
Muhammad Khurram Khan
Person information
- affiliation: King Saud University, Center of Excellence in Information Assurance, Riyadh, Saudi Arabia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j246]Muhammad Usman Younus
, Muhammad Khurram Khan
, Muhammad Rizwan Anjum, Sharjeel Afridi
, Zulfiqar Ali Arain
, Abdul Aleem Jamali:
Optimizing the Lifetime of Software Defined Wireless Sensor Network via Reinforcement Learning. IEEE Access 9: 259-272 (2021) - [j245]Vinod Kumar
, Musheer Ahmad, Adesh Kumari, Saru Kumari
, Muhammad Khurram Khan:
SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing. Int. J. Commun. Syst. 34(2) (2021) - 2020
- [j244]Marcus Lim, Azween B. Abdullah
, N. Z. Jhanjhi
, Muhammad Khurram Khan
:
Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks. IEEE Access 8: 16550-16559 (2020) - [j243]Mohammed Binjubeir
, Abdulghani Ali Ahmed
, Mohd Arfian Ismail
, Ali Safaa Sadiq
, Muhammad Khurram Khan
:
Comprehensive Survey on Big Data Privacy Protection. IEEE Access 8: 20067-20079 (2020) - [j242]Wadha Abdullah Al-Khater
, Somaya Al-Máadeed
, Abdulghani Ali Ahmed
, Ali Safaa Sadiq
, Muhammad Khurram Khan
:
Comprehensive Review of Cybercrime Detection Techniques. IEEE Access 8: 137293-137311 (2020) - [j241]Muhammad Khurram Khan, Junaid Shuja, Yaser Jararweh, Guanding Yu, Mohsen Guizani, Christos V. Verikoukis, Raja Wasim Ahmad:
IEEE Access Special Section Editorial: Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Compute and Network Resources. IEEE Access 8: 163769-163774 (2020) - [j240]Eric Ke Wang, Chien-Ming Chen
, Fan Wang, Muhammad Khurram Khan, Saru Kumari:
Joint-learning segmentation in Internet of drones (IoD)-based monitor systems. Comput. Commun. 152: 54-62 (2020) - [j239]Eric Ke Wang
, RuiPei Sun, Chien-Ming Chen, Zuodong Liang, Saru Kumari
, Muhammad Khurram Khan
:
Proof of X-repute blockchain consensus protocol for IoT systems. Comput. Secur. 95: 101871 (2020) - [j238]Shuyun Shi, Debiao He
, Li Li, Neeraj Kumar
, Muhammad Khurram Khan
, Kim-Kwang Raymond Choo
:
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. Comput. Secur. 97: 101966 (2020) - [j237]Yanan Zhao, Yingzhe Hou, Lili Wang, Saru Kumari
, Muhammad Khurram Khan, Hu Xiong:
An efficient certificateless aggregate signature scheme for the Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 31(5) (2020) - [j236]Eric Ke Wang, Zuodong Liang, Chien-Ming Chen
, Saru Kumari, Muhammad Khurram Khan:
PoRX: A reputation incentive scheme for blockchain consensus of IIoT. Future Gener. Comput. Syst. 102: 140-151 (2020) - [j235]Waleed Shahjehan, Asad Riaz, Imran Khan, Ali Safaa Sadiq
, Suleman Khan, Muhammad Khurram Khan:
Bat algorithm-based beamforming for mmWave massive MIMO systems. Int. J. Commun. Syst. 33(2) (2020) - [j234]Yang Liu, Debiao He, Mohammad S. Obaidat, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Blockchain-based identity management systems: A review. J. Netw. Comput. Appl. 166: 102731 (2020) - [j233]Abdul Waheed, Munam Ali Shah, Abid Khan, Saif ul Islam, Suleman Khan, Carsten Maple, Muhammad Khurram Khan:
Volunteer Computing in Connected Vehicles: Opportunities and Challenges. IEEE Netw. 34(5): 212-218 (2020) - [j232]Xiong Li
, Jieyao Peng
, Mohammad S. Obaidat
, Fan Wu
, Muhammad Khurram Khan
, Chaoyang Chen:
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems. IEEE Syst. J. 14(1): 39-50 (2020) - [j231]Muhammad Khurram Khan:
Technological advancements and 2020. Telecommun. Syst. 73(1): 1-2 (2020) - [j230]Zhe Liu
, Kim-Kwang Raymond Choo
, Weiqiang Liu
, Muhammad Khurram Khan
:
Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance. IEEE Trans. Emerg. Top. Comput. 8(2): 264-266 (2020) - [j229]Chao Lin
, Debiao He
, Xinyi Huang
, Muhammad Khurram Khan
, Kim-Kwang Raymond Choo
:
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain. IEEE Trans. Inf. Forensics Secur. 15: 2440-2452 (2020) - [j228]Vinod Kumar
, Musheer Ahmad, Dheerendra Mishra
, Saru Kumari
, Muhammad Khurram Khan:
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Veh. Commun. 22: 100213 (2020) - [i2]Halgurd S. Maghdid, Aras T. Asaad, Kayhan Zrar Ghafoor, Ali Safaa Sadiq, Muhammad Khurram Khan:
Diagnosing COVID-19 Pneumonia from X-Ray and CT Images using Deep Learning and Transfer Learning Algorithms. CoRR abs/2004.00038 (2020)
2010 – 2019
- 2019
- [j227]Ikram Ud Din, Mohsen Guizani
, Suhaidi Hassan, Byung-Seo Kim
, Muhammad Khurram Khan, Mohammed Atiquzzaman, Syed Hassan Ahmed
:
The Internet of Things: A Review of Enabled Technologies and Future Challenges. IEEE Access 7: 7606-7640 (2019) - [j226]Anwar Ghani
, Syed Husnain A. Naqvi, Muhammad U. Ilyas
, Muhammad Khurram Khan, Ali Hassan:
Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks Using Collaborative Communication. IEEE Access 7: 26558-26570 (2019) - [j225]Ikram Ud Din, Mohsen Guizani
, Byung-Seo Kim
, Suhaidi Hassan, Muhammad Khurram Khan:
Trust Management Techniques for the Internet of Things: A Survey. IEEE Access 7: 29763-29787 (2019) - [j224]Saru Kumari, Pradeep Chaudhary, Chien-Ming Chen
, Muhammad Khurram Khan:
Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications. IEEE Access 7: 39717-39720 (2019) - [j223]Mengli Zhang
, Gang Zhou, Muhammad Khurram Khan
, Saru Kumari, Xuexian Hu, Wenfen Liu:
SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm. IEEE Access 7: 155107-155119 (2019) - [j222]Marcus Lim
, Azween B. Abdullah
, N. Z. Jhanjhi
, Muhammad Khurram Khan
, Mahadevan Supramaniam
:
Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique. IEEE Access 7: 184797-184807 (2019) - [j221]Wazir Zada Khan
, Mohammed Y. Aalsalem, Muhammad Khurram Khan
, Quratul-Ain Arshad
:
Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things. IEEE Consumer Electron. Mag. 8(2): 35-38 (2019) - [j220]Akande Sheriff Abiodun, Mohammad Hossein Anisi
, Muhammad Khurram Khan
:
Cloud-Based Wireless Body Area Networks: Managing Data for Better Health Care. IEEE Consumer Electron. Mag. 8(3): 55-59 (2019) - [j219]Hasan Ali Khattak
, Zoobia Ameer
, Ikram Ud Din, Muhammad Khurram Khan:
Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities. Comput. Sci. Inf. Syst. 16(1): 1-17 (2019) - [j218]Shaik Shabana Anjum
, Rafidah Md Noor
, Mohammad Hossein Anisi
, Ismail Bin Ahmedy
, Fazidah Othman
, Muhammad Alam
, Muhammad Khurram Khan
:
Energy Management in RFID-Sensor Networks: Taxonomy and Challenges. IEEE Internet Things J. 6(1): 250-266 (2019) - [j217]Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, Neeraj Kumar
:
A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126: 45-58 (2019) - [j216]Muhammad Usman Younus, Saif ul Islam, Ihsan Ali
, Suleman Khan, Muhammad Khurram Khan:
A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases. J. Netw. Comput. Appl. 137: 62-77 (2019) - [j215]Abdelmuttlib Ibrahim Abdallaahmed, Siti Hafizah Ab Hamid, Abdullah Gani, Suleman Khan, Muhammad Khurram Khan:
Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges. J. Netw. Comput. Appl. 145 (2019) - [j214]Tanveer Khan, Masoom Alam, Adnan Akhunzada
, Ali Hur, Muhammad Asif, Muhammad Khurram Khan:
Towards augmented proactive cyberthreat intelligence. J. Parallel Distributed Comput. 124: 47-59 (2019) - [j213]Maryam Asadzadeh Kaljahi, Shivakumara Palaiahnakote, Mohammad Hossein Anisi
, Mohd Yamani Idna Bin Idris, Michael Blumenstein, Muhammad Khurram Khan:
A scene image classification technique for a ubiquitous visual surveillance system. Multim. Tools Appl. 78(5): 5791-5818 (2019) - [j212]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram
, Muhammad Khurram Khan:
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput. 23(24): 13127-13138 (2019) - [j211]Wazir Zada Khan
, Mohammed Y. Aalsalem, Muhammad Khurram Khan
:
Communal Acts of IoT Consumers: A Potential Threat to Security and Privacy. IEEE Trans. Consumer Electron. 65(1): 64-72 (2019) - [j210]Mudassar Ali Khan, Ikram Ud Din
, Sultan Ullah Jadoon
, Muhammad Khurram Khan
, Mohsen Guizani
, Kamran Ahmad Awan:
g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices. IEEE Trans. Consumer Electron. 65(2): 215-223 (2019) - [j209]Muhammad Khurram Khan:
A new journey in the new year. Telecommun. Syst. 70(1): 1 (2019) - [c56]Zhenzao Wen, Linghe Kong, Guihai Chen, Muhammad Khurram Khan, Shahid Mumtaz, Joel J. P. C. Rodrigues:
Understanding Multi-Path Routing Algorithms in Datacenter Networks. GLOBECOM 2019: 1-6 - [c55]Zucheng Wu, Linghe Kong, Guihai Chen, Muhammad Khurram Khan, Shahid Mumtaz, Joel J. P. C. Rodrigues:
CrowdSwitch: Crowdsensing Based Switch between Multiple Cellular Operators in Subways. GLOBECOM 2019: 1-6 - 2018
- [j208]Qiming Zheng
, Xiaomin Wang, Muhammad Khurram Khan, Wenfang Zhang, Brij B. Gupta, Wei Guo:
A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service. IEEE Access 6: 711-722 (2018) - [j207]Muhammad Zeeshan, Muhammad Majid
, Imran Fareed Nizami, Syed Muhammad Anwar
, Ikram Ud Din
, Muhammad Khurram Khan:
A Newly Developed Ground Truth Dataset for Visual Saliency in Videos. IEEE Access 6: 20855-20867 (2018) - [j206]Chao Lin, Debiao He
, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
:
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems. IEEE Access 6: 28203-28212 (2018) - [j205]Ghufran Ahmed
, Saif ul Islam, Maham Shahid, Adnan Akhunzada
, Sohail Jabbar
, Muhammad Khurram Khan, Muhammad Riaz, Kijun Han:
Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare. IEEE Access 6: 29602-29610 (2018) - [j204]Zeeshan Siddiqui, Omar Tayan
, Muhammad Khurram Khan:
Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols. IEEE Access 6: 34527-34542 (2018) - [j203]Hassan Jamil Syed
, Abdullah Gani, Fariza Hanum Nasaruddin
, Anjum Naveed
, Abdelmuttlib Ibrahim Abdallaahmed, Muhammad Khurram Khan:
CloudProcMon: A Non-Intrusive Cloud Monitoring Framework. IEEE Access 6: 44591-44606 (2018) - [j202]Mimi Ma, Debiao He, Muhammad Khurram Khan, Jianhua Chen:
Certificateless searchable public key encryption scheme for mobile healthcare system. Comput. Electr. Eng. 65: 413-424 (2018) - [j201]Sravani Challa, Ashok Kumar Das
, Vanga Odelu
, Neeraj Kumar
, Saru Kumari, Muhammad Khurram Khan, Athanasios V. Vasilakos:
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 69: 534-554 (2018) - [j200]Sravani Challa, Mohammad Wazid
, Ashok Kumar Das
, Muhammad Khurram Khan:
Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions. IEEE Consumer Electron. Mag. 7(1): 57-65 (2018) - [j199]Ikram Ud Din
, Suhaidi Hassan
, Muhammad Khurram Khan
, Mohsen Guizani
, Osman Ghazali, Adib Habbal:
Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions. IEEE Commun. Surv. Tutorials 20(2): 1443-1474 (2018) - [j198]Junaid Shuja
, Abdullah Gani, Kwangman Ko, Kyoungyoung So, Saad Mustafa, Sajjad Ahmad Madani, Muhammad Khurram Khan:
SIMDOM: A framework for SIMD instruction translation and offloading in heterogeneous mobile architectures. Trans. Emerg. Telecommun. Technol. 29(4) (2018) - [j197]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Neeraj Kumar
:
A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener. Comput. Syst. 80: 483-495 (2018) - [j196]Xiong Li
, Fan Wu, Muhammad Khurram Khan, Lili Xu, Jian Shen, Minho Jo
:
A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener. Comput. Syst. 84: 149-159 (2018) - [j195]SK Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan:
A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor. Int. J. Ad Hoc Ubiquitous Comput. 27(2): 138-155 (2018) - [j194]Syed Muhammad Anwar
, Muhammad Majid
, Adnan Qayyum, Muhammad Awais, Majdi R. Alnowami, Muhammad Khurram Khan:
Medical Image Analysis using Convolutional Neural Networks: A Review. J. Medical Syst. 42(11): 226 (2018) - [j193]Naina Emmanuel, Abid Khan
, Masoom Alam, Tanveer Khan, Muhammad Khurram Khan:
Structures and data preserving homomorphic signatures. J. Netw. Comput. Appl. 102: 58-70 (2018) - [j192]Ahsan Saleem, Abid Khan
, Furqan Shahid, Masoom Alam, Muhammad Khurram Khan:
Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits. J. Netw. Comput. Appl. 108: 1-19 (2018) - [j191]Mohammed Y. Aalsalem, Wazir Zada Khan
, Wajeb Gharibi, Muhammad Khurram Khan, Quratul-Ain Arshad
:
Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges. J. Netw. Comput. Appl. 113: 87-97 (2018) - [j190]Shidrokh Goudarzi, Wan Haslina Hassan, Mohammad Hossein Anisi
, Muhammad Khurram Khan, Seyed Ahmad Soleymani:
Intelligent Technique for Seamless Vertical Handover in Vehicular Networks. Mob. Networks Appl. 23(6): 1462-1477 (2018) - [j189]Mohammed Zakariah, Muhammad Khurram Khan, Hafiz Malik:
Digital multimedia audio forensics: past, present and future. Multim. Tools Appl. 77(1): 1009-1040 (2018) - [j188]Saru Kumari, Ashok Kumar Das, Xiong Li
, Fan Wu, Muhammad Khurram Khan, Qi Jiang, SK Hafizul Islam:
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multim. Tools Appl. 77(2): 2359-2389 (2018) - [j187]Shehzad Ashraf Chaudhry
, Husnain Naqvi, Muhammad Khurram Khan:
An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multim. Tools Appl. 77(5): 5503-5524 (2018) - [j186]Ruhul Amin, SK Hafizul Islam
, Pandi Vijayakumar
, Muhammad Khurram Khan, Victor Chang
:
A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication. Multim. Tools Appl. 77(9): 11041-11066 (2018) - [j185]Shichao Li, Ning Zhang, Siyu Lin, Linghe Kong, Ajay K. Katangur, Muhammad Khurram Khan, Minming Ni, Gang Zhu:
Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things. IEEE Netw. 32(1): 72-79 (2018) - [j184]Debiao He
, Neeraj Kumar
, Muhammad Khurram Khan
, Lina Wang, Jian Shen:
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services. IEEE Syst. J. 12(2): 1621-1631 (2018) - [j183]Ashok Kumar Das
, Mohammad Wazid
, Neeraj Kumar
, Muhammad Khurram Khan
, Kim-Kwang Raymond Choo
, YoungHo Park
:
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment. IEEE J. Biomed. Health Informatics 22(4): 1310-1322 (2018) - [j182]Imran Khan, Shehzad Ashraf Chaudhry
, Muhammad Sher, Muhammad Khurram Khan:
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data. J. Supercomput. 74(8): 3685-3703 (2018) - [j181]JiLiang Li
, Kim-Kwang Raymond Choo
, WeiGuo Zhang, Saru Kumari, Joel J. P. C. Rodrigues
, Muhammad Khurram Khan, Dieter Hogrefe:
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun. 13: 104-113 (2018) - [c54]Wazir Zada Khan
, Mohammed Y. Aalsalem, Muhammad Khurram Khan:
Five acts of consumer behavior: A potential security and privacy threat to Internet of Things. ICCE 2018: 1-3 - 2017
- [j180]Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
, Minho Jo
:
Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts. IEEE Access 5: 3273-3283 (2017) - [j179]Seyed Ahmad Soleymani, Abdul Hanan Abdullah
, Mahdi Zareei
, Mohammad Hossein Anisi
, César Vargas Rosales, Muhammad Khurram Khan, Shidrokh Goudarzi:
A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing. IEEE Access 5: 15619-15629 (2017) - [j178]Junaid Shuja
, Saad Mustafa, Raja Wasim Ahmad, Sajjad Ahmad Madani, Abdullah Gani, Muhammad Khurram Khan:
Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures. IEEE Access 5: 24542-24554 (2017) - [j177]Samman Zahra
, Masoom Alam, Qaisar Javaid, Abdul Wahid, Nadeem Javaid, Saif Ur Rehman Malik
, Muhammad Khurram Khan:
Fog Computing Over IoT: A Secure Deployment and Formal Verification. IEEE Access 5: 27132-27144 (2017) - [j176]Fan Wu, Lili Xu, Saru Kumari, Xiong Li
, Muhammad Khurram Khan, Ashok Kumar Das:
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. des Télécommunications 72(3-4): 131-144 (2017) - [j175]Mouzna Tahir, Abid Khan
, Abdul Hameed, Masoom Alam, Muhammad Khurram Khan, Farhana Jabeen
:
Towards a set aggregation-based data integrity scheme for smart grids. Ann. des Télécommunications 72(9-10): 551-561 (2017) - [j174]Wazir Zada Khan
, Mohammed Y. Aalsalem, Muhammad Khurram Khan, Quratul-Ain Arshad
:
When social objects collaborate: Concepts, processing elements, attacks and challenges. Comput. Electr. Eng. 58: 397-411 (2017) - [j173]Akande Sheriff Abiodun, Mohammad Hossein Anisi
, Ihsan Ali
, Adnan Akhunzada
, Muhammad Khurram Khan:
Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique. IEEE Consumer Electron. Mag. 6(4): 38-47 (2017) - [j172]Ahmed Abdelaziz
, Tan Fong Ang, Abdullah Gani, Suleman Khan, Faiz Alotaibi
, Muhammad Khurram Khan:
On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues. Comput. J. 60(10): 1510-1519 (2017) - [j171]Anam Nazir, Masoom Alam, Saif Ur Rehman Malik
, Adnan Akhunzada
, Muhammad Nadeem Cheema, Muhammad Khurram Khan, Yang Ziang, Tanveer Khan, Abid Khan
:
A high-level domain-specific language for SIEM (design, development and formal verification). Clust. Comput. 20(3): 2423-2437 (2017) - [j170]Linghe Kong, Muhammad Khurram Khan, Fan Wu, Guihai Chen, Peng Zeng:
Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges. IEEE Commun. Mag. 55(1): 62-68 (2017) - [j169]Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura:
Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1. IEEE Commun. Mag. 55(3): 60-61 (2017) - [j168]Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura:
Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2. IEEE Commun. Mag. 55(6): 118-119 (2017) - [j167]Adnan Akhunzada
, Muhammad Khurram Khan:
Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues. IEEE Commun. Mag. 55(7): 110-118 (2017) - [j166]Suleman Khan
, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mohsen Guizani, Muhammad Khurram Khan:
Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art. IEEE Commun. Surv. Tutorials 19(1): 303-324 (2017) - [j165]Saru Kumari, Ashok Kumar Das, Mohammad Wazid
, Xiong Li
, Fan Wu, Kim-Kwang Raymond Choo
, Muhammad Khurram Khan:
On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j164]Vanga Odelu
, Ashok Kumar Das, Y. Sreenivasa Rao, Saru Kumari, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
:
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces 54: 3-9 (2017) - [j163]Mehdi Sookhak
, F. Richard Yu
, Muhammad Khurram Khan, Yang Xiang, Rajkumar Buyya:
Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. Future Gener. Comput. Syst. 72: 273-287 (2017) - [j162]SK Hafizul Islam
, Mohammad Sabzinejad Farash
, G. P. Biswas, Muhammad Khurram Khan, Mohammad S. Obaidat
:
A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography. Int. J. Comput. Math. 94(1): 39-55 (2017) - [j161]Dheerendra Mishra
, Saru Kumari, Muhammad Khurram Khan, Sourav Mukhopadhyay:
An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems. Int. J. Commun. Syst. 30(1) (2017) - [j160]Mohammad Sabzinejad Farash
, Shehzad Ashraf Chaudhry
, Mohammad Heydari, Seyed Mohammad Sajad Sadough
, Saru Kumari, Muhammad Khurram Khan:
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. 30(4) (2017) - [j159]Min Luo, Yunru Zhang, Muhammad Khurram Khan, Debiao He
:
An efficient chaos-based 2-party key agreement protocol with provable security. Int. J. Commun. Syst. 30(14) (2017) - [j158]Min Luo, Yunru Zhang, Muhammad Khurram Khan, Debiao He
:
A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography. Int. J. Commun. Syst. 30(16) (2017) - [j157]Shidrokh Goudarzi, Wan Haslina Hassan, Mohammad Hossein Anisi
, Seyed Ahmad Soleymani, Mehdi Sookhak, Muhammad Khurram Khan, Aisha-Hassan A. Hashim
, Mahdi Zareei
:
ABC-PSO for vertical handover in heterogeneous wireless networks. Neurocomputing 256: 63-81 (2017) - [j156]Mohammad Wazid
, Ashok Kumar Das
, Muhammad Khurram Khan, Abdulatif Al-Dhawailie Al-Ghaiheb, Neeraj Kumar
, Athanasios V. Vasilakos:
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment. IEEE Internet Things J. 4(5): 1634-1646 (2017) - [j155]Prerna Mohit, Ruhul Amin, Arijit Karati
, G. P. Biswas, Muhammad Khurram Khan:
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System. J. Medical Syst. 41(4): 50:1-50:13 (2017) - [j154]Muhammad Habib Ur Rehman, Chee Sun Liew
, Teh Ying Wah, Muhammad Khurram Khan:
Towards next-generation heterogeneous mobile data stream mining applications: Opportunities, challenges, and future research directions. J. Netw. Comput. Appl. 79: 1-24 (2017) - [j153]Shahid Anwar
, Zakira Inayat, Mohamed Fadli Bin Zolkipli, Jasni Mohamad Zain
, Abdullah Gani, Nor Badrul Anuar
, Muhammad Khurram Khan, Victor Chang
:
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey. J. Netw. Comput. Appl. 93: 259-279 (2017) - [j152]Suleman Khan, Muhammad Shiraz, Laleh Boroumand, Abdullah Gani, Muhammad Khurram Khan:
Towards port-knocking authentication methods for mobile cloud computing. J. Netw. Comput. Appl. 97: 66-78 (2017) - [j151]Hassan Jamil Syed, Abdullah Gani, Raja Wasim Ahmad, Muhammad Khurram Khan, Abdelmuttlib Ibrahim Abdallaahmed:
Cloud monitoring: A review, taxonomy, and open research issues. J. Netw. Comput. Appl. 98: 11-26 (2017) - [j150]Sidra Aslam, Saif ul Islam, Abid Khan
, Mansoor Ahmed
, Adnan Akhunzada
, Muhammad Khurram Khan:
Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges. J. Netw. Comput. Appl. 100: 80-94 (2017) - [j149]Libing Wu, Jing Wang, Debiao He
, Muhammad Khurram Khan:
Cryptanalysis of an identity-based public auditing protocol for cloud storage. Frontiers Inf. Technol. Electron. Eng. 18(12): 1972-1977 (2017) - [j148]Abdullah Yousafzai
, Abdullah Gani, Rafidah Md Noor
, Mehdi Sookhak, Hamid Talebian, Muhammad Shiraz, Muhammad Khurram Khan:
Cloud resource allocation schemes: review, taxonomy, and opportunities. Knowl. Inf. Syst. 50(2): 347-381 (2017) - [j147]Masoom Alam, Saif Ur Rehman Malik
, Qaisar Javed, Abid Khan
, Shamaila Bisma Khan, Adeel Anjum, Nadeem Javed, Adnan Akhunzada
, Muhammad Khurram Khan:
Formal modeling and verification of security controls for multimedia systems in the cloud. Multim. Tools Appl. 76(21): 22845-22870 (2017) - [j146]Saru Kumari, Shehzad Ashraf Chaudhry
, Fan Wu, Xiong Li
, Mohammad Sabzinejad Farash
, Muhammad Khurram Khan:
An improved smart card based authentication scheme for session initiation protocol. Peer Peer Netw. Appl. 10(1): 92-105 (2017) - [j145]Xiong Li
, Arun Kumar Sangaiah
, Saru Kumari, Fan Wu, Jian Shen, Muhammad Khurram Khan:
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city. Pers. Ubiquitous Comput. 21(5): 791-805 (2017) - [j144]Ruhul Amin, SK Hafizul Islam
, Muhammad Khurram Khan, Arijit Karati
, Debasis Giri, Saru Kumari
:
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. Secur. Commun. Networks 2017: 5989151:1-5989151:15 (2017) - [j143]Ruhul Amin, R. Simon Sherratt
, Debasis Giri, SK Hafizul Islam
, Muhammad Khurram Khan:
A software agent enabled biometric security algorithm for secure file access in consumer storage devices. IEEE Trans. Consumer Electron. 63(1): 53-61 (2017) - [j142]Zhe Liu
, Xinyi Huang, Zhi Hu, Muhammad Khurram Khan, Hwajeong Seo, Lu Zhou:
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age. IEEE Trans. Dependable Secur. Comput. 14(3): 237-248 (2017) - [j141]Zhiyan Xu, Libing Wu, Debiao He, Muhammad Khurram Khan:
Security analysis of a publicly verifiable data possession scheme for remote storage. J. Supercomput. 73(11): 4923-4930 (2017) - [j140]Zhiyan Xu, Libing Wu, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
, Debiao He:
A secure and efficient public auditing scheme using RSA algorithm for cloud storage. J. Supercomput. 73(12): 5285-5309 (2017) - [j139]