Muhammad Khurram Khan
#136,370
Most Influential Person Now
Muhammad Khurram Khan's AcademicInfluence.com Rankings
Muhammad Khurram Khancomputer-science Degrees
Computer Science
#6281
World Rank
#6624
Historical Rank
Database
#3385
World Rank
#3526
Historical Rank

Download Badge
Computer Science
Muhammad Khurram Khan's Degrees
- Bachelors Computer Science University of the Punjab
Similar Degrees You Can Earn
Why Is Muhammad Khurram Khan Influential?
(Suggest an Edit or Addition)Muhammad Khurram Khan's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Intelligent Transportation Systems (2006) (533)
- A survey on privacy protection in blockchain system (2019) (429)
- Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ (2010) (393)
- Diagnosing COVID-19 pneumonia from x-ray and CT images using deep learning and transfer learning algorithms (2020) (319)
- An enhanced smart card based remote user password authentication scheme (2013) (270)
- Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' (2011) (269)
- Performance evaluation of score level fusion in multimodal biometric systems (2010) (249)
- Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks (2016) (231)
- A robust and anonymous patient monitoring system using wireless medical sensor networks (2018) (222)
- b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET (2013) (208)
- An effective memetic differential evolution algorithm based on chaotic local search (2011) (207)
- Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges (2017) (186)
- A privacy preserving three-factor authentication protocol for e-Health clouds (2016) (186)
- Dynamic remote data auditing for securing big data storage in cloud computing (2017) (180)
- On cloud security attacks: A taxonomy and intrusion detection and prevention as a service (2016) (176)
- Securing software defined networks: taxonomy, requirements, and open issues (2015) (172)
- Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs (2017) (168)
- An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks (2017) (160)
- An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks (2015) (154)
- User authentication schemes for wireless sensor networks: A review (2015) (147)
- Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey (2020) (147)
- Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing (2017) (145)
- A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps (2016) (141)
- Chaos-based secure satellite imagery cryptosystem (2010) (132)
- Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment (2018) (129)
- An efficient phishing webpage detector (2011) (128)
- An improved remote user authentication scheme with key agreement (2014) (126)
- On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age (2017) (126)
- Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art (2017) (125)
- Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges (2015) (124)
- A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity (2016) (118)
- A review on remote data auditing in single cloud server: Taxonomy and open issues (2014) (117)
- Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition (2010) (113)
- Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services (2018) (110)
- Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography (2016) (107)
- Cryptanalysis and improvement of ‘a robust smart‐card‐based remote user password authentication scheme’ (2014) (107)
- Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions (2018) (105)
- Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges (2018) (103)
- Blockchain-based identity management systems: A review (2020) (96)
- Secure and dependable software defined networks (2016) (95)
- An enhanced privacy preserving remote user authentication scheme with provable security (2015) (94)
- Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems (2014) (94)
- Copyright Protection for E-Government Document Images (2012) (93)
- An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography (2015) (92)
- Cryptanalysis and Improvement of Yan et al.’s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems (2013) (91)
- A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems (2020) (90)
- Intrusion response systems: Foundations, design, and challenges (2016) (90)
- A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization (2011) (89)
- A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security (2017) (89)
- An adaptive watermarking scheme for e-government document images (2014) (89)
- An improved smart card based authentication scheme for session initiation protocol (2017) (88)
- A blind reversible method for watermarking relational databases based on a time-stamping protocol (2012) (88)
- Anonymous two-factor authentication for consumer roaming service in global mobility networks (2013) (87)
- A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks (2016) (85)
- PoRX: A reputation incentive scheme for blockchain consensus of IIoT (2020) (85)
- Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce (2014) (84)
- Interactive Artificial Bee Colony Supported Passive Continuous Authentication System (2014) (81)
- Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment (2017) (81)
- A hybrid particle swarm optimization algorithm for high-dimensional problems (2011) (80)
- Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System (2013) (77)
- Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment (2017) (76)
- A Survey on Blockchain Technology: Evolution, Architecture and Security (2021) (75)
- Cloud resource allocation schemes: review, taxonomy, and opportunities (2017) (75)
- Cryptanalysis and Improvement of ‘A Privacy Enhanced Scheme for Telecare Medical Information Systems’ (2012) (73)
- Attribute-based data access control in mobile cloud computing: Taxonomy and open issues (2017) (73)
- Fingerprint Biometric-based Self-Authentication and Deniable Authentication Schemes for the Electronic World (2009) (72)
- Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition (2011) (72)
- A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System (2017) (71)
- Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems (2015) (70)
- An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography (2015) (69)
- OTP-Based Two-Factor Authentication Using Mobile Phones (2011) (68)
- A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata (2013) (68)
- A reliable Internet of Things based architecture for oil and gas industry (2017) (66)
- Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions (2015) (65)
- An Authentication Scheme for Secure Access to Healthcare Services (2012) (64)
- Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV (2020) (63)
- More secure smart card-based remote user password authentication scheme with user anonymity (2014) (60)
- EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks (2018) (60)
- An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography (2017) (60)
- A blind image copyright protection scheme for e-government (2013) (60)
- Binary Artificial Bee Colony optimization using bitwise operation (2014) (58)
- Certificateless searchable public key encryption scheme for mobile healthcare system (2017) (57)
- Digital multimedia audio forensics: past, present and future (2016) (56)
- A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion (2014) (55)
- More efficient key-hash based fingerprint remote authentication scheme using mobile device (2014) (54)
- Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges (2019) (54)
- Robust three-factor remote user authentication scheme with key agreement for multimedia systems (2016) (53)
- Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing (2015) (52)
- An efficient wavelet-tree-based watermarking method (2011) (50)
- A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security (2016) (49)
- A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography (2010) (49)
- A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments (2016) (49)
- An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity (2013) (49)
- A secure chaotic map-based remote authentication scheme for telecare medicine information systems (2017) (48)
- Design of sinkhole node detection mechanism for hierarchical wireless sensor networks (2016) (48)
- DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain (2020) (48)
- A provably secure biometrics-based authenticated key agreement scheme for multi-server environments (2017) (47)
- Using Sorted Switching Median Filter to remove high-density impulse noises (2013) (47)
- An enhanced lightweight anonymous biometric based authentication scheme for TMIS (2018) (46)
- SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications (2016) (45)
- Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition (2014) (44)
- Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G Systems (2017) (43)
- Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things (2017) (43)
- Cloud monitoring: A review, taxonomy, and open research issues (2017) (43)
- Challenge-response-based biometric image scrambling for secure personal identification (2011) (43)
- Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session key Generation Scheme for Healthcare Applications (2019) (43)
- MTPSO algorithm for solving planar graph coloring problem (2011) (42)
- Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues (2017) (42)
- An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks (2014) (42)
- A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks (2017) (42)
- RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing (2020) (41)
- Towards next-generation heterogeneous mobile data stream mining applications: Opportunities, challenges, and future research directions (2017) (41)
- A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments (2017) (41)
- Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System (2015) (40)
- ABC-PSO for vertical handover in heterogeneous wireless networks (2017) (40)
- A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography (2016) (39)
- An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography (2015) (39)
- Proof of X-repute blockchain consensus protocol for IoT systems (2020) (39)
- Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems" (2014) (38)
- A Comprehensive Study of Email Spam Botnet Detection (2015) (38)
- The Holy Quran Digitization: Challenges and Concerns (2013) (38)
- On the design of a secure user authentication and key agreement scheme for wireless sensor networks (2017) (38)
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol (2015) (36)
- An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement (2014) (36)
- Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges (2016) (36)
- Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones (2021) (36)
- Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities (2019) (36)
- On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc Network (2016) (35)
- Energy Management in RFID-Sensor Networks: Taxonomy and Challenges (2019) (35)
- A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments (2016) (34)
- Towards native code offloading based MCC frameworks for multimedia applications: A survey (2016) (34)
- Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey (2017) (34)
- Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions (2018) (33)
- A new handover authentication protocol based on bilinear pairing functions for wireless networks (2015) (32)
- AN IMPROVED FORECASTING MODEL BASED ON THE WEIGHTED FUZZY RELATIONSHIP MATRIX COMBINED WITH A PSO ADAPTATION FOR ENROLLMENTS (2011) (32)
- Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies (2021) (32)
- Computer Applications for Security, Control and System Engineering (2012) (32)
- Provably secure and pairing‐free identity‐based handover authentication protocol for wireless mobile networks (2016) (32)
- Context-adaptive anisotropic diffusion for image denoising (2012) (31)
- An efficient certificateless aggregate signature scheme for the Internet of Vehicles (2019) (31)
- An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design (2016) (31)
- Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps (2015) (30)
- Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things (2019) (30)
- An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks (2017) (30)
- Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare (2018) (30)
- Mobile one-time passwords: two-factor authentication using mobile phones (2012) (29)
- Security and Privacy in IoT Smart Healthcare (2021) (29)
- SIMDOM: A framework for SIMD instruction translation and offloading in heterogeneous mobile architectures (2018) (29)
- Design of a user anonymous password authentication scheme without smart card (2016) (29)
- An anonymous biometric‐based remote user‐authenticated key agreement scheme for multimedia systems (2017) (29)
- When social objects collaborate: Concepts, processing elements, attacks and challenges (2017) (28)
- Identity-based online/offline signcryption for low power devices (2012) (28)
- From smart parking towards autonomous valet parking: A survey, challenges and future Works (2021) (27)
- A software agent enabled biometric security algorithm for secure file access in consumer storage devices (2017) (27)
- Enabling Consumer Trust Upon Acceptance of IoT Technologies Through Security and Privacy Model (2016) (27)
- Ransomware: Recent advances, analysis, challenges and future research directions (2021) (27)
- A provably secure anonymous authentication scheme for Session Initiation Protocol (2016) (26)
- Bio-chaotic Stream Cipher-Based Iris Image Encryption (2009) (26)
- Provably Secure Pairing-Free Identity-Based Partially Blind Signature Scheme and Its Application in Online E-cash System (2016) (26)
- A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases (2019) (26)
- A Survey of Identity-based Signcryption (2011) (26)
- An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city (2017) (25)
- A biometric identity-based signcryption scheme (2012) (25)
- Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks (2016) (25)
- Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint Preprocessing (2014) (25)
- Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009-2020) (2020) (25)
- Lattice‐based signcryption (2013) (25)
- Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions (2017) (25)
- Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem (2010) (23)
- Multi‐tier authentication schemes for fog computing: Architecture, security perspective, and challenges (2019) (23)
- Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption (2009) (23)
- Comprehensive Review of Cybercrime Detection Techniques (2020) (23)
- Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion (2011) (23)
- Statistical analysis of several reversible data hiding algorithms (2011) (23)
- Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network (2013) (23)
- Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code (2014) (23)
- Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment (2022) (23)
- Application of evolutionary algorithms in detecting SMS spam at access layer (2011) (22)
- Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes (2012) (22)
- Digital Quran Computing: Review, Classification, and Trend Analysis (2017) (22)
- Fingerprint verification using statistical descriptors (2010) (22)
- A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering (2015) (21)
- Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT (2021) (20)
- ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things (2020) (20)
- Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’ (2015) (20)
- Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges (2017) (20)
- A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography (2012) (20)
- Communal Acts of IoT Consumers: A Potential Threat to Security and Privacy (2019) (19)
- On the Analysis and Detection of Mobile Botnet Applications (2016) (19)
- A fast RFID tag identification algorithm based on counter and stack (2011) (19)
- Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid (2021) (19)
- Cryptanalysis of a key agreement protocol based on chaotic Hash (2013) (18)
- A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication (2017) (18)
- Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems (2021) (18)
- An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment (2019) (17)
- A secure and efficient identity‐based mutual authentication scheme with smart card using elliptic curve cryptography (2017) (17)
- Mutual funds trading strategy based on particle swarm optimization (2011) (17)
- Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing (2010) (17)
- Towards port-knocking authentication methods for mobile cloud computing (2017) (17)
- An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data (2018) (17)
- Steganalysis for palette-based images using generalized difference image and color correlogram (2011) (17)
- A secure and efficient public auditing scheme using RSA algorithm for cloud storage (2017) (17)
- APPLICATION OF GREY-RELATIONAL ANALYSIS TO FIND THE MOST SUITABLE WATERMARKING SCHEME (2011) (17)
- One-Time Password System with Infinite Nested Hash Chains (2010) (17)
- A novel authentication and key‐agreement scheme for satellite communication network (2020) (16)
- Polymorphic Malware Detection Using Hierarchical Hidden Markov Model (2011) (16)
- Trust Management in Social Internet of Things: Architectures, Recent Advancements, and Future Challenges (2021) (16)
- On the Security of a RSA-based Certificateless Signature Scheme (2014) (16)
- A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography (2017) (16)
- Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks (2022) (16)
- Authentication and Tamper Detection of Digital Holy Quran Images (2013) (15)
- Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme (2013) (15)
- Cloud-Based Wireless Body Area Networks: Managing Data for Better Health Care (2019) (15)
- A novel audio forensic data-set for digital multimedia forensics (2018) (15)
- Systematic survey of mobile payments, protocols, and security infrastructure (2021) (15)
- Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran (2014) (15)
- Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique (2017) (15)
- A New Random Walk for Replica Detection in WSNs (2016) (15)
- Adaptively weighted sub-directional two-dimensional linear discriminant analysis for face recognition (2012) (14)
- An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network (2021) (14)
- Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis (2016) (14)
- A more secure digital rights management authentication scheme based on smart card (2014) (14)
- Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor (2016) (13)
- Five acts of consumer behavior: A potential security and privacy threat to Internet of Things (2018) (12)
- A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems (2015) (12)
- Designing secure and lightweight user access to drone for smart city surveillance (2022) (12)
- A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things (2021) (12)
- Privacy-preserving and tokenless chaotic revocable face authentication scheme (2011) (12)
- Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks' (2010) (12)
- Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement (2013) (12)
- EHR: Routing Protocol for Energy Harvesting Wireless Sensor Networks (2016) (12)
- Research advances in data hiding for multimedia security (2011) (12)
- Qualified Analysis b/w ESB(s) Using Analytical Hierarchy Process (AHP) Method (2011) (12)
- An Efficient Binary Differential Evolution with Parameter Adaptation (2013) (11)
- Analysis of enterprise service buses based on information security, interoperability and high-availability using analytical hierarchy process (AHP) method (2011) (11)
- A User Anonymous Mutual Authentication Protocol (2016) (11)
- Towards a set aggregation-based data integrity scheme for smart grids (2017) (11)
- Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014 (2015) (11)
- Advanced Communication and Networking - Second International Conference, ACN 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings (2010) (10)
- Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles (2013) (10)
- Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits (2018) (10)
- Exploiting Digital Watermarking to Preserve Integrity of the Digital Holy Quran Images (2013) (10)
- A scene image classification technique for a ubiquitous visual surveillance system (2018) (9)
- A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor (2018) (9)
- A framework to address inconstant user requirements in cloud SLAs management (2015) (9)
- Augmenting Cybersecurity in Autonomous Vehicles: Innovative Recommendations for Aspiring Entrepreneurs (2021) (9)
- Banknote Validation through an Embedded RFID Chip and an NFC-Enabled Smartphone (2015) (9)
- On the security of an authentication scheme for multi-server architecture (2013) (9)
- An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System (2022) (9)
- Secure content‐based image retrieval using modified Euclidean distance for encrypted features (2020) (9)
- Statistical based audio forensic on identical microphones (2016) (8)
- DWT+LSB-based fragile watermarking method for digital Quran images (2014) (8)
- An efficient remote mutual authentication scheme using smart mobile phone over insecure networks (2015) (8)
- Fingerprint verification using fingerprint texture (2009) (8)
- Towards augmented proactive cyberthreat intelligence (2019) (8)
- An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing (2022) (8)
- EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme (2020) (8)
- An efficient chaos‐based 2‐party key agreement protocol with provable security (2017) (8)
- Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms (2011) (8)
- Intelligent Technique for Seamless Vertical Handover in Vehicular Networks (2018) (8)
- Fingerprint Verification Based on Statistical Analysis (2010) (8)
- On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues (2017) (8)
- A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET (2022) (7)
- Embedding High Capacity Covert Channels in Short Message Service (SMS) (2011) (7)
- Joint-learning segmentation in Internet of drones (IoD)-based monitor systems (2020) (7)
- On the security enhancement of integrated electronic patient records information systems (2015) (7)
- Modified artificial bee colony optimization with block perturbation strategy (2015) (7)
- Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios (2021) (7)
- Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications (2021) (6)
- Verifiable dynamic ranked search with forward privacy over encrypted cloud data (2021) (6)
- Core-Point Detection on Camera-Based Fingerprint Image (2013) (6)
- Secure Instant Messaging Protocol for Centralized Communication Group (2011) (6)
- Volunteer Computing in Connected Vehicles: Opportunities and Challenges (2020) (6)
- A survey on the blockchain techniques for the Internet of Vehicles security (2021) (6)
- Security analysis of a publicly verifiable data possession scheme for remote storage (2017) (5)
- Cloud-assisted Industrial Systems and Applications (2016) (5)
- Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View (2022) (5)
- Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding) (2009) (5)
- A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography (2021) (5)
- A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design (2015) (5)
- Information Sharing in Vehicular AdHoc Network (2010) (5)
- Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol" (2012) (5)
- Study on the common criteria methodology for secure ubiquitous environment construction (2012) (5)
- Cryptanalysis and improvement of ‘a secure authentication scheme for telecare medical information system’ with nonce verification (2016) (5)
- Security Technology, Disaster Recovery and Business Continuity (2011) (5)
- Further cryptanalysis of ‘A remote authentication scheme using mobile device’ (2012) (5)
- Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code (2013) (5)
- Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks Using Collaborative Communication (2019) (5)
- Cryptanalysis of “an improved timestamp-based remote user authentication scheme” (2012) (5)
- Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device (2013) (5)
- Bat algorithm–based beamforming for mmWave massive MIMO systems (2019) (5)
- Cryptanalysis of a robust smart card authentication scheme for multi-server architecture (2014) (5)
- Reliable and Secure e-Health Networks (2021) (5)
- Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card (2016) (4)
- Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme" (2013) (4)
- Efficient Privacy-Preserving Authentication Scheme With Fine-Grained Error Location for Cloud-Based VANET (2021) (4)
- Biometric driven initiative system for passive continuous authentication (2011) (4)
- Enhancing the Security of a "More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme' (2009) (4)
- BAN Logic-Based Security Proof for Mobile OTP Authentication Scheme (2012) (4)
- Spam Trapping System: Novel security framework to fight against spam botnets (2014) (4)
- The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices (2014) (4)
- Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography (2015) (4)
- Detecting counterfeit-money using RFID-enabled mobile devices (2012) (4)
- Hand-based multibiometric systems: state-of-the-art and future challenges (2021) (4)
- Comments on “Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC” (2021) (4)
- A high-level domain-specific language for SIEM (design, development and formal verification) (2017) (4)
- NEW ROBUST PROTOCOLS FOR REMOTE USER AUTHENTICATION AND PASSWORD CHANGE (2011) (3)
- Radiological image retrieval technique using multi-resolution texture and shape features (2021) (3)
- Formal modeling and verification of security controls for multimedia systems in the cloud (2017) (3)
- Comment on “Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication” (2021) (3)
- Structures and data preserving homomorphic signatures (2018) (3)
- Advanced science and technology letters : advanced researches on security and assurance (2013) (2)
- Temporal, Delegable and Cheap Update Access control to published XML Documents (2013) (2)
- Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme (2014) (2)
- Trusted-based scalable access control model for broadcast XML documents. (2013) (2)
- Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing (2022) (2)
- On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing (2021) (2)
- Erratum: Cryptanalysis and improvement of "A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks" (PLoS ONE (2015) 10:11 (e0142716) DOI:10.1371/journal.pone.0142716) (2015) (2)
- Co-occurrence matrix features for fingerprint verification (2011) (2)
- Cryptanalysis of an identity-based public auditing protocol for cloud storage (2017) (2)
- Attack containment in mobile ad-hoc networks through fair distribution of processing resources (2014) (2)
- A more secure digital rights management authentication scheme based on smart card (2014) (2)
- Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function (2021) (2)
- Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings (2010) (2)
- Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard" (2013) (2)
- A secure framework for digital Quran certification (2017) (2)
- Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs (2014) (2)
- CrowdSwitch: Crowdsensing Based Switch between Multiple Cellular Operators in Subways (2019) (1)
- SNKnock: A free security tool for Facebook users (2016) (1)
- Securing smart phones against malicious exploits (2012) (1)
- DYNAMIC PASSWORD BASED REMOTE USER AUTHENTICATION WITHOUT TIME STAMPING (2012) (1)
- Difference histogram analysis of several reversible data hiding schemes (2009) (1)
- Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance (2020) (1)
- On Software-De fi ned Wireless Network ( SDWN ) Network Virtualization : Challenges and Open Issues (2017) (1)
- A blockchain-based conditional privacy-preserving authentication scheme for edge computing services (2022) (1)
- Improvement of the Efficient Secret Broadcast Scheme (2010) (1)
- A probable cheating-free (t, n) threshold secret sharing scheme with enhanced blockchain (2022) (1)
- Special issue on: Recent advances and future directions in biometrics personal identification (2010) (1)
- 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, Kuala Lumpur, Malaysia, August 26-27, 2014 (2014) (1)
- Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021 (2021) (1)
- Big Data and Security: First International Conference, ICBDS 2019, Nanjing, China, December 20–22, 2019, Revised Selected Papers (2020) (1)
- A Framework for Detecting Malformed SMS Attack (2011) (1)
- Guest editorial for special issue on biometric systems and applications (2011) (1)
- Digital Labels: Influencing Consumers Trust and Raising Cybersecurity Awareness for Adopting Autonomous Vehicles (2021) (1)
- Finding a Needle in a Haystack: Variant Effect Predictor (VEP) Prioritizes Disease Causative Variants from Millions of Neutral Ones (2019) (1)
- Security analysis of a publicly verifiable data possession scheme for remote storage (2017) (0)
- Advances in Software Engineering (2009) (0)
- Understanding Multi-Path Routing Algorithms in Datacenter Networks (2019) (0)
- High performance biometrics recognition algorithms and systems (2012) (0)
- Retraction notice to 'Dynamic Remote Data Auditing for Securing Big Data Storage in Cloud Computing' [Information Sciences 380 (2017) 101-116] (2018) (0)
- A secure and efficient public auditing scheme using RSA algorithm for cloud storage (2017) (0)
- 3D block-based medial axis transform and chessboard distance transform based on dominance (2011) (0)
- Proceedings Advanced Communication and Networking (ACN2010) (2010) (0)
- Comments and improvements of “HOTA: Handover optimized ticket-based authentication in network-based mobility management” (2017) (0)
- Recent Advances in Information Security (2014) (0)
- Notes on “a password-based remote user authentication scheme without smart card” (2014) (0)
- A New Remote Fuzzy User Password Authentication Scheme Using Sub-tree for Cloud Computing (2021) (0)
- Advances in Software Engineering - International Conference, ASEA 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings (2010) (0)
- Information flow analysis of UCON (2010) (0)
- Security Technology: International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in ... in Computer and Information Science) (2012) (0)
- Information security and assurance : Proceedings international conference, ISA 2012, Shanghai China, April 2012 (2012) (0)
- An efficient certificateless key exchange protocol for heterogeneous networks in human-centered IoT systems (2019) (0)
- Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards (2013) (0)
- Digital Holy Quran Computing: An Information Security Perspective (2016) (0)
- Correction (2020) (0)
- Cracking the Anonymous IoT Routing Networks: A Deep Learning Approach (2023) (0)
- Efficient and secure e‐voting scheme using elliptic curve cryptography (2022) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Muhammad Khurram Khan?
Muhammad Khurram Khan is affiliated with the following schools: