of a software bridge with packet filtering
                  and statistics collection functions},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {5},
  pages        = {251--263},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199709/10)7:5\&\#60;251::AID-NEM254\&\#62;3.0.CO;2-H},
  doi          = {10.1002/(SICI)1099-1190(199709/10)7:5\&\#60;251::AID-NEM254\&\#62;3.0.CO;2-H},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KhanAGBY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics