


Остановите войну!
for scientists:


default search action
Muhammad Khurram Khan
Person information

- affiliation: King Saud University, Center of Excellence in Information Assurance, Riyadh, Saudi Arabia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j335]Tengfei Wu
, Lu Leng, Muhammad Khurram Khan:
A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selection. Artif. Intell. Rev. 56(7): 6169-6186 (2023) - [j334]Wazir Zada Khan
, Muhammad Khurram Khan
, Qurat-ul-Ain Arshad
:
Cybersecurity Digital Labels for Connected and Autonomous Vehicles. IEEE Consumer Electron. Mag. 12(1): 87-93 (2023) - [j333]Anay Ghosh, Saiyed Umer
, Muhammad Khurram Khan, Ranjeet Kumar Rout, Bibhas Chandra Dhara:
Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework. Clust. Comput. 26(1): 119-135 (2023) - [j332]Wenfang Zhang, Heng Jiao
, Zhuoqun Yan, Xiaomin Wang, Muhammad Khurram Khan:
Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing. Comput. Secur. 125: 103019 (2023) - [j331]Suleman Khan
, Muhammad Khurram Khan
, Rizwan Khan:
Harnessing intelligent technologies to curb COVID-19 pandemic: taxonomy and open challenges. Computing 105(4): 811-830 (2023) - [j330]Somayeh Samsamian, Aliakbar Hasani, Saqib Hakak, Fatemeh Esmaeilnezhad Tanha, Muhammad Khurram Khan:
Comprehensive risk assessment and analysis of blockchain technology implementation using fuzzy cognitive mapping. Comput. Sci. Inf. Syst. 20(3): 977-996 (2023) - [j329]Xiang Chen
, Chunming Wu
, Xuan Liu
, Qun Huang
, Dong Zhang
, Haifeng Zhou
, Qiang Yang
, Muhammad Khurram Khan
:
Empowering Network Security With Programmable Switches: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(3): 1653-1704 (2023) - [j328]Linghe Kong
, Jinlin Tan
, Junqin Huang
, Guihai Chen
, Shuaitian Wang
, Xi Jin
, Peng Zeng
, Muhammad Khurram Khan, Sajal K. Das
:
Edge-computing-driven Internet of Things: A Survey. ACM Comput. Surv. 55(8): 174:1-174:41 (2023) - [j327]Li Chen
, Ke Zhang, Saru Kumari
, Muhammad Khurram Khan, Zhiying Kong, Pradeep Chaudhary:
An efficient certificateless key exchange protocol for heterogeneous networks in human-centered IoT systems. Int. J. Commun. Syst. 36(12) (2023) - [j326]Jiachen Yang, Houbing Song
, Muhammad Khurram Khan:
Editor's Note. Int. J. Interact. Multim. Artif. Intell. 8(1): 4 (2023) - [j325]Xin Chen, Debiao He
, Muhammad Khurram Khan
, Min Luo
, Cong Peng
:
A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things. IEEE Internet Things J. 10(10): 9136-9147 (2023) - [j324]Gaurang Bansal, Vinay Chamola, Amir Hussain, Muhammad Khurram Khan:
Cracking the Anonymous IoT Routing Networks: A Deep Learning Approach. IEEE Internet Things Mag. 6(1): 120-126 (2023) - [j323]Sriramulu Bojjagani
, V. N. Sastry, Chien-Ming Chen
, Saru Kumari, Muhammad Khurram Khan:
Systematic survey of mobile payments, protocols, and security infrastructure. J. Ambient Intell. Humaniz. Comput. 14(1): 609-654 (2023) - [j322]Nauman Khan, Rosli Bin Salleh, Anis Koubaa, Zahid Khan, Muhammad Khurram Khan, Ihsan Ali:
Data plane failure and its recovery techniques in SDN: A systematic literature review. J. King Saud Univ. Comput. Inf. Sci. 35(3): 176-201 (2023) - [j321]Ashish Singh, Adnan Gutub
, Anand Nayyar
, Muhammad Khurram Khan:
Redefining food safety traceability system through blockchain: findings, challenges and open issues. Multim. Tools Appl. 82(14): 21243-21277 (2023) - [j320]Yinyan Gong, Kuan-Ching Li, Lijun Xiao, Jiahong Cai, Jiahong Xiao, Wei Liang, Muhammad Khurram Khan:
VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV. Sensors 23(11): 5198 (2023) - [j319]Qurat-ul-Ain Arshad
, Wazir Zada Khan
, Faisal Azam, Muhammad Khurram Khan
:
Deep-Learning-Based COVID-19 Detection: Challenges and Future Directions. IEEE Trans. Artif. Intell. 4(2): 210-228 (2023) - [j318]Muhammad Khurram Khan:
AI-enabled transformations in telecommunications industry. Telecommun. Syst. 82(1): 1-2 (2023) - [j317]Ashish Singh
, Abhinav Kumar
, Zahid Akhtar
, Muhammad Khurram Khan
:
Guest Editorial: Cybersecurity Intelligence in the Healthcare System. IEEE Trans. Ind. Informatics 19(1): 809-812 (2023) - [j316]Zijian Bao, Debiao He
, Muhammad Khurram Khan
, Min Luo
, Qi Xie:
PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(2): 1524-1534 (2023) - [j315]Yongshuai Duan
, Junqin Huang
, Jiale Lei, Linghe Kong
, Yibin Lv, Zhiliang Lin, Guihai Chen, Muhammad Khurram Khan
:
AISChain: Blockchain-Based AIS Data Platform With Dynamic Bloom Filter Tree. IEEE Trans. Intell. Transp. Syst. 24(2): 2332-2343 (2023) - [j314]Yulin Liu
, Debiao He
, Zijian Bao
, Huaqun Wang
, Muhammad Khurram Khan
, Kim-Kwang Raymond Choo
:
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks. IEEE Trans. Intell. Veh. 8(4): 2998-3011 (2023) - [j313]Zahid Ghaffar
, Salman Shamshad
, Khalid Mahmood
, Mohammad S. Obaidat
, Saru Kumari
, Muhammad Khurram Khan
:
A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment. IEEE Trans. Netw. Sci. Eng. 10(1): 103-112 (2023) - [j312]Xiaotong Zhou, Debiao He
, Muhammad Khurram Khan
, Wei Wu
, Kim-Kwang Raymond Choo
:
An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 72(1): 81-92 (2023) - [e9]Yuan Tian
, Tinghuai Ma
, Qingshan Jiang
, Qi Liu
, Muhammad Khurram Khan
:
Big Data and Security - 4th International Conference, ICBDS 2022, Xiamen, China, December 8-12, 2022, Proceedings. Communications in Computer and Information Science 1796, Springer 2023, ISBN 978-981-99-3299-3 [contents] - [i4]Muhammad Adil, Houbing Song, Muhammad Khurram Khan, Ahmed Farouk, Zhanpeng Jin:
5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directions. CoRR abs/2305.16473 (2023) - 2022
- [j311]Mohammad Wazid
, Jaskaran Singh
, Ashok Kumar Das
, Sachin Shetty
, Muhammad Khurram Khan
, Joel J. P. C. Rodrigues
:
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things. IEEE Access 10: 57990-58004 (2022) - [j310]Shidrokh Goudarzi, Seyed Ahmad Soleymani
, Mohammad Hossein Anisi
, Mohammad Abdollahi Azgomi
, Zeinab Movahedi
, Nazri Kama, Hazlifah Mohd Rusli, Muhammad Khurram Khan:
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET. Ad Hoc Networks 128: 102782 (2022) - [j309]Chinmay Chakraborty, Muhammad Khurram Khan, Ishfaq Ahmad:
Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: March 31, 2022. Big Data 10(1): 81-82 (2022) - [j308]Uddalak Chatterjee, Sangram Ray
, Muhammad Khurram Khan, Mou Dasgupta, Chien-Ming Chen
:
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. Computing 104(6): 1359-1395 (2022) - [j307]Sajid Hussain
, Khalid Mahmood, Muhammad Khurram Khan, Chien-Ming Chen
, Bander A. Alzahrani, Shehzad Ashraf Chaudhry
:
Designing secure and lightweight user access to drone for smart city surveillance. Comput. Stand. Interfaces 80: 103566 (2022) - [j306]Basudeb Bera
, Anusha Vangala
, Ashok Kumar Das
, Pascal Lorenz
, Muhammad Khurram Khan:
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Comput. Stand. Interfaces 80: 103567 (2022) - [j305]Suman Majumder, Sangram Ray
, Dipanwita Sadhukhan
, Muhammad Khurram Khan, Mou Dasgupta:
ESOTP: ECC-based secure object tracking protocol for IoT communication. Int. J. Commun. Syst. 35(3) (2022) - [j304]Awais Manzoor
, Munam Ali Shah
, Hasan Ali Khattak
, Ikram Ud Din
, Muhammad Khurram Khan:
Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges. Int. J. Commun. Syst. 35(12) (2022) - [j303]Christos Xenofontos
, Ioannis Zografopoulos
, Charalambos Konstantinou
, Alireza Jolfaei
, Muhammad Khurram Khan
, Kim-Kwang Raymond Choo
:
Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. IEEE Internet Things J. 9(1): 199-221 (2022) - [j302]Cong Peng
, Min Luo
, Huaqun Wang
, Muhammad Khurram Khan
, Debiao He
:
An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT. IEEE Internet Things J. 9(1): 589-600 (2022) - [j301]Muhammad Usman Younus
, Muhammad Khurram Khan
, Abdul Rauf Bhatti:
Improving the Software-Defined Wireless Sensor Networks Routing Performance Using Reinforcement Learning. IEEE Internet Things J. 9(5): 3495-3508 (2022) - [j300]Zeeshan Siddiqui
, Jiechao Gao
, Muhammad Khurram Khan
:
An Improved Lightweight PUF-PKI Digital Certificate Authentication Scheme for the Internet of Things. IEEE Internet Things J. 9(20): 19744-19756 (2022) - [j299]Xingbo Dong
, Muhammad Khurram Khan
, Lu Leng
, Andrew Beng Jin Teoh
:
Co-Learning to Hash Palm Biometrics for Flexible IoT Deployment. IEEE Internet Things J. 9(23): 23786-23794 (2022) - [j298]Yifan Wang, Xiaoying Jia
, Yongbo Xia, Muhammad Khurram Khan, Debiao He
:
A blockchain-based conditional privacy-preserving authentication scheme for edge computing services. J. Inf. Secur. Appl. 70: 103334 (2022) - [j297]Muhammad Adil
, Muhammad Khurram Khan
, Mona Jamjoom
, Ahmed Farouk
:
MHADBOR: AI-Enabled Administrative-Distance-Based Opportunistic Load Balancing Scheme for an Agriculture Internet of Things Network. IEEE Micro 42(1): 41-50 (2022) - [j296]Sumit Kumar, Jitesh Pradhan
, Arup Kumar Pal, SK Hafizul Islam
, Muhammad Khurram Khan:
Radiological image retrieval technique using multi-resolution texture and shape features. Multim. Tools Appl. 81(10): 13633-13660 (2022) - [j295]Mukul Majhi, Arup Kumar Pal, Jitesh Pradhan
, SK Hafizul Islam
, Muhammad Khurram Khan:
Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications. Multim. Tools Appl. 81(29): 41545-41577 (2022) - [j294]Muhammad Khurram Khan:
Technology and telecommunications: a panacea in the COVID-19 crisis. Telecommun. Syst. 79(1): 1-2 (2022) - [j293]Imran Razzak
, Guandong Xu
, Muhammad Khurram Khan:
Guest Editorial: Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures. IEEE Trans. Ind. Informatics 18(5): 3449-3451 (2022) - [j292]Aman Ahmad Ansari
, Bharavi Mishra
, Poonam Gera
, Muhammad Khurram Khan
, Chinmay Chakraborty
, Dheerendra Mishra:
Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry. IEEE Trans. Ind. Informatics 18(11): 8316-8325 (2022) - [j291]Xiong Li
, Shanpeng Liu
, Rongxing Lu
, Muhammad Khurram Khan
, Ke Gu
, Xiaosong Zhang
:
An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System. IEEE J. Biomed. Health Informatics 26(5): 2020-2031 (2022) - [j290]Yu Wang
, Wenfang Zhang, Xiaomin Wang, Wei Guo, Muhammad Khurram Khan
, Pingzhi Fan:
Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View. IEEE Trans. Intell. Transp. Syst. 23(2): 1332-1346 (2022) - [j289]Abdelouahid Derhab
, Mohamed Belaoued
, Irfan Mohiuddin
, Fajri Kurniawan
, Muhammad Khurram Khan
:
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks. IEEE Trans. Intell. Transp. Syst. 23(3): 2366-2379 (2022) - [j288]Jiale Lei, Junqin Huang
, Linghe Kong
, Guihai Chen, Muhammad Khurram Khan
:
DeFLoc: Deep Learning Assisted Indoor Vehicle Localization Atop FM Fingerprint Map. IEEE Trans. Intell. Transp. Syst. 23(10): 19795-19806 (2022) - [j287]Sriramulu Bojjagani
, Y. C. A. Padmanabha Reddy
, Thati Anuradha, P. V. Venkateswara Rao, B. Ramachandra Reddy, Muhammad Khurram Khan
:
Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems. IEEE Trans. Intell. Transp. Syst. 23(12): 24698-24713 (2022) - [j286]Bimal Kumar Meher
, Ruhul Amin
, Ashok Kumar Das
, Muhammad Khurram Khan
:
KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System. IEEE Trans. Netw. Sci. Eng. 9(5): 3411-3420 (2022) - [j285]Jun Huang, Debiao He
, Yitao Chen, Muhammad Khurram Khan
, Min Luo
:
A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy. IEEE Trans. Netw. Sci. Eng. 9(5): 3808-3820 (2022) - [j284]Iram Bibi
, Adnan Akhunzada
, Jahanzaib Malik
, Muhammad Khurram Khan, Muhammad Dawood:
Secure Distributed Mobile Volunteer Computing with Android. ACM Trans. Internet Techn. 22(1): 2:1-2:21 (2022) - [j283]Salman Shamshad
, Minahil Rana, Khalid Mahmood
, Muhammad Khurram Khan
, Mohammad S. Obaidat
:
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing. Wirel. Pers. Commun. 124(1): 283-292 (2022) - [c59]Qizhou Lin
, Lu Leng
, Muhammad Khurram Khan
:
Deep Ternary Hashing Code for Palmprint Retrieval and Recognition. ICAAI 2022: 88-93 - [e8]Joshua Zhexue Huang, Yi Pan, Barbara Hammer, Muhammad Khurram Khan, Xing Xie, Laizhong Cui, Yulin He:
9th IEEE International Conference on Data Science and Advanced Analytics, DSAA 2022, Shenzhen, China, October 13-16, 2022. IEEE 2022, ISBN 978-1-6654-7330-9 [contents] - [e7]Yuan Tian
, Tinghuai Ma
, Muhammad Khurram Khan
, Victor S. Sheng
, Zhaoqing Pan
:
Big Data and Security - Third International Conference, ICBDS 2021, Shenzhen, China, November 26-28, 2021, Proceedings. Communications in Computer and Information Science 1563, Springer 2022, ISBN 978-981-19-0851-4 [contents] - 2021
- [j282]Muhammad Usman Younus
, Muhammad Khurram Khan
, Muhammad Rizwan Anjum, Sharjeel Afridi
, Zulfiqar Ali Arain
, Abdul Aleem Jamali:
Optimizing the Lifetime of Software Defined Wireless Sensor Network via Reinforcement Learning. IEEE Access 9: 259-272 (2021) - [j281]Muhammad Nasir Mumtaz Bhutta
, Amir A. Khwaja, Adnan Nadeem
, Hafiz Farooq Ahmad, Muhammad Khurram Khan
, Moataz Hanif, Houbing Song
, Mohsen A. Rashwan, Yue Cao
:
A Survey on Blockchain Technology: Evolution, Architecture and Security. IEEE Access 9: 61048-61073 (2021) - [j280]Tengfei Wu
, Lu Leng
, Muhammad Khurram Khan
, Farrukh Aslam Khan
:
Palmprint-Palmvein Fusion Recognition Based on Deep Hashing Network. IEEE Access 9: 135816-135827 (2021) - [j279]Chinmay Chakraborty, Muhammad Khurram Khan, Ishfaq Ahmad:
Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021. Big Data 9(3): 151-152 (2021) - [j278]Chinmay Chakraborty, Muhammad Khurram Khan, Ishfaq Ahmad:
Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021. Big Data 9(4): 324-325 (2021) - [j277]Chinmay Chakraborty
, Muhammad Khurram Khan, Ishfaq Ahmad:
Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021. Big Data 9(5): 402-403 (2021) - [j276]Muhammad Khurram Khan
, Amanullah Quadri:
Augmenting Cybersecurity in Autonomous Vehicles: Innovative Recommendations for Aspiring Entrepreneurs. IEEE Consumer Electron. Mag. 10(3): 111-116 (2021) - [j275]Soumya Banerjee
, Basudeb Bera
, Ashok Kumar Das
, Samiran Chattopadhyay
, Muhammad Khurram Khan, Joel J. P. C. Rodrigues
:
Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT. Comput. Commun. 169: 99-113 (2021) - [j274]Craig Beaman
, Ashley Barkworth, Toluwalope David Akande, Saqib Hakak
, Muhammad Khurram Khan:
Ransomware: Recent advances, analysis, challenges and future research directions. Comput. Secur. 111: 102490 (2021) - [j273]Mukul Majhi, Arup Kumar Pal, SK Hafizul Islam
, Muhammad Khurram Khan:
Secure content-based image retrieval using modified Euclidean distance for encrypted features. Trans. Emerg. Telecommun. Technol. 32(2) (2021) - [j272]Diksha Rangwani
, Dipanwita Sadhukhan, Sangram Ray
, Muhammad Khurram Khan, Mou Dasgupta
:
An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - [j271]Izwa Altaf, Muhammad Arslan Akram, Khalid Mahmood
, Saru Kumari
, Hu Xiong, Muhammad Khurram Khan:
A novel authentication and key-agreement scheme for satellite communication network. Trans. Emerg. Telecommun. Technol. 32(7) (2021) - [j270]Zhiyan Xu
, Min Luo
, Muhammad Khurram Khan
, Kim-Kwang Raymond Choo
, Debiao He
:
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios. IEEE Commun. Lett. 25(4): 1074-1078 (2021) - [j269]Vinod Kumar
, Musheer Ahmad, Adesh Kumari, Saru Kumari
, Muhammad Khurram Khan:
SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing. Int. J. Commun. Syst. 34(2) (2021) - [j268]Sivanarayani M. Karunarathne, Neetesh Saxena
, Muhammad Khurram Khan
:
Security and Privacy in IoT Smart Healthcare. IEEE Internet Comput. 25(4): 37-48 (2021) - [j267]Wazir Zada Khan
, Quratul-Ain Arshad
, Saqib Hakak
, Muhammad Khurram Khan
, Saeed Ur Rehman
:
Trust Management in Social Internet of Things: Architectures, Recent Advancements, and Future Challenges. IEEE Internet Things J. 8(10): 7768-7788 (2021) - [j266]Muhammad Asad Saleem, Zahid Ghaffar
, Khalid Mahmood
, Ashok Kumar Das
, Joel J. P. C. Rodrigues
, Muhammad Khurram Khan
:
Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function. IEEE Internet Things J. 8(22): 16613-16622 (2021) - [j265]Muhammad Khalid, Kezhi Wang
, Nauman Aslam, Yue Cao
, Naveed Ahmad, Muhammad Khurram Khan:
From smart parking towards autonomous valet parking: A survey, challenges and future Works. J. Netw. Comput. Appl. 175: 102935 (2021) - [j264]Pranav Nerurkar
, Dhiren R. Patel, Yann Busnel
, Romaric Ludinard
, Saru Kumari
, Muhammad Khurram Khan:
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009-2020). J. Netw. Comput. Appl. 177: 102940 (2021) - [j263]Muhammad Khurram Khan, Muhammad Shiraz, Qaisar Shaheen
, Shariq Aziz Butt
, Rizwan Akhtar, Muazzam Ali Khan Khattak, Wang Changda
:
Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis. J. Sensors 2021: 7459368:1-7459368:18 (2021) - [j262]Anum Aftab
, Farrukh Aslam Khan
, Muhammad Khurram Khan, Haider Abbas
, Waseem Iqbal
, Farhan Riaz
:
Hand-based multibiometric systems: state-of-the-art and future challenges. PeerJ Comput. Sci. 7: e707 (2021) - [j261]Diksha Rangwani
, Dipanwita Sadhukhan, Sangram Ray
, Muhammad Khurram Khan, Mou Dasgupta:
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things. Peer-to-Peer Netw. Appl. 14(3): 1548-1571 (2021) - [j260]Chien-Ming Chen
, Zhuoyu Tie, Eric Ke Wang, Muhammad Khurram Khan, Sachin Kumar
, Saru Kumari
:
Verifiable dynamic ranked search with forward privacy over encrypted cloud data. Peer-to-Peer Netw. Appl. 14(5): 2977-2991 (2021) - [j259]Qian Mei
, Hu Xiong
, Jinhao Chen
, Minghao Yang, Saru Kumari
, Muhammad Khurram Khan
:
Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV. IEEE Syst. J. 15(1): 245-256 (2021) - [j258]Salman Shamshad
, Khalid Mahmood
, Saru Kumari
, Muhammad Khurram Khan:
Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC". IEEE Syst. J. 15(1): 877-880 (2021) - [j257]Khalid Mahmood
, Salman Shamshad
, Saru Kumari
, Muhammad Khurram Khan
, Mohammad S. Obaidat
:
Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication". IEEE Syst. J. 15(1): 1366-1368 (2021) - [j256]Sajid Hussain
, Shehzad Ashraf Chaudhry
, Osama Ahmad Alomari, Mohammed H. Alsharif
, Muhammad Khurram Khan
, Neeraj Kumar
:
Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones. IEEE Syst. J. 15(3): 4431-4438 (2021) - [j255]Muhammad Khurram Khan:
Importance of telecommunications in the times of COVID-19. Telecommun. Syst. 76(1): 1-2 (2021) - [j254]Jangirala Srinivas, Ashok Kumar Das
, Xiong Li
, Muhammad Khurram Khan
, Minho Jo
:
Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems. IEEE Trans. Ind. Informatics 17(7): 4425-4436 (2021) - [j253]Dipanwita Sadhukhan, Sangram Ray
, G. P. Biswas, Muhammad Khurram Khan, Mou Dasgupta
:
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J. Supercomput. 77(2): 1114-1151 (2021) - [j252]Cong Peng
, Debiao He
, Jianhua Chen, Neeraj Kumar
, Muhammad Khurram Khan:
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System. ACM Trans. Internet Techn. 21(3): 61:1-61:24 (2021) - [j251]Jing Wang, Libing Wu, Sherali Zeadally, Muhammad Khurram Khan, Debiao He:
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid. ACM Trans. Sens. Networks 17(3): 25:1-25:25 (2021) - [j250]Yu Wang
, Wenfang Zhang
, Xiaomin Wang
, Muhammad Khurram Khan
, Pingzhi Fan
:
Efficient Privacy-Preserving Authentication Scheme With Fine-Grained Error Location for Cloud-Based VANET. IEEE Trans. Veh. Technol. 70(10): 10436-10449 (2021) - [j249]Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Muhammad Khurram Khan, Mou Dasgupta
:
ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things. Wirel. Pers. Commun. 116(3): 1867-1896 (2021) - [j248]Homero Toral-Cruz, Debiao He, Albena Dimitrova Mihovska, Kim-Kwang Raymond Choo
, Muhammad Khurram Khan:
Reliable and Secure e-Health Networks. Wirel. Pers. Commun. 117(1): 1-6 (2021) - [j247]Vivek Kumar, Sangram Ray, Mou Dasgupta
, Muhammad Khurram Khan:
A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography. Wirel. Pers. Commun. 118(4): 3045-3061 (2021) - [c58]Wazir Zada Khan
, Muhammad Khurram Khan, Qurat-ul-Ain Arshad, Hafiz Malik
, Jalal Al-Muhtadi:
Digital Labels: Influencing Consumers Trust and Raising Cybersecurity Awareness for Adopting Autonomous Vehicles. ICCE 2021: 1-4 - [c57]Yuanhe Shu, Jingwei Wang, Linghe Kong, Jiadi Yu, Guisong Yang, Yueping Cai, Zhen Wang, Muhammad Khurram Khan:
WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology Communication between BLE and WiFi. ICPADS 2021: 356-363 - [e6]Yuan Tian
, Tinghuai Ma
, Muhammad Khurram Khan
:
Big Data and Security - Second International Conference, ICBDS 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers. Communications in Computer and Information Science 1415, Springer 2021, ISBN 978-981-16-3149-8 [contents] - [i3]Christos Xenofontos, Ioannis Zografopoulos
, Charalambos Konstantinou
, Alireza Jolfaei, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. CoRR abs/2105.06612 (2021) - 2020
- [j246]Marcus Lim, Azween B. Abdullah
, N. Z. Jhanjhi
, Muhammad Khurram Khan
:
Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks. IEEE Access 8: 16550-16559 (2020) - [j245]Mohammed Binjubeir
, Abdulghani Ali Ahmed
, Mohd Arfian Ismail
, Ali Safaa Sadiq
, Muhammad Khurram Khan
:
Comprehensive Survey on Big Data Privacy Protection. IEEE Access 8: 20067-20079 (2020) - [j244]Wadha Abdullah Al-Khater
, Somaya Al-Máadeed
, Abdulghani Ali Ahmed
, Ali Safaa Sadiq
, Muhammad Khurram Khan
:
Comprehensive Review of Cybercrime Detection Techniques. IEEE Access 8: 137293-137311 (2020) - [j243]Muhammad Khurram Khan
, Junaid Shuja, Yaser Jararweh, Guanding Yu, Mohsen Guizani, Christos V. Verikoukis, Raja Wasim Ahmad:
IEEE Access Special Section Editorial: Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Compute and Network Resources. IEEE Access 8: 163769-163774 (2020) - [j242]Seyed Ahmad Soleymani
, Mohammad Hossein Anisi
, Abdul Hanan Abdullah, Md. Asri Ngadi, Shidrokh Goudarzi
, Muhammad Khurram Khan, Mohd Nazri Kama:
An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Sci. China Inf. Sci. 63(12) (2020) - [j241]