default search action
Muhammad Sher
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j46]Mateeul Haq, Muhammad Jawed Iqbal, Khan Alam, Zhongwei Huang, Thomas Blaschke, Salman Qureshi, Muhammad Sher:
Assessment of Runoff Components of River Flow in the Karakoram Mountains, Pakistan, during 1995-2010. Remote. Sens. 15(2): 399 (2023) - [j45]Muhammad Younis Khan, Federico Zaina, Sher Muhammad, Deodato Tapete:
Integrating Copernicus Satellite Products and Ground-Truthing for Documenting and Monitoring the Impact of the 2022 Extreme Floods in Pakistan on Cultural Heritage. Remote. Sens. 15(10): 2518 (2023) - 2021
- [j44]Yun Jiang, Hassan Ahmad, Asad Hassan Butt, Muhammad Nouman Shafique, Sher Muhammad:
QR Digital Payment System Adoption by Retailers: The Moderating Role of COVID-19 Knowledge. Inf. Resour. Manag. J. 34(3): 41-63 (2021) - 2020
- [j43]Ata Ullah, Ghawar Said, Muhammad Sher, Huansheng Ning:
Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN. Peer-to-Peer Netw. Appl. 13(1): 163-174 (2020)
2010 – 2019
- 2019
- [j42]Syed Muhammad Saqlain Shah, Muhammad Sher, Faiz Ali Shah, Imran Khan, Muhammad Usman Ashraf, Muhammad Awais, Anwar Ghani:
Fisher score and Matthews correlation coefficient-based feature subset selection for heart disease diagnosis using support vector machines. Knowl. Inf. Syst. 58(1): 139-167 (2019) - [j41]Azeem Irshad, Shehzad Ashraf Chaudhry, Muhammad Sher, Bander A. Alzahrani, Saru Kumari, Xiong Li, Fan Wu:
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre. IEEE Syst. J. 13(1): 436-446 (2019) - 2018
- [j40]Shafina Bibi, Nadeem Anjum, Muhammad Sher:
Automated multi-feature human interaction recognition in complex environment. Comput. Ind. 99: 282-293 (2018) - [j39]Mohammad Ishaq, Gohar Ali, Zahir Shah, Saeed Islam, Sher Muhammad:
Entropy Generation on Nanofluid Thin Film Flow of Eyring-Powell Fluid with Thermal Radiation and MHD Effect on an Unsteady Porous Stretching Sheet. Entropy 20(6): 412 (2018) - [j38]Azeem Irshad, Muhammad Sher, Bander A. Alzahrani, Aiiad Albeshri, Shehzad Ashraf Chaudhry, Saru Kumari:
Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al. KSII Trans. Internet Inf. Syst. 12(1): 523-549 (2018) - [j37]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Qi Xie, Saru Kumari, Fan Wu:
An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multim. Tools Appl. 77(1): 1167-1204 (2018) - [j36]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Saru Kumari, Arun Kumar Sangaiah, Xiong Li, Fan Wu:
A secure mutual authenticated key agreement of user with multiple servers for critical systems. Multim. Tools Appl. 77(9): 11067-11099 (2018) - [j35]Shehzad Ashraf Chaudhry, Husnain Naqvi, Mohammad Sabzinejad Farash, Taeshik Shon, Muhammad Sher:
An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J. Supercomput. 74(8): 3504-3520 (2018) - [j34]Imran Khan, Shehzad Ashraf Chaudhry, Muhammad Sher, Muhammad Khurram Khan:
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data. J. Supercomput. 74(8): 3685-3703 (2018) - 2017
- [j33]Muhammad Fahad Umer, Muhammad Sher, Yaxin Bi:
Applying One-Class Classification Techniques to IP Flow Records for Intrusion Detection. Balt. J. Mod. Comput. 5(1): 70-86 (2017) - [j32]Muhammad Fahad Umer, Muhammad Sher, Yaxin Bi:
Flow-based intrusion detection: Techniques and challenges. Comput. Secur. 70: 238-254 (2017) - [j31]Eid Rehman, Muhammad Sher, Syed Hussnain Abbas Naqvi, Khan Bahadar Khan, Kamran Ullah:
Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network. J. Comput. Networks Commun. 2017: 1630673:1-1630673:8 (2017) - [j30]Azeem Irshad, Muhammad Sher, Omer Nawaz, Shehzad Ashraf Chaudhry, Imran Khan, Saru Kumari:
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme. Multim. Tools Appl. 76(15): 16463-16489 (2017) - [j29]Shehzad Ashraf Chaudhry, Husnain Naqvi, Muhammad Sher, Mohammad Sabzinejad Farash, Mahmood Ul Hassan:
An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Netw. Appl. 10(1): 1-15 (2017) - [j28]Shireen Tahira, Muhammad Sher, Ata Ullah, Muhammad Imran, Athanasios V. Vasilakos:
Handover Based IMS Registration Scheme for Next Generation Mobile Networks. Wirel. Commun. Mob. Comput. 2017 (2017) - [j27]Azeem Irshad, Muhammad Sher, Muhammad Usman Ashraf, Bander A. Alzahrani, Fan Wu, Qi Xie, Saru Kumari:
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme. Wirel. Pers. Commun. 95(3): 3185-3208 (2017) - 2016
- [j26]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, Muhammad Sher:
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res. 16(1): 113-139 (2016) - [j25]Imran Khan, Muhammad Sher, Javed I. Khan, Syed Muhammd Saqlain, Anwar Ghani, Syed Husnain Abbas Naqvi, Muhammad Usman Ashraf:
Conversion of Legal Text to a Logical Rules Set from Medical Law Using the Medical Relational Model and the World Rule Model for a Medical Decision Support System. Informatics 3(1): 2 (2016) - [j24]Azeem Irshad, Muhammad Sher, Hafiz Farooq Ahmad, Bander A. Alzahrani, Shehzad Ashraf Chaudhry, Rahul Kumar:
An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services. KSII Trans. Internet Inf. Syst. 10(12): 5529-5552 (2016) - [j23]Azeem Irshad, Hafiz Farooq Ahmad, Bander A. Alzahrani, Muhammad Sher, Shehzad Ashraf Chaudhry:
An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture. KSII Trans. Internet Inf. Syst. 10(12): 5572-5595 (2016) - [j22]AtaUllah Ghafoor, Muhammad Sher, Muhammad Imran, Imran Baig:
Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks. J. Sensors 2016: 5071617:1-5071617:15 (2016) - [j21]Hina Nasir, Nadeem Javaid, Muhammad Sher, Umar Qasim, Zahoor Ali Khan, Nabil Ali Alrajeh, Iftikhar Azim Niaz:
Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks. Sensors 16(7): 1076 (2016) - [j20]Anwar Ghani, Syed Husnain Abbas Naqvi, Muhammad Sher, Zeeshan Shafi Khan, Imran Khan, Muhammad Saqlain:
Energy efficient communication in body area networks using collaborative communication in Rayleigh fading channel. Telecommun. Syst. 63(3): 357-370 (2016) - [j19]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Husnain Naqvi, Mohammad Sabzinejad Farash:
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre. J. Supercomput. 72(4): 1623-1644 (2016) - 2015
- [j18]AtaUllah Ghafoor, Muhammad Sher, Muhammad Imran, Abdelouahid Derhab:
Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks. Int. J. Distributed Sens. Networks 11: 542856:1-542856:13 (2015) - [j17]Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Muhammad Sher, Mohammad Sabzinejad Farash:
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems. J. Medical Syst. 39(6): 66:1-66:11 (2015) - [j16]Shehzad Ashraf Chaudhry, Nizamuddin, Muhammad Sher, Anwar Ghani, Husnain Naqvi, Azeem Irshad:
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multim. Tools Appl. 74(5): 1711-1723 (2015) - [j15]Azeem Irshad, Muhammad Sher, Eid Rehman, Shehzad Ashraf Chaudhry, Mahmood Ul Hassan, Anwar Ghani:
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card. Multim. Tools Appl. 74(11): 3967-3984 (2015) - [c27]Shehzad Ashraf Chaudhry, Khalid Mahmood, Husnain Naqvi, Muhammad Sher:
A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography. CIT/IUCC/DASC/PICom 2015: 1960-1965 - [c26]Muhammad Fahad Umer, Muhammad Sher:
Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning. ES 2015: 97-119 - [c25]AtaUllah Ghafoor, Muhammad Sher, Muhammad Imran, Kashif Saleem:
A Lightweight Key Freshness Scheme for Wireless Sensor Networks. ITNG 2015: 169-173 - [i3]Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Ch. Muhammad Shahzad Faisal, Mahmood Ul Hassan:
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment. IACR Cryptol. ePrint Arch. 2015: 686 (2015) - 2014
- [j14]Abdul Mateen, Basit Raza, Muhammad Sher, Mian M. Awais, Mustapha Norwatti:
Workload management: a technology perspective with respect to self-* characteristics. Artif. Intell. Rev. 41(4): 463-489 (2014) - [j13]Abdul Mateen, Mian Muhammad Awais, Mustapha Norwatti, Muhammad Sher, Ahmad Nisar:
Database workload management through CBR and fuzzy based characterization. Appl. Soft Comput. 22: 605-621 (2014) - [j12]Azeem Irshad, Muhammad Sher, Ch. Muhammad Shahzad Faisal, Anwer Ghani, Mahmood Ul Hassan, Shehzad Ashraf Chaudhry:
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Secur. Commun. Networks 7(8): 1210-1218 (2014) - [j11]Farzana Azam, Zeeshan Shafi Khan, Muhammad Sher, Khaled Alghathbar, Muhammad Khurram Khan:
Attack containment in mobile ad-hoc networks through fair distribution of processing resources. Telecommun. Syst. 55(1): 93-103 (2014) - [c24]Hina Nasir, Nadeem Javaid, Muniba Murtaza, S. Manzoor, Zahoor Ali Khan, Umar Qasim, Muhammad Sher:
ACE: Adaptive Cooperation in EEDBR for Underwater Wireless Sensor Networks. BWCCA 2014: 8-14 - [c23]Hina Nasir, Nadeem Javaid, Hifsa Ashraf, S. Manzoor, Zahoor Ali Khan, Umar Qasim, Muhammad Sher:
CoDBR: Cooperative Depth Based Routing for Underwater Wireless Sensor Networks. BWCCA 2014: 52-57 - 2013
- [j10]Aneel Rahim, Muhammad Sher, Zeeshan Shafi Khan, Fahad Bin Muhaya:
Editorial "Secure Multimedia Communication in Vehicular Adhoc Network". Multim. Tools Appl. 66(2): 161-164 (2013) - [c22]Muhammad Sher, Chaman Gul, Amir Javed, Javeria Muneer, Mirza Muhammad Waqar:
Comparison of glacier change detection using pixel based and object based classification techniques. IGARSS 2013: 4118-4121 - [i2]Khan Farhan Rafat, Muhammad Sher:
On The Limits Of Perfect Security For Steganographic System. CoRR abs/1310.5902 (2013) - 2012
- [j9]Tehmina Amjad, Muhammad Sher, Ali Daud:
A survey of dynamic replication strategies for improving data availability in data grids. Future Gener. Comput. Syst. 28(2): 337-349 (2012) - [c21]Shehzad Ashraf Chaudhry, Nizamuddin, Muhammad Sher:
Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem. ICISTM 2012: 135-142 - [c20]Muzaffar Iqbal, Muhammad Uzair Khan, Muhammad Sher:
System Analysis and Modeling Using SysML. ICITCS 2012: 1211-1220 - 2011
- [c19]Zeeshan Shafi Khan, Muhammad Sher, Khalid Rashid:
Presence Based Secure Instant Messaging Mechanism for IP Multimedia Subsystem. ICCSA (5) 2011: 447-457 - 2010
- [j8]Aneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya, Muhammad Sher, Muhammad Khurram Khan:
Information Sharing in Vehicular AdHoc Network. Int. J. Comput. Commun. Control 5(5): 892-899 (2010) - [j7]Aneel Rahim, Fahad Bin Muhaya, Zeeshan Shafi Khan, M. A. Ansari, Muhammad Sher:
Enhanced Relevance-Based Approach for Network Controls. Informatica (Slovenia) 34(2): 223-226 (2010) - [j6]Muhammad Imran Razzak, Fareeha Anwar, S. Afaq Husain, Abdel Belaïd, Muhammad Sher:
HMM and fuzzy logic: A hybrid approach for online Urdu script-based languages' character recognition. Knowl. Based Syst. 23(8): 914-923 (2010) - [j5]Aneel Rahim, Zeeshan Shafi Khan, Fahad T. Bin Muhaya, Muhammad Sher, Tai-Hoon Kim:
Sensor Based Framework for Secure Multimedia Communication in VANET. Sensors 10(11): 10146-10154 (2010) - [c18]Basit Raza, Abdul Mateen, Muhammad Sher, Mian M. Awais, Tauqeer Hussain:
Autonomicity in Oracle Database Management System. DSDE 2010: 296-300 - [c17]Zeeshan Shafi Khan, Khaled Alghathbar, Muhammad Sher, Khalid Rashid:
Issues of Security and Network Load in Presence - A Survey. FGIT-SecTech/DRBC 2010: 224-230 - [c16]Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad Sher, Rashid Mehmood:
Secure single packet IP Traceback mechanism to identify the source. ICITST 2010: 1-5 - [c15]Basit Raza, Abdul Mateen, Muhammad Sher, Mian M. Awais, Tauqeer Hussain:
Autonomic View of Query Optimizers in Database Management Systems. SERA 2010: 3-8 - [c14]Rehan Shafi, Aneel Rahim, Fahad Bin Muhaya, Shehzad Ashraf, Muhammad Sher:
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks. ISA 2010: 233-240 - [i1]Khan Farhan Rafat, Muhammad Sher:
State Of The Art In Digital Steganography Focusing ASCII Text Documents. CoRR abs/1003.1470 (2010)
2000 – 2009
- 2009
- [j4]Zeeshan Shafi Khan, Muhammad Sher, Khalid Rashid, Aneel Rahim:
A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging. Inf. Secur. J. A Glob. Perspect. 18(3): 139-148 (2009) - [c13]Surraya Khanum, Muhammad Usman, Khalid Hussain, Rehab Zafar, Muhammad Sher:
Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture. HPCA (China) 2009: 212-217 - [c12]Khan Farhan Rafat, Muhammad Sher:
Digital steganography for ASCII text documents Ph.D. research proposal. FIT 2009: 59:1-59:4 - 2008
- [c11]Yacine Rebahi, Muhammad Sher, Thomas Magedanz:
Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks. AICCSA 2008: 848-851 - [c10]Aneel Rahim, Muhammad Sher, Adeel Javed, Imran Ahmad, Rehman Hameed:
Performance analysis of TCP in VANETs by using 802.11e. ICON 2008: 1-3 - [c9]Adel Al-Hezmi, Fabricio Carvalho de Gouveia, Muhammad Sher, Oliver Friedrich, Thomas Magedanz:
Provisioning IMS-based seamless triple play services over different access networks. NOMS 2008: 927-930 - 2007
- [b1]Muhammad Sher:
Secure Service Provisioning (SSP) framework for IP Multimedia Subsystem (IMS). Technical University of Berlin, Germany, 2007, ISBN 978-3-86664-343-7, pp. 1-202 - [j3]Muhammad Sher, Thomas Magedanz:
A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications. Comput. Networks 51(16): 4697-4709 (2007) - [c8]Muhammad Sher, Thomas Magedanz:
3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. ARES 2007: 198-205 - [c7]Muhammad Sher, Thomas Magedanz:
Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks. IAS 2007: 171-176 - [c6]Muhammad Sher, Thomas Magedanz:
Mobile multimedia broadcasting vulnerability threats, attacks and security solutions. MWCN 2007: 56-60 - 2006
- [j2]Muhammad Sher, Thomas Magedanz:
Development of IMS Privacy & Security Framework for Open IMS Fokus Testbed. J. Mobile Multimedia 2(3): 225-258 (2006) - [j1]Muhammad Sher, Thomas Magedanz:
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS). J. Networks 1(6): 10-17 (2006) - [c5]Muhammad Sher, Thomas Magedanz, Walter T. Penzhorn:
Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS). ARES 2006: 502-509 - [c4]Muhammad Sher, Thomas Magedanz:
Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks. Q2SWinet 2006: 17-24 - [r1]Thomas Magedanz, Muhammad Sher:
IT-Based Open Service Delivery Platforms for Mobile Networks. The Handbook of Mobile Middleware 2006: 999-1035 - 2005
- [c3]Muhammad Sher, Thomas Magedanz:
Security Associations Management (SAM) Model for IP Multimedia System (IMS). Net-Con 2005: 311-325 - [c2]Muhammad Sher, Thomas Magedanz:
Network Access Security Management (NASM) Model for Next Generation Mobile Telecommunication Networks. MATA 2005: 263-272 - 2004
- [c1]Raheel Siddiqui, Muhammad Sher, Khalid Rashid:
Face Identification based on Biological Trait using Infrared Images after Cold Effect Enhancement and Sunglasses Filtering. WSCG (Posters) 2004: 161-164
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 02:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint