default search action
Muhammad Khurram Khan
Person information
- affiliation: King Saud University, Center of Excellence in Information Assurance, Riyadh, Saudi Arabia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j386]Praneetha Surapaneni, Sriramulu Bojjagani, V. C. Bharathi, Mahesh Kumar Morampudi, Anup Kumar Maurya, Muhammad Khurram Khan:
A Systematic Review on Blockchain-Enabled Internet of Vehicles (BIoV): Challenges, Defenses, and Future Research Directions. IEEE Access 12: 123529-123560 (2024) - [j385]Xingxia Wang, Jing Yang, Yuhang Liu, Yutong Wang, Fei-Yue Wang, Mengzhen Kang, Yonglin Tian, Imre J. Rudas, Lingxi Li, Maria Pia Fanti, Bassam Alrifaee, Muhammet Deveci, Deepak Mishra, Muhammad Khurram Khan, Long Chen, Philippe de Reffye:
Parallel intelligence in three decades: a historical review and future perspective on ACP and cyber-physical-social systems. Artif. Intell. Rev. 57(9): 255 (2024) - [j384]Junpeng He, Lingfeng Yao, Xiong Li, Muhammad Khurram Khan, Weina Niu, Xiaosong Zhang, Fagen Li:
Model-agnostic generation-enhanced technology for few-shot intrusion detection. Appl. Intell. 54(4): 3181-3204 (2024) - [j383]Rashad Elhabob, Mazin Taha, Hu Xiong, Muhammad Khurram Khan, Saru Kumari, Pradeep Chaudhary:
Pairing-free certificateless public key encryption with equality test for Internet of Vehicles. Comput. Electr. Eng. 116: 109140 (2024) - [j382]Hareem Kibriya, Ayesha Siddiqa, Wazir Zada Khan, Muhammad Khurram Khan:
Towards safer online communities: Deep learning and explainable AI for hate speech detection and classification. Comput. Electr. Eng. 116: 109153 (2024) - [j381]Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan:
Comprehensive survey: Biometric user authentication application, evaluation, and discussion. Comput. Electr. Eng. 119: 109485 (2024) - [j380]Muhammad Adil, Muhammad Khurram Khan, Ahmed Farouk, Mian Ahmad Jan, Adnan Anwar, Zhanpeng Jin:
AI-Driven EEC for Healthcare IoT: Security Challenges and Future Research Directions. IEEE Consumer Electron. Mag. 13(1): 39-47 (2024) - [j379]Sibi Chakkaravarthy Sethuraman, Devi Priya V. S, Tarun Reddi, Mulka Sai Tharun Reddy, Muhammad Khurram Khan:
A comprehensive examination of email spoofing: Issues and prospects for email security. Comput. Secur. 137: 103600 (2024) - [j378]Yanlu Li, Yufeng Xiao, Wei Liang, Jiahong Cai, Ronglin Zhang, Kuan-Ching Li, Muhammad Khurram Khan:
The security and privacy challenges toward cybersecurity of 6G networks: A comprehensive review. Comput. Sci. Inf. Syst. 21(3): 851-897 (2024) - [j377]Nauman Khan, Zahid Khan, Anis Koubaa, Muhammad Khurram Khan, Rosli Bin Salleh:
Global insights and the impact of generative AI-ChatGPT on multidisciplinary: a systematic review and bibliometric analysis. Connect. Sci. 36(1) (2024) - [j376]Muhammad Adil, Houbing Song, Mian Ahmad Jan, Muhammad Khurram Khan, Xiangjian He, Ahmed Farouk, Zhanpeng Jin:
UAV-Assisted IoT Applications, QoS Requirements and Challenges with Future Research Directions. ACM Comput. Surv. 56(10): 251 (2024) - [j375]Sathish Kumar, Velliangiri Sarveshwaran, Periyasami Karthikeyan, Saru Kumari, Sachin Kumar, Muhammad Khurram Khan:
A survey on the blockchain techniques for the Internet of Vehicles security. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j374]Giuseppe Varone, Wadii Boulila, Maha Driss, Saru Kumari, Muhammad Khurram Khan, Thippa Reddy Gadekallu, Amir Hussain:
Finger pinching and imagination classification: A fusion of CNN architectures for IoMT-enabled BCI applications. Inf. Fusion 101: 102006 (2024) - [j373]Ayesha Siddiqa, Wazir Zada Khan, Monagi H. Alkinani, Eman Aldhahri, Muhammad Khurram Khan:
Edge-assisted federated learning framework for smart crowd management. Internet Things 27: 101253 (2024) - [j372]Chien-Ming Chen, Qingkai Miao, Saru Kumari, Muhammad Khurram Khan, Joel J. P. C. Rodrigues:
A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain. IEEE Internet Things J. 11(10): 17538-17551 (2024) - [j371]Muhammad Adil, Muhammad Khurram Khan, Neeraj Kumar, Muhammad Attique, Ahmed Farouk, Mohsen Guizani, Zhanpeng Jin:
Healthcare Internet of Things: Security Threats, Challenges, and Future Research Directions. IEEE Internet Things J. 11(11): 19046-19069 (2024) - [j370]Chien-Ming Chen, Zhaoting Chen, Saru Kumari, Mohammad S. Obaidat, Joel J. P. C. Rodrigues, Muhammad Khurram Khan:
Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment. IEEE Internet Things J. 11(14): 25394-25412 (2024) - [j369]Sana Nasim Karam, Kashif Bilal, Junaid Shuja, Latif U. Khan, Muhammad Bilal, Muhammad Khurram Khan:
Intelligent IoT- and UAV-Assisted Architecture for Pipeline Monitoring in OGI. IT Prof. 26(3): 46-54 (2024) - [j368]Mohamad-Hani Temsah, Abdullah N. Alhuzaimi, Mohammed Almansour, Fadi Aljamaan, Khalid Alhasan, Munirah A. Batarfi, Ibraheem Altamimi, Amani Alharbi, Adel Abdulaziz Alsuhaibani, Leena Alwakeel, Abdulrahman Abdulkhaliq Alzahrani, Khaled B. Alsulaim, Amr Jamal, Afnan Khayat, Mohammed Hussien Alghamdi, Rabih Halwani, Muhammad Khurram Khan, Ayman Al-Eyadhy, Rakan Nazer:
Art or Artifact: Evaluating the Accuracy, Appeal, and Educational Value of AI-Generated Imagery in DALL·E 3 for Illustrating Congenital Heart Diseases. J. Medical Syst. 48(1): 54 (2024) - [j367]Ruijin Wang, Jinshan Lai, Xiong Li, Donglin He, Muhammad Khurram Khan:
RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things. J. Netw. Comput. Appl. 221: 103768 (2024) - [j366]Muhammad Adil, Houbing Song, Muhammad Khurram Khan, Ahmed Farouk, Zhanpeng Jin:
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions. J. Netw. Comput. Appl. 223: 103828 (2024) - [j365]Dipanwita Sadhukhan, Sangram Ray, Mou Dasgupta, Muhammad Khurram Khan:
Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network. J. Netw. Comput. Appl. 224: 103831 (2024) - [j364]Ehzaz Mustafa, Junaid Shuja, Faisal Rehman, Ahsan Riaz, Mohammed Maray, Muhammad Bilal, Muhammad Khurram Khan:
Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues. J. Netw. Comput. Appl. 226: 103886 (2024) - [j363]Hongyan Liu, Xi Sun, Xiang Chen, Qun Huang, Dong Zhang, Haifeng Zhou, Chunming Wu, Xuan Liu, Muhammad Khurram Khan:
Terra: Low-latency and reliable event collection in network measurement. J. Netw. Comput. Appl. 228: 103904 (2024) - [j362]Diana Hawashin, Mohamed Nemer, Senay A. Gebreab, Khaled Salah, Raja Jayaraman, Muhammad Khurram Khan, Ernesto Damiani:
Blockchain applications in UAV industry: Review, opportunities, and challenges. J. Netw. Comput. Appl. 230: 103932 (2024) - [j361]Jitesh Pradhan, Ashish Singh, Abhinav Kumar, Muhammad Khurram Khan:
Skin lesion classification using modified deep and multi-directional invariant handcrafted features. J. Netw. Comput. Appl. 231: 103949 (2024) - [j360]Ruijin Wang, Jinbo Wang, Xiong Li, Jinshan Lai, Fengli Zhang, Xikai Pei, Muhammad Khurram Khan:
CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning. J. Netw. Comput. Appl. 231: 103997 (2024) - [j359]Jai Kumar, Akhil Gupta, Sudeep Tanwar, Muhammad Khurram Khan:
A review on 5G and beyond wireless communication channel models: Applications and challenges. Phys. Commun. 67: 102488 (2024) - [j358]Sanjeev Kumar Dwivedi, Mohammad Abdussami, Ruhul Amin, Muhammad Khurram Khan:
D³APTS: Design of ECC-Based Authentication Protocol and Data Storage for Tactile Internet Enabled IoD System With Blockchain. IEEE Trans. Consumer Electron. 70(1): 4239-4248 (2024) - [j357]Wajiha Shahid, Bahman Jamshidi, Saqib Hakak, Haruna Isah, Wazir Zada Khan, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities. IEEE Trans. Comput. Soc. Syst. 11(4): 4649-4662 (2024) - [j356]Zhengyan Zhou, Hanze Chen, Lingfei Chen, Dong Zhang, Chunming Wu, Xuan Liu, Muhammad Khurram Khan:
NetDP: In-Network Differential Privacy for Large-Scale Data Processing. IEEE Trans. Green Commun. Netw. 8(3): 1076-1089 (2024) - [j355]Dezhang Kong, Xiang Chen, Chunming Wu, Yi Shen, Zhengyan Zhou, Qiumei Cheng, Xuan Liu, Mingliang Yang, Yubing Qiu, Dong Zhang, Muhammad Khurram Khan:
rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN. IEEE Trans. Inf. Forensics Secur. 19: 9436-9451 (2024) - [j354]Jiachen Yang, Houbing Song, Muhammad Khurram Khan:
Guest Editorial XAI Based Biomedical Big Data Privacy and Security. IEEE J. Biomed. Health Informatics 28(6): 3203-3205 (2024) - [j353]Yu Wang, Wenfang Zhang, Xiaomin Wang, Muhammad Khurram Khan, Pingzhi Fan:
Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks. IEEE Trans. Intell. Transp. Syst. 25(1): 370-385 (2024) - [j352]Hong Qin, Debiao He, Qi Feng, Muhammad Khurram Khan, Min Luo, Kim-Kwang Raymond Choo:
Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey. IEEE Trans. Knowl. Data Eng. 36(5): 1919-1934 (2024) - [j351]Junqin Huang, Linghe Kong, Jingwei Wang, Guihai Chen, Jianhua Gao, Gang Huang, Muhammad Khurram Khan:
Secure Data Sharing over Vehicular Networks Based on Multi-sharding Blockchain. ACM Trans. Sens. Networks 20(2): 31:1-31:23 (2024) - [j350]Xiangwei Meng, Wei Liang, Zisang Xu, Kuanching Li, Muhammad Khurram Khan, Xiaoyan Kui:
An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems. ACM Trans. Sens. Networks 20(3): 75:1-75:23 (2024) - [j349]Praneetha Surapaneni, Sriramulu Bojjagani, Muhammad Khurram Khan:
VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment. Veh. Commun. 49: 100822 (2024) - [i6]Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan:
Navigating Cybersecurity Training: A Comprehensive Review. CoRR abs/2401.11326 (2024) - 2023
- [j348]Tengfei Wu, Lu Leng, Muhammad Khurram Khan:
A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selection. Artif. Intell. Rev. 56(7): 6169-6186 (2023) - [j347]Chinmay Chakraborty, Muhammad Khurram Khan:
Big Data-Driven Futuristic Fabric System in Societal Digital Transformation. Big Data 11(5): 321-322 (2023) - [j346]Wazir Zada Khan, Muhammad Khurram Khan, Qurat-ul-Ain Arshad:
Cybersecurity Digital Labels for Connected and Autonomous Vehicles. IEEE Consumer Electron. Mag. 12(1): 87-93 (2023) - [j345]Anay Ghosh, Saiyed Umer, Muhammad Khurram Khan, Ranjeet Kumar Rout, Bibhas Chandra Dhara:
Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework. Clust. Comput. 26(1): 119-135 (2023) - [j344]Uddalak Chatterjee, Sangram Ray, Sharmistha Adhikari, Muhammad Khurram Khan, Mou Dasgupta:
An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC. Comput. Commun. 209: 47-62 (2023) - [j343]Wenfang Zhang, Heng Jiao, Zhuoqun Yan, Xiaomin Wang, Muhammad Khurram Khan:
Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing. Comput. Secur. 125: 103019 (2023) - [j342]Devi Priya V. S, Sibi Chakkaravarthy Sethuraman, Muhammad Khurram Khan:
Container security: Precaution levels, mitigation strategies, and research perspectives. Comput. Secur. 135: 103490 (2023) - [j341]Suleman Khan, Muhammad Khurram Khan, Rizwan Khan:
Harnessing intelligent technologies to curb COVID-19 pandemic: taxonomy and open challenges. Computing 105(4): 811-830 (2023) - [j340]Somayeh Samsamian, Aliakbar Hasani, Saqib Hakak, Fatemeh Esmaeilnezhad Tanha, Muhammad Khurram Khan:
Comprehensive risk assessment and analysis of blockchain technology implementation using fuzzy cognitive mapping. Comput. Sci. Inf. Syst. 20(3): 977-996 (2023) - [j339]Xiang Chen, Chunming Wu, Xuan Liu, Qun Huang, Dong Zhang, Haifeng Zhou, Qiang Yang, Muhammad Khurram Khan:
Empowering Network Security With Programmable Switches: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(3): 1653-1704 (2023) - [j338]Linghe Kong, Jinlin Tan, Junqin Huang, Guihai Chen, Shuaitian Wang, Xi Jin, Peng Zeng, Muhammad Khurram Khan, Sajal K. Das:
Edge-computing-driven Internet of Things: A Survey. ACM Comput. Surv. 55(8): 174:1-174:41 (2023) - [j337]Li Chen, Ke Zhang, Saru Kumari, Muhammad Khurram Khan, Zhiying Kong, Pradeep Chaudhary:
An efficient certificateless key exchange protocol for heterogeneous networks in human-centered IoT systems. Int. J. Commun. Syst. 36(12) (2023) - [j336]Jiachen Yang, Houbing Song, Muhammad Khurram Khan:
Editor's Note. Int. J. Interact. Multim. Artif. Intell. 8(1): 4 (2023) - [j335]Xin Chen, Debiao He, Muhammad Khurram Khan, Min Luo, Cong Peng:
A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things. IEEE Internet Things J. 10(10): 9136-9147 (2023) - [j334]Jiahong Cai, Wei Liang, Xiong Li, Kuan-Ching Li, Zhenwen Gui, Muhammad Khurram Khan:
GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network. IEEE Internet Things J. 10(24): 21502-21514 (2023) - [j333]Gaurang Bansal, Vinay Chamola, Amir Hussain, Muhammad Khurram Khan:
Cracking the Anonymous IoT Routing Networks: A Deep Learning Approach. IEEE Internet Things Mag. 6(1): 120-126 (2023) - [j332]Sriramulu Bojjagani, V. N. Sastry, Chien-Ming Chen, Saru Kumari, Muhammad Khurram Khan:
Systematic survey of mobile payments, protocols, and security infrastructure. J. Ambient Intell. Humaniz. Comput. 14(1): 609-654 (2023) - [j331]Chinmay Chakraborty, Mohammad Reza Khosravi, Muhammad Khurram Khan, Houbing Herbert Song:
Editorial: Multimodality, Multidimensional Representation, and Multimedia Quality Assessment Toward Information Quality in Social Web of Things. ACM J. Data Inf. Qual. 15(3): 30:1-30:3 (2023) - [j330]Nauman Khan, Rosli Bin Salleh, Anis Koubaa, Zahid Khan, Muhammad Khurram Khan, Ihsan Ali:
Data plane failure and its recovery techniques in SDN: A systematic literature review. J. King Saud Univ. Comput. Inf. Sci. 35(3): 176-201 (2023) - [j329]Rajdeep Chatterjee, Ankita Chatterjee, SK Hafizul Islam, Muhammad Khurram Khan:
An object detection-based few-shot learning approach for multimedia quality assessment. Multim. Syst. 29(5): 2899-2912 (2023) - [j328]Ashish Singh, Adnan Gutub, Anand Nayyar, Muhammad Khurram Khan:
Redefining food safety traceability system through blockchain: findings, challenges and open issues. Multim. Tools Appl. 82(14): 21243-21277 (2023) - [j327]Uddalak Chatterjee, Sangram Ray, Sharmistha Adhikari, Muhammad Khurram Khan, Mou Dasgupta:
Efficient and secure e-voting scheme using elliptic curve cryptography. Secur. Priv. 6(3) (2023) - [j326]Yinyan Gong, Kuan-Ching Li, Lijun Xiao, Jiahong Cai, Jiahong Xiao, Wei Liang, Muhammad Khurram Khan:
VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV. Sensors 23(11): 5198 (2023) - [j325]Qurat-ul-Ain Arshad, Wazir Zada Khan, Faisal Azam, Muhammad Khurram Khan:
Deep-Learning-Based COVID-19 Detection: Challenges and Future Directions. IEEE Trans. Artif. Intell. 4(2): 210-228 (2023) - [j324]Alamgir Sardar, Saiyed Umer, Ranjeet Kumar Rout, Muhammad Khurram Khan:
A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System. IEEE Trans. Artif. Intell. 4(5): 1051-1063 (2023) - [j323]Muhammad Khurram Khan:
AI-enabled transformations in telecommunications industry. Telecommun. Syst. 82(1): 1-2 (2023) - [j322]Xiang Chen, Hongyan Liu, Qun Huang, Dong Zhang, Haifeng Zhou, Chunming Wu, Xuan Liu, Muhammad Khurram Khan:
Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches. IEEE Trans. Inf. Forensics Secur. 18: 5832-5847 (2023) - [j321]Ashish Singh, Abhinav Kumar, Zahid Akhtar, Muhammad Khurram Khan:
Guest Editorial: Cybersecurity Intelligence in the Healthcare System. IEEE Trans. Ind. Informatics 19(1): 809-812 (2023) - [j320]Zijian Bao, Debiao He, Muhammad Khurram Khan, Min Luo, Qi Xie:
PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(2): 1524-1534 (2023) - [j319]Minghao Cheng, Di Li, Nan Zhou, Hao Tang, Ge Wang, Shipeng Li, Uzair Aslam Bhatti, Muhammad Khurram Khan:
Vision-Motion Codesign for Low-Level Trajectory Generation in Visual Servoing Systems. IEEE Trans. Instrum. Meas. 72: 1-14 (2023) - [j318]Yongshuai Duan, Junqin Huang, Jiale Lei, Linghe Kong, Yibin Lv, Zhiliang Lin, Guihai Chen, Muhammad Khurram Khan:
AISChain: Blockchain-Based AIS Data Platform With Dynamic Bloom Filter Tree. IEEE Trans. Intell. Transp. Syst. 24(2): 2332-2343 (2023) - [j317]Khalid Mahmood, Salman Shamshad, Muhammad Faizan Ayub, Zahid Ghaffar, Muhammad Khurram Khan, Ashok Kumar Das:
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System. IEEE Trans. Intell. Transp. Syst. 24(12): 14536-14545 (2023) - [j316]Yulin Liu, Debiao He, Zijian Bao, Huaqun Wang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks. IEEE Trans. Intell. Veh. 8(4): 2998-3011 (2023) - [j315]Zahid Ghaffar, Salman Shamshad, Khalid Mahmood, Mohammad S. Obaidat, Saru Kumari, Muhammad Khurram Khan:
A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment. IEEE Trans. Netw. Sci. Eng. 10(1): 103-112 (2023) - [j314]Muhammad Adil, Muhammad Khurram Khan, Muhammad Mohsin Jadoon, Muhammad Attique, Houbing Song, Ahmed Farouk:
An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2719-2730 (2023) - [j313]Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala, Muhammad Khurram Khan:
B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs. IEEE Trans. Netw. Sci. Eng. 10(6): 3491-3504 (2023) - [j312]Xiaotong Zhou, Debiao He, Muhammad Khurram Khan, Wei Wu, Kim-Kwang Raymond Choo:
An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 72(1): 81-92 (2023) - [e9]Yuan Tian, Tinghuai Ma, Qingshan Jiang, Qi Liu, Muhammad Khurram Khan:
Big Data and Security - 4th International Conference, ICBDS 2022, Xiamen, China, December 8-12, 2022, Proceedings. Communications in Computer and Information Science 1796, Springer 2023, ISBN 978-981-99-3299-3 [contents] - [i5]Muhammad Adil, Houbing Song, Muhammad Khurram Khan, Ahmed Farouk, Zhanpeng Jin:
5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directions. CoRR abs/2305.16473 (2023) - [i4]Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan:
Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion. CoRR abs/2311.13416 (2023) - 2022
- [j311]Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J. P. C. Rodrigues:
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things. IEEE Access 10: 57990-58004 (2022) - [j310]Shidrokh Goudarzi, Seyed Ahmad Soleymani, Mohammad Hossein Anisi, Mohammad Abdollahi Azgomi, Zeinab Movahedi, Nazri Kama, Hazlifah Mohd Rusli, Muhammad Khurram Khan:
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET. Ad Hoc Networks 128: 102782 (2022) - [j309]Chinmay Chakraborty, Muhammad Khurram Khan, Ishfaq Ahmad:
Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: March 31, 2022. Big Data 10(1): 81-82 (2022) - [j308]Uddalak Chatterjee, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta, Chien-Ming Chen:
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. Computing 104(6): 1359-1395 (2022) - [j307]Sajid Hussain, Khalid Mahmood, Muhammad Khurram Khan, Chien-Ming Chen, Bander A. Alzahrani, Shehzad Ashraf Chaudhry:
Designing secure and lightweight user access to drone for smart city surveillance. Comput. Stand. Interfaces 80: 103566 (2022) - [j306]Basudeb Bera, Anusha Vangala, Ashok Kumar Das, Pascal Lorenz, Muhammad Khurram Khan:
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Comput. Stand. Interfaces 80: 103567 (2022) - [j305]Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Muhammad Khurram Khan, Mou Dasgupta:
ESOTP: ECC-based secure object tracking protocol for IoT communication. Int. J. Commun. Syst. 35(3) (2022) - [j304]Awais Manzoor, Munam Ali Shah, Hasan Ali Khattak, Ikram Ud Din, Muhammad Khurram Khan:
Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges. Int. J. Commun. Syst. 35(12) (2022) - [j303]Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, Alireza Jolfaei, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. IEEE Internet Things J. 9(1): 199-221 (2022) - [j302]Cong Peng, Min Luo, Huaqun Wang, Muhammad Khurram Khan, Debiao He:
An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT. IEEE Internet Things J. 9(1): 589-600 (2022) - [j301]Muhammad Usman Younus, Muhammad Khurram Khan, Abdul Rauf Bhatti:
Improving the Software-Defined Wireless Sensor Networks Routing Performance Using Reinforcement Learning. IEEE Internet Things J. 9(5): 3495-3508 (2022) - [j300]Zeeshan Siddiqui, Jiechao Gao, Muhammad Khurram Khan:
An Improved Lightweight PUF-PKI Digital Certificate Authentication Scheme for the Internet of Things. IEEE Internet Things J. 9(20): 19744-19756 (2022) - [j299]Xingbo Dong, Muhammad Khurram Khan, Lu Leng, Andrew Beng Jin Teoh:
Co-Learning to Hash Palm Biometrics for Flexible IoT Deployment. IEEE Internet Things J. 9(23): 23786-23794 (2022) - [j298]Yifan Wang, Xiaoying Jia, Yongbo Xia, Muhammad Khurram Khan, Debiao He:
A blockchain-based conditional privacy-preserving authentication scheme for edge computing services. J. Inf. Secur. Appl. 70: 103334 (2022) - [j297]Muhammad Adil, Muhammad Khurram Khan, Mona Jamjoom, Ahmed Farouk:
MHADBOR: AI-Enabled Administrative-Distance-Based Opportunistic Load Balancing Scheme for an Agriculture Internet of Things Network. IEEE Micro 42(1): 41-50 (2022) - [j296]Sumit Kumar, Jitesh Pradhan, Arup Kumar Pal, SK Hafizul Islam, Muhammad Khurram Khan:
Radiological image retrieval technique using multi-resolution texture and shape features. Multim. Tools Appl. 81(10): 13633-13660 (2022) - [j295]Mukul Majhi, Arup Kumar Pal, Jitesh Pradhan, SK Hafizul Islam, Muhammad Khurram Khan:
Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications. Multim. Tools Appl. 81(29): 41545-41577 (2022) - [j294]Muhammad Khurram Khan:
Technology and telecommunications: a panacea in the COVID-19 crisis. Telecommun. Syst. 79(1): 1-2 (2022) - [j293]Imran Razzak, Guandong Xu, Muhammad Khurram Khan:
Guest Editorial: Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures. IEEE Trans. Ind. Informatics 18(5): 3449-3451 (2022) - [j292]Aman Ahmad Ansari, Bharavi Mishra, Poonam Gera, Muhammad Khurram Khan, Chinmay Chakraborty, Dheerendra Mishra:
Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry. IEEE Trans. Ind. Informatics 18(11): 8316-8325 (2022) - [j291]Xiong Li, Shanpeng Liu, Rongxing Lu, Muhammad Khurram Khan, Ke Gu, Xiaosong Zhang:
An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System. IEEE J. Biomed. Health Informatics 26(5): 2020-2031 (2022) - [j290]Yu Wang, Wenfang Zhang, Xiaomin Wang, Wei Guo, Muhammad Khurram Khan, Pingzhi Fan:
Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View. IEEE Trans. Intell. Transp. Syst. 23(2): 1332-1346 (2022) - [j289]Abdelouahid Derhab, Mohamed Belaoued, Irfan Mohiuddin, Fajri Kurniawan, Muhammad Khurram Khan:
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks. IEEE Trans. Intell. Transp. Syst. 23(3): 2366-2379 (2022) - [j288]Jiale Lei, Junqin Huang, Linghe Kong, Guihai Chen, Muhammad Khurram Khan:
DeFLoc: Deep Learning Assisted Indoor Vehicle Localization Atop FM Fingerprint Map. IEEE Trans. Intell. Transp. Syst. 23(10): 19795-19806 (2022) - [j287]Sriramulu Bojjagani, Y. C. A. Padmanabha Reddy, Thati Anuradha, P. V. Venkateswara Rao, B. Ramachandra Reddy, Muhammad Khurram Khan:
Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems. IEEE Trans. Intell. Transp. Syst. 23(12): 24698-24713 (2022) - [j286]Bimal Kumar Meher, Ruhul Amin, Ashok Kumar Das, Muhammad Khurram Khan:
KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System. IEEE Trans. Netw. Sci. Eng. 9(5): 3411-3420 (2022) - [j285]Jun Huang, Debiao He, Yitao Chen, Muhammad Khurram Khan, Min Luo:
A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy. IEEE Trans. Netw. Sci. Eng. 9(5): 3808-3820 (2022) - [j284]Iram Bibi, Adnan Akhunzada, Jahanzaib Malik, Muhammad Khurram Khan, Muhammad Dawood:
Secure Distributed Mobile Volunteer Computing with Android. ACM Trans. Internet Techn. 22(1): 2:1-2:21 (2022) - [j283]Salman Shamshad, Minahil Rana, Khalid Mahmood, Muhammad Khurram Khan, Mohammad S. Obaidat:
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing. Wirel. Pers. Commun. 124(1): 283-292 (2022) - [c59]Qizhou Lin, Lu Leng, Muhammad Khurram Khan:
Deep Ternary Hashing Code for Palmprint Retrieval and Recognition. ICAAI 2022: 88-93 - [e8]Joshua Zhexue Huang, Yi Pan, Barbara Hammer, Muhammad Khurram Khan, Xing Xie, Laizhong Cui, Yulin He:
9th IEEE International Conference on Data Science and Advanced Analytics, DSAA 2022, Shenzhen, China, October 13-16, 2022. IEEE 2022, ISBN 978-1-6654-7330-9 [contents] - [e7]Yuan Tian, Tinghuai Ma, Muhammad Khurram Khan, Victor S. Sheng, Zhaoqing Pan:
Big Data and Security - Third International Conference, ICBDS 2021, Shenzhen, China, November 26-28, 2021, Proceedings. Communications in Computer and Information Science 1563, Springer 2022, ISBN 978-981-19-0851-4 [contents] - 2021
- [j282]Muhammad Usman Younus, Muhammad Khurram Khan, Muhammad Rizwan Anjum, Sharjeel Afridi, Zulfiqar Ali Arain, Abdul Aleem Jamali:
Optimizing the Lifetime of Software Defined Wireless Sensor Network via Reinforcement Learning. IEEE Access 9: 259-272 (2021) - [j281]Muhammad Nasir Mumtaz Bhutta, Amir A. Khwaja, Adnan Nadeem, Hafiz Farooq Ahmad, Muhammad Khurram Khan, Moataz Hanif, Houbing Song, Mohsen A. Rashwan, Yue Cao:
A Survey on Blockchain Technology: Evolution, Architecture and Security. IEEE Access 9: 61048-61073 (2021) - [j280]Tengfei Wu, Lu Leng, Muhammad Khurram Khan, Farrukh Aslam Khan:
Palmprint-Palmvein Fusion Recognition Based on Deep Hashing Network. IEEE Access 9: 135816-135827 (2021) - [j279]Chinmay Chakraborty, Muhammad Khurram Khan, Ishfaq Ahmad:
Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021. Big Data 9(3): 151-152 (2021) - [j278]Chinmay Chakraborty, Muhammad Khurram Khan, Ishfaq Ahmad:
Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021. Big Data 9(4): 324-325 (2021) - [j277]Chinmay Chakraborty, Muhammad Khurram Khan, Ishfaq Ahmad:
Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: December 30, 2021. Big Data 9(5): 402-403 (2021) - [j276]Muhammad Khurram Khan, Amanullah Quadri:
Augmenting Cybersecurity in Autonomous Vehicles: Innovative Recommendations for Aspiring Entrepreneurs. IEEE Consumer Electron. Mag. 10(3): 111-116 (2021) - [j275]Soumya Banerjee, Basudeb Bera, Ashok Kumar Das, Samiran Chattopadhyay, Muhammad Khurram Khan, Joel J. P. C. Rodrigues:
Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT. Comput. Commun. 169: 99-113 (2021) - [j274]Craig Beaman, Ashley Barkworth, Toluwalope David Akande, Saqib Hakak, Muhammad Khurram Khan:
Ransomware: Recent advances, analysis, challenges and future research directions. Comput. Secur. 111: 102490 (2021) - [j273]Mukul Majhi, Arup Kumar Pal, SK Hafizul Islam, Muhammad Khurram Khan:
Secure content-based image retrieval using modified Euclidean distance for encrypted features. Trans. Emerg. Telecommun. Technol. 32(2) (2021) - [j272]Diksha Rangwani, Dipanwita Sadhukhan, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta:
An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - [j271]Izwa Altaf, Muhammad Arslan Akram, Khalid Mahmood, Saru Kumari, Hu Xiong, Muhammad Khurram Khan:
A novel authentication and key-agreement scheme for satellite communication network. Trans. Emerg. Telecommun. Technol. 32(7) (2021) - [j270]Zhiyan Xu, Min Luo, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Debiao He:
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios. IEEE Commun. Lett. 25(4): 1074-1078 (2021) - [j269]Vinod Kumar, Musheer Ahmad, Adesh Kumari, Saru Kumari, Muhammad Khurram Khan:
SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing. Int. J. Commun. Syst. 34(2) (2021) - [j268]Sivanarayani M. Karunarathne, Neetesh Saxena, Muhammad Khurram Khan:
Security and Privacy in IoT Smart Healthcare. IEEE Internet Comput. 25(4): 37-48 (2021) - [j267]Wazir Zada Khan, Quratul-Ain Arshad, Saqib Hakak, Muhammad Khurram Khan, Saeed Ur Rehman:
Trust Management in Social Internet of Things: Architectures, Recent Advancements, and Future Challenges. IEEE Internet Things J. 8(10): 7768-7788 (2021) - [j266]Muhammad Asad Saleem, Zahid Ghaffar, Khalid Mahmood, Ashok Kumar Das, Joel J. P. C. Rodrigues, Muhammad Khurram Khan:
Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function. IEEE Internet Things J. 8(22): 16613-16622 (2021) - [j265]Muhammad Khalid, Kezhi Wang, Nauman Aslam, Yue Cao, Naveed Ahmad, Muhammad Khurram Khan:
From smart parking towards autonomous valet parking: A survey, challenges and future Works. J. Netw. Comput. Appl. 175: 102935 (2021) - [j264]Pranav Nerurkar, Dhiren R. Patel, Yann Busnel, Romaric Ludinard, Saru Kumari, Muhammad Khurram Khan:
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009-2020). J. Netw. Comput. Appl. 177: 102940 (2021) - [j263]Muhammad Khurram Khan, Muhammad Shiraz, Qaisar Shaheen, Shariq Aziz Butt, Rizwan Akhtar, Muazzam Ali Khan Khattak, Wang Changda:
Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis. J. Sensors 2021: 7459368:1-7459368:18 (2021) - [j262]Anum Aftab, Farrukh Aslam Khan, Muhammad Khurram Khan, Haider Abbas, Waseem Iqbal, Farhan Riaz:
Hand-based multibiometric systems: state-of-the-art and future challenges. PeerJ Comput. Sci. 7: e707 (2021) - [j261]Diksha Rangwani, Dipanwita Sadhukhan, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta:
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things. Peer-to-Peer Netw. Appl. 14(3): 1548-1571 (2021) - [j260]Chien-Ming Chen, Zhuoyu Tie, Eric Ke Wang, Muhammad Khurram Khan, Sachin Kumar, Saru Kumari:
Verifiable dynamic ranked search with forward privacy over encrypted cloud data. Peer-to-Peer Netw. Appl. 14(5): 2977-2991 (2021) - [j259]Qian Mei, Hu Xiong, Jinhao Chen, Minghao Yang, Saru Kumari, Muhammad Khurram Khan:
Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV. IEEE Syst. J. 15(1): 245-256 (2021) - [j258]Salman Shamshad, Khalid Mahmood, Saru Kumari, Muhammad Khurram Khan:
Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC". IEEE Syst. J. 15(1): 877-880 (2021) - [j257]Khalid Mahmood, Salman Shamshad, Saru Kumari, Muhammad Khurram Khan, Mohammad S. Obaidat:
Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication". IEEE Syst. J. 15(1): 1366-1368 (2021) - [j256]Sajid Hussain, Shehzad Ashraf Chaudhry, Osama Ahmad Alomari, Mohammed H. Alsharif, Muhammad Khurram Khan, Neeraj Kumar:
Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones. IEEE Syst. J. 15(3): 4431-4438 (2021) - [j255]Muhammad Khurram Khan:
Importance of telecommunications in the times of COVID-19. Telecommun. Syst. 76(1): 1-2 (2021) - [j254]Jangirala Srinivas, Ashok Kumar Das, Xiong Li, Muhammad Khurram Khan, Minho Jo:
Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems. IEEE Trans. Ind. Informatics 17(7): 4425-4436 (2021) - [j253]Dipanwita Sadhukhan, Sangram Ray, G. P. Biswas, Muhammad Khurram Khan, Mou Dasgupta:
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J. Supercomput. 77(2): 1114-1151 (2021) - [j252]Cong Peng, Debiao He, Jianhua Chen, Neeraj Kumar, Muhammad Khurram Khan:
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System. ACM Trans. Internet Techn. 21(3): 61:1-61:24 (2021) - [j251]Jing Wang, Libing Wu, Sherali Zeadally, Muhammad Khurram Khan, Debiao He:
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid. ACM Trans. Sens. Networks 17(3): 25:1-25:25 (2021) - [j250]Yu Wang, Wenfang Zhang, Xiaomin Wang, Muhammad Khurram Khan, Pingzhi Fan:
Efficient Privacy-Preserving Authentication Scheme With Fine-Grained Error Location for Cloud-Based VANET. IEEE Trans. Veh. Technol. 70(10): 10436-10449 (2021) - [j249]Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Muhammad Khurram Khan, Mou Dasgupta:
ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things. Wirel. Pers. Commun. 116(3): 1867-1896 (2021) - [j248]Homero Toral-Cruz, Debiao He, Albena Dimitrova Mihovska, Kim-Kwang Raymond Choo, Muhammad Khurram Khan:
Reliable and Secure e-Health Networks. Wirel. Pers. Commun. 117(1): 1-6 (2021) - [j247]Vivek Kumar, Sangram Ray, Mou Dasgupta, Muhammad Khurram Khan:
A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography. Wirel. Pers. Commun. 118(4): 3045-3061 (2021) - [c58]Wazir Zada Khan, Muhammad Khurram Khan, Qurat-ul-Ain Arshad, Hafiz Malik, Jalal Al-Muhtadi:
Digital Labels: Influencing Consumers Trust and Raising Cybersecurity Awareness for Adopting Autonomous Vehicles. ICCE 2021: 1-4 - [c57]Yuanhe Shu, Jingwei Wang, Linghe Kong, Jiadi Yu, Guisong Yang, Yueping Cai, Zhen Wang, Muhammad Khurram Khan:
WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology Communication between BLE and WiFi. ICPADS 2021: 356-363 - [e6]Yuan Tian, Tinghuai Ma, Muhammad Khurram Khan:
Big Data and Security - Second International Conference, ICBDS 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers. Communications in Computer and Information Science 1415, Springer 2021, ISBN 978-981-16-3149-8 [contents] - [i3]Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, Alireza Jolfaei, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. CoRR abs/2105.06612 (2021) - 2020
- [j246]Marcus Lim, Azween B. Abdullah, N. Z. Jhanjhi, Muhammad Khurram Khan:
Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks. IEEE Access 8: 16550-16559 (2020) - [j245]Mohammed Binjubeir, Abdulghani Ali Ahmed, Mohd Arfian Ismail, Ali Safaa Sadiq, Muhammad Khurram Khan:
Comprehensive Survey on Big Data Privacy Protection. IEEE Access 8: 20067-20079 (2020) - [j244]Wadha Abdullah Al-Khater, Somaya Al-Máadeed, Abdulghani Ali Ahmed, Ali Safaa Sadiq, Muhammad Khurram Khan:
Comprehensive Review of Cybercrime Detection Techniques. IEEE Access 8: 137293-137311 (2020) - [j243]Muhammad Khurram Khan, Junaid Shuja, Yaser Jararweh, Guanding Yu, Mohsen Guizani, Christos V. Verikoukis, Raja Wasim Ahmad:
IEEE Access Special Section Editorial: Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Compute and Network Resources. IEEE Access 8: 163769-163774 (2020) - [j242]Seyed Ahmad Soleymani, Mohammad Hossein Anisi, Abdul Hanan Abdullah, Md. Asri Ngadi, Shidrokh Goudarzi, Muhammad Khurram Khan, Mohd Nazri Kama:
An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Sci. China Inf. Sci. 63(12) (2020) - [j241]Eric Ke Wang, Chien-Ming Chen, Fan Wang, Muhammad Khurram Khan, Saru Kumari:
Joint-learning segmentation in Internet of drones (IoD)-based monitor systems. Comput. Commun. 152: 54-62 (2020) - [j240]Eric Ke Wang, RuiPei Sun, Chien-Ming Chen, Zuodong Liang, Saru Kumari, Muhammad Khurram Khan:
Proof of X-repute blockchain consensus protocol for IoT systems. Comput. Secur. 95: 101871 (2020) - [j239]Shuyun Shi, Debiao He, Li Li, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. Comput. Secur. 97: 101966 (2020) - [j238]Yanan Zhao, Yingzhe Hou, Lili Wang, Saru Kumari, Muhammad Khurram Khan, Hu Xiong:
An efficient certificateless aggregate signature scheme for the Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 31(5) (2020) - [j237]Eric Ke Wang, Zuodong Liang, Chien-Ming Chen, Saru Kumari, Muhammad Khurram Khan:
PoRX: A reputation incentive scheme for blockchain consensus of IIoT. Future Gener. Comput. Syst. 102: 140-151 (2020) - [j236]Waleed Shahjehan, Asad Riaz, Imran Khan, Ali Safaa Sadiq, Suleman Khan, Muhammad Khurram Khan:
Bat algorithm-based beamforming for mmWave massive MIMO systems. Int. J. Commun. Syst. 33(2) (2020) - [j235]Yang Liu, Debiao He, Mohammad S. Obaidat, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Blockchain-based identity management systems: A review. J. Netw. Comput. Appl. 166: 102731 (2020) - [j234]Abdul Waheed, Munam Ali Shah, Abid Khan, Saif ul Islam, Suleman Khan, Carsten Maple, Muhammad Khurram Khan:
Volunteer Computing in Connected Vehicles: Opportunities and Challenges. IEEE Netw. 34(5): 212-218 (2020) - [j233]Xiong Li, Jieyao Peng, Mohammad S. Obaidat, Fan Wu, Muhammad Khurram Khan, Chaoyang Chen:
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems. IEEE Syst. J. 14(1): 39-50 (2020) - [j232]Muhammad Khurram Khan:
Technological advancements and 2020. Telecommun. Syst. 73(1): 1-2 (2020) - [j231]Zhe Liu, Kim-Kwang Raymond Choo, Weiqiang Liu, Muhammad Khurram Khan:
Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance. IEEE Trans. Emerg. Top. Comput. 8(2): 264-266 (2020) - [j230]Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain. IEEE Trans. Inf. Forensics Secur. 15: 2440-2452 (2020) - [j229]Vinod Kumar, Musheer Ahmad, Dheerendra Mishra, Saru Kumari, Muhammad Khurram Khan:
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Veh. Commun. 22: 100213 (2020) - [e5]Yuan Tian, Tinghuai Ma, Muhammad Khurram Khan:
Big Data and Security - First International Conference, ICBDS 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers. Communications in Computer and Information Science 1210, Springer 2020, ISBN 978-981-15-7529-7 [contents] - [i2]Halgurd S. Maghdid, Aras T. Asaad, Kayhan Zrar Ghafoor, Ali Safaa Sadiq, Muhammad Khurram Khan:
Diagnosing COVID-19 Pneumonia from X-Ray and CT Images using Deep Learning and Transfer Learning Algorithms. CoRR abs/2004.00038 (2020)
2010 – 2019
- 2019
- [j228]Ikram Ud Din, Mohsen Guizani, Suhaidi Hassan, Byung-Seo Kim, Muhammad Khurram Khan, Mohammed Atiquzzaman, Syed Hassan Ahmed:
The Internet of Things: A Review of Enabled Technologies and Future Challenges. IEEE Access 7: 7606-7640 (2019) - [j227]Anwar Ghani, Syed Husnain Abbas Naqvi, Muhammad U. Ilyas, Muhammad Khurram Khan, Ali Hassan:
Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks Using Collaborative Communication. IEEE Access 7: 26558-26570 (2019) - [j226]Ikram Ud Din, Mohsen Guizani, Byung-Seo Kim, Suhaidi Hassan, Muhammad Khurram Khan:
Trust Management Techniques for the Internet of Things: A Survey. IEEE Access 7: 29763-29787 (2019) - [j225]Saru Kumari, Pradeep Chaudhary, Chien-Ming Chen, Muhammad Khurram Khan:
Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications. IEEE Access 7: 39717-39720 (2019) - [j224]Mengli Zhang, Gang Zhou, Muhammad Khurram Khan, Saru Kumari, Xuexian Hu, Wenfen Liu:
SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm. IEEE Access 7: 155107-155119 (2019) - [j223]Marcus Lim, Azween B. Abdullah, N. Z. Jhanjhi, Muhammad Khurram Khan, Mahadevan Supramaniam:
Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique. IEEE Access 7: 184797-184807 (2019) - [j222]Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan, Quratul-Ain Arshad:
Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things. IEEE Consumer Electron. Mag. 8(2): 35-38 (2019) - [j221]Akande Sheriff Abiodun, Mohammad Hossein Anisi, Muhammad Khurram Khan:
Cloud-Based Wireless Body Area Networks: Managing Data for Better Health Care. IEEE Consumer Electron. Mag. 8(3): 55-59 (2019) - [j220]Hasan Ali Khattak, Zoobia Ameer, Ikram Ud Din, Muhammad Khurram Khan:
Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities. Comput. Sci. Inf. Syst. 16(1): 1-17 (2019) - [j219]Shaik Shabana Anjum, Rafidah Md Noor, Mohammad Hossein Anisi, Ismail Bin Ahmedy, Fazidah Othman, Muhammad Alam, Muhammad Khurram Khan:
Energy Management in RFID-Sensor Networks: Taxonomy and Challenges. IEEE Internet Things J. 6(1): 250-266 (2019) - [j218]Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, Neeraj Kumar:
A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126: 45-58 (2019) - [j217]Muhammad Usman Younus, Saif ul Islam, Ihsan Ali, Suleman Khan, Muhammad Khurram Khan:
A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases. J. Netw. Comput. Appl. 137: 62-77 (2019) - [j216]Abdelmuttlib Ibrahim Abdallaahmed, Siti Hafizah Ab Hamid, Abdullah Gani, Suleman Khan, Muhammad Khurram Khan:
Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges. J. Netw. Comput. Appl. 145 (2019) - [j215]Tanveer Khan, Masoom Alam, Adnan Akhunzada, Ali Hur, Muhammad Asif, Muhammad Khurram Khan:
Towards augmented proactive cyberthreat intelligence. J. Parallel Distributed Comput. 124: 47-59 (2019) - [j214]Maryam Asadzadeh Kaljahi, Shivakumara Palaiahnakote, Mohammad Hossein Anisi, Mohd Yamani Idna Bin Idris, Michael Blumenstein, Muhammad Khurram Khan:
A scene image classification technique for a ubiquitous visual surveillance system. Multim. Tools Appl. 78(5): 5791-5818 (2019) - [j213]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Muhammad Khurram Khan:
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput. 23(24): 13127-13138 (2019) - [j212]Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan:
Communal Acts of IoT Consumers: A Potential Threat to Security and Privacy. IEEE Trans. Consumer Electron. 65(1): 64-72 (2019) - [j211]Mudassar Ali Khan, Ikram Ud Din, Sultan Ullah Jadoon, Muhammad Khurram Khan, Mohsen Guizani, Kamran Ahmad Awan:
g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices. IEEE Trans. Consumer Electron. 65(2): 215-223 (2019) - [j210]Muhammad Khurram Khan:
A new journey in the new year. Telecommun. Syst. 70(1): 1 (2019) - [c56]Zhenzao Wen, Linghe Kong, Guihai Chen, Muhammad Khurram Khan, Shahid Mumtaz, Joel J. P. C. Rodrigues:
Understanding Multi-Path Routing Algorithms in Datacenter Networks. GLOBECOM 2019: 1-6 - [c55]Zucheng Wu, Linghe Kong, Guihai Chen, Muhammad Khurram Khan, Shahid Mumtaz, Joel J. P. C. Rodrigues:
CrowdSwitch: Crowdsensing Based Switch between Multiple Cellular Operators in Subways. GLOBECOM 2019: 1-6 - 2018
- [j209]Qiming Zheng, Xiaomin Wang, Muhammad Khurram Khan, Wenfang Zhang, Brij B. Gupta, Wei Guo:
A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service. IEEE Access 6: 711-722 (2018) - [j208]Muhammad Zeeshan, Muhammad Majid, Imran Fareed Nizami, Syed Muhammad Anwar, Ikram Ud Din, Muhammad Khurram Khan:
A Newly Developed Ground Truth Dataset for Visual Saliency in Videos. IEEE Access 6: 20855-20867 (2018) - [j207]Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems. IEEE Access 6: 28203-28212 (2018) - [j206]Ghufran Ahmed, Saif ul Islam, Maham Shahid, Adnan Akhunzada, Sohail Jabbar, Muhammad Khurram Khan, Muhammad Riaz, Kijun Han:
Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare. IEEE Access 6: 29602-29610 (2018) - [j205]Zeeshan Siddiqui, Omar Tayan, Muhammad Khurram Khan:
Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols. IEEE Access 6: 34527-34542 (2018) - [j204]Hassan Jamil Syed, Abdullah Gani, Fariza Hanum Nasaruddin, Anjum Naveed, Abdelmuttlib Ibrahim Abdallaahmed, Muhammad Khurram Khan:
CloudProcMon: A Non-Intrusive Cloud Monitoring Framework. IEEE Access 6: 44591-44606 (2018) - [j203]Mimi Ma, Debiao He, Muhammad Khurram Khan, Jianhua Chen:
Certificateless searchable public key encryption scheme for mobile healthcare system. Comput. Electr. Eng. 65: 413-424 (2018) - [j202]Sravani Challa, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Saru Kumari, Muhammad Khurram Khan, Athanasios V. Vasilakos:
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 69: 534-554 (2018) - [j201]Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan:
Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions. IEEE Consumer Electron. Mag. 7(1): 57-65 (2018) - [j200]Ikram Ud Din, Suhaidi Hassan, Muhammad Khurram Khan, Mohsen Guizani, Osman Ghazali, Adib Habbal:
Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions. IEEE Commun. Surv. Tutorials 20(2): 1443-1474 (2018) - [j199]Junaid Shuja, Abdullah Gani, Kwangman Ko, Kyoungyoung So, Saad Mustafa, Sajjad Ahmad Madani, Muhammad Khurram Khan:
SIMDOM: A framework for SIMD instruction translation and offloading in heterogeneous mobile architectures. Trans. Emerg. Telecommun. Technol. 29(4) (2018) - [j198]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Neeraj Kumar:
A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener. Comput. Syst. 80: 483-495 (2018) - [j197]Xiong Li, Fan Wu, Muhammad Khurram Khan, Lili Xu, Jian Shen, Minho Jo:
A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener. Comput. Syst. 84: 149-159 (2018) - [j196]SK Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan:
A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor. Int. J. Ad Hoc Ubiquitous Comput. 27(2): 138-155 (2018) - [j195]Syed Muhammad Anwar, Muhammad Majid, Adnan Qayyum, Muhammad Awais, Majdi R. Alnowami, Muhammad Khurram Khan:
Medical Image Analysis using Convolutional Neural Networks: A Review. J. Medical Syst. 42(11): 226 (2018) - [j194]Naina Emmanuel, Abid Khan, Masoom Alam, Tanveer Khan, Muhammad Khurram Khan:
Structures and data preserving homomorphic signatures. J. Netw. Comput. Appl. 102: 58-70 (2018) - [j193]Ahsan Saleem, Abid Khan, Furqan Shahid, Masoom Alam, Muhammad Khurram Khan:
Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits. J. Netw. Comput. Appl. 108: 1-19 (2018) - [j192]Mohammed Y. Aalsalem, Wazir Zada Khan, Wajeb Gharibi, Muhammad Khurram Khan, Quratul-Ain Arshad:
Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges. J. Netw. Comput. Appl. 113: 87-97 (2018) - [j191]Shidrokh Goudarzi, Wan Haslina Hassan, Mohammad Hossein Anisi, Muhammad Khurram Khan, Seyed Ahmad Soleymani:
Intelligent Technique for Seamless Vertical Handover in Vehicular Networks. Mob. Networks Appl. 23(6): 1462-1477 (2018) - [j190]Mohammed Zakariah, Muhammad Khurram Khan, Hafiz Malik:
Digital multimedia audio forensics: past, present and future. Multim. Tools Appl. 77(1): 1009-1040 (2018) - [j189]Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Muhammad Khurram Khan, Qi Jiang, SK Hafizul Islam:
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multim. Tools Appl. 77(2): 2359-2389 (2018) - [j188]Shehzad Ashraf Chaudhry, Husnain Naqvi, Muhammad Khurram Khan:
An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multim. Tools Appl. 77(5): 5503-5524 (2018) - [j187]Ruhul Amin, SK Hafizul Islam, Pandi Vijayakumar, Muhammad Khurram Khan, Victor Chang:
A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication. Multim. Tools Appl. 77(9): 11041-11066 (2018) - [j186]Shichao Li, Ning Zhang, Siyu Lin, Linghe Kong, Ajay K. Katangur, Muhammad Khurram Khan, Minming Ni, Gang Zhu:
Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things. IEEE Netw. 32(1): 72-79 (2018) - [j185]Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Lina Wang, Jian Shen:
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services. IEEE Syst. J. 12(2): 1621-1631 (2018) - [j184]Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, YoungHo Park:
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment. IEEE J. Biomed. Health Informatics 22(4): 1310-1322 (2018) - [j183]Imran Khan, Shehzad Ashraf Chaudhry, Muhammad Sher, Muhammad Khurram Khan:
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data. J. Supercomput. 74(8): 3685-3703 (2018) - [j182]JiLiang Li, Kim-Kwang Raymond Choo, WeiGuo Zhang, Saru Kumari, Joel J. P. C. Rodrigues, Muhammad Khurram Khan, Dieter Hogrefe:
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun. 13: 104-113 (2018) - [c54]Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan:
Five acts of consumer behavior: A potential security and privacy threat to Internet of Things. ICCE 2018: 1-3 - 2017
- [j181]Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Minho Jo:
Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts. IEEE Access 5: 3273-3283 (2017) - [j180]Seyed Ahmad Soleymani, Abdul Hanan Abdullah, Mahdi Zareei, Mohammad Hossein Anisi, César Vargas Rosales, Muhammad Khurram Khan, Shidrokh Goudarzi:
A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing. IEEE Access 5: 15619-15629 (2017) - [j179]Junaid Shuja, Saad Mustafa, Raja Wasim Ahmad, Sajjad Ahmad Madani, Abdullah Gani, Muhammad Khurram Khan:
Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures. IEEE Access 5: 24542-24554 (2017) - [j178]Samman Zahra, Masoom Alam, Qaisar Javaid, Abdul Wahid, Nadeem Javaid, Saif Ur Rehman Malik, Muhammad Khurram Khan:
Fog Computing Over IoT: A Secure Deployment and Formal Verification. IEEE Access 5: 27132-27144 (2017) - [j177]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Muhammad Khurram Khan, Ashok Kumar Das:
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. des Télécommunications 72(3-4): 131-144 (2017) - [j176]Mouzna Tahir, Abid Khan, Abdul Hameed, Masoom Alam, Muhammad Khurram Khan, Farhana Jabeen:
Towards a set aggregation-based data integrity scheme for smart grids. Ann. des Télécommunications 72(9-10): 551-561 (2017) - [j175]Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan, Quratul-Ain Arshad:
When social objects collaborate: Concepts, processing elements, attacks and challenges. Comput. Electr. Eng. 58: 397-411 (2017) - [j174]Akande Sheriff Abiodun, Mohammad Hossein Anisi, Ihsan Ali, Adnan Akhunzada, Muhammad Khurram Khan:
Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique. IEEE Consumer Electron. Mag. 6(4): 38-47 (2017) - [j173]Ahmed Abdelaziz, Tan Fong Ang, Abdullah Gani, Suleman Khan, Faiz Alotaibi, Muhammad Khurram Khan:
On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues. Comput. J. 60(10): 1510-1519 (2017) - [j172]Anam Nazir, Masoom Alam, Saif Ur Rehman Malik, Adnan Akhunzada, Muhammad Nadeem Cheema, Muhammad Khurram Khan, Yang Ziang, Tanveer Khan, Abid Khan:
A high-level domain-specific language for SIEM (design, development and formal verification). Clust. Comput. 20(3): 2423-2437 (2017) - [j171]Linghe Kong, Muhammad Khurram Khan, Fan Wu, Guihai Chen, Peng Zeng:
Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges. IEEE Commun. Mag. 55(1): 62-68 (2017) - [j170]Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura:
Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1. IEEE Commun. Mag. 55(3): 60-61 (2017) - [j169]Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura:
Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2. IEEE Commun. Mag. 55(6): 118-119 (2017) - [j168]Adnan Akhunzada, Muhammad Khurram Khan:
Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues. IEEE Commun. Mag. 55(7): 110-118 (2017) - [j167]Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mohsen Guizani, Muhammad Khurram Khan:
Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art. IEEE Commun. Surv. Tutorials 19(1): 303-324 (2017) - [j166]Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Xiong Li, Fan Wu, Kim-Kwang Raymond Choo, Muhammad Khurram Khan:
On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j165]Vanga Odelu, Ashok Kumar Das, Y. Sreenivasa Rao, Saru Kumari, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces 54: 3-9 (2017) - [j164]Mehdi Sookhak, F. Richard Yu, Muhammad Khurram Khan, Yang Xiang, Rajkumar Buyya:
Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. Future Gener. Comput. Syst. 72: 273-287 (2017) - [j163]SK Hafizul Islam, Mohammad Sabzinejad Farash, G. P. Biswas, Muhammad Khurram Khan, Mohammad S. Obaidat:
A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography. Int. J. Comput. Math. 94(1): 39-55 (2017) - [j162]Dheerendra Mishra, Saru Kumari, Muhammad Khurram Khan, Sourav Mukhopadhyay:
An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems. Int. J. Commun. Syst. 30(1) (2017) - [j161]Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, Mohammad Heydari, Seyed Mohammad Sajad Sadough, Saru Kumari, Muhammad Khurram Khan:
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. 30(4) (2017) - [j160]Min Luo, Yunru Zhang, Muhammad Khurram Khan, Debiao He:
An efficient chaos-based 2-party key agreement protocol with provable security. Int. J. Commun. Syst. 30(14) (2017) - [j159]Min Luo, Yunru Zhang, Muhammad Khurram Khan, Debiao He:
A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography. Int. J. Commun. Syst. 30(16) (2017) - [j158]Shidrokh Goudarzi, Wan Haslina Hassan, Mohammad Hossein Anisi, Seyed Ahmad Soleymani, Mehdi Sookhak, Muhammad Khurram Khan, Aisha-Hassan A. Hashim, Mahdi Zareei:
ABC-PSO for vertical handover in heterogeneous wireless networks. Neurocomputing 256: 63-81 (2017) - [j157]Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan, Abdulatif Al-Dhawailie Al-Ghaiheb, Neeraj Kumar, Athanasios V. Vasilakos:
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment. IEEE Internet Things J. 4(5): 1634-1646 (2017) - [j156]Prerna Mohit, Ruhul Amin, Arijit Karati, G. P. Biswas, Muhammad Khurram Khan:
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System. J. Medical Syst. 41(4): 50:1-50:13 (2017) - [j155]Muhammad Habib Ur Rehman, Chee Sun Liew, Teh Ying Wah, Muhammad Khurram Khan:
Towards next-generation heterogeneous mobile data stream mining applications: Opportunities, challenges, and future research directions. J. Netw. Comput. Appl. 79: 1-24 (2017) - [j154]Shahid Anwar, Zakira Inayat, Mohamed Fadli Bin Zolkipli, Jasni Mohamad Zain, Abdullah Gani, Nor Badrul Anuar, Muhammad Khurram Khan, Victor Chang:
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey. J. Netw. Comput. Appl. 93: 259-279 (2017) - [j153]Suleman Khan, Muhammad Shiraz, Laleh Boroumand, Abdullah Gani, Muhammad Khurram Khan:
Towards port-knocking authentication methods for mobile cloud computing. J. Netw. Comput. Appl. 97: 66-78 (2017) - [j152]Hassan Jamil Syed, Abdullah Gani, Raja Wasim Ahmad, Muhammad Khurram Khan, Abdelmuttlib Ibrahim Abdallaahmed:
Cloud monitoring: A review, taxonomy, and open research issues. J. Netw. Comput. Appl. 98: 11-26 (2017) - [j151]Sidra Aslam, Saif ul Islam, Abid Khan, Mansoor Ahmed, Adnan Akhunzada, Muhammad Khurram Khan:
Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges. J. Netw. Comput. Appl. 100: 80-94 (2017) - [j150]Libing Wu, Jing Wang, Debiao He, Muhammad Khurram Khan:
Cryptanalysis of an identity-based public auditing protocol for cloud storage. Frontiers Inf. Technol. Electron. Eng. 18(12): 1972-1977 (2017) - [j149]Abdullah Yousafzai, Abdullah Gani, Rafidah Md Noor, Mehdi Sookhak, Hamid Talebian, Muhammad Shiraz, Muhammad Khurram Khan:
Cloud resource allocation schemes: review, taxonomy, and opportunities. Knowl. Inf. Syst. 50(2): 347-381 (2017) - [j148]Masoom Alam, Saif Ur Rehman Malik, Qaisar Javed, Abid Khan, Shamaila Bisma Khan, Adeel Anjum, Nadeem Javed, Adnan Akhunzada, Muhammad Khurram Khan:
Formal modeling and verification of security controls for multimedia systems in the cloud. Multim. Tools Appl. 76(21): 22845-22870 (2017) - [j147]Saru Kumari, Shehzad Ashraf Chaudhry, Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Muhammad Khurram Khan:
An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 10(1): 92-105 (2017) - [j146]Xiong Li, Arun Kumar Sangaiah, Saru Kumari, Fan Wu, Jian Shen, Muhammad Khurram Khan:
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city. Pers. Ubiquitous Comput. 21(5): 791-805 (2017) - [j145]Ruhul Amin, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, Saru Kumari:
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. Secur. Commun. Networks 2017: 5989151:1-5989151:15 (2017) - [j144]Ruhul Amin, R. Simon Sherratt, Debasis Giri, SK Hafizul Islam, Muhammad Khurram Khan:
A software agent enabled biometric security algorithm for secure file access in consumer storage devices. IEEE Trans. Consumer Electron. 63(1): 53-61 (2017) - [j143]Zhe Liu, Xinyi Huang, Zhi Hu, Muhammad Khurram Khan, Hwajeong Seo, Lu Zhou:
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age. IEEE Trans. Dependable Secur. Comput. 14(3): 237-248 (2017) - [j142]Zhiyan Xu, Libing Wu, Debiao He, Muhammad Khurram Khan:
Security analysis of a publicly verifiable data possession scheme for remote storage. J. Supercomput. 73(11): 4923-4930 (2017) - [j141]Zhiyan Xu, Libing Wu, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Debiao He:
A secure and efficient public auditing scheme using RSA algorithm for cloud storage. J. Supercomput. 73(12): 5285-5309 (2017) - [j140]Shiang-Feng Tzeng, Shi-Jinn Horng, Tianrui Li, Xian Wang, Po-Hsian Huang, Muhammad Khurram Khan:
Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs. IEEE Trans. Veh. Technol. 66(4): 3235-3248 (2017) - [j139]Mehdi Sookhak, F. Richard Yu, Ying He, Hamid Talebian, Nader Sohrabi Safa, Nan Zhao, Muhammad Khurram Khan, Neeraj Kumar:
Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing. IEEE Veh. Technol. Mag. 12(3): 55-64 (2017) - [j138]Siyu Lin, Linghe Kong, Qian Gao, Muhammad Khurram Khan, Zhangdui Zhong, Xi Jin, Peng Zeng:
Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G Systems. IEEE Wirel. Commun. 24(5): 74-80 (2017) - [j137]Marimuthu Karuppiah, Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Muhammad Khurram Khan, R. Saravanan, Sayantani Basu:
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 93(2): 383-407 (2017) - [j136]Han Shen, Jian Shen, Muhammad Khurram Khan, Jong-Hyouk Lee:
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things. Wirel. Pers. Commun. 96(4): 5253-5266 (2017) - [j135]Shehzad Ashraf Chaudhry, Husnain Naqvi, Khalid Mahmood, Hafiz Farooq Ahmad, Muhammad Khurram Khan:
An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 96(4): 5355-5373 (2017) - [c53]Muhammad Khurram Khan, Zeeshan Siddiqui, Omar Tayan:
A secure framework for digital Quran certification. ICCE 2017: 59-60 - [c52]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram M. Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". ICIN 2017: 112-116 - 2016
- [j134]Mahdi Zareei, Ehab Mahmoud Mohamed, Mohammad Hossein Anisi, César Vargas Rosales, Kazuya Tsukamoto, Muhammad Khurram Khan:
On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc Network. IEEE Access 4: 8294-8302 (2016) - [j133]Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Salman Iqbal, Ahmed Abdelaziz, Omar Adil Mahdi, Abdelmuttlib Ibrahim Abdallaahmed, Muhammad Shiraz, Yusor Rafid Bahar Al-Mayouf, Ziar Khan, Kwangman Ko, Muhammad Khurram Khan, Victor Chang:
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis. IEEE Access 4: 9800-9820 (2016) - [j132]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Lu Leng, Neeraj Kumar:
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Networks 101: 42-62 (2016) - [j131]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Hamed Arshad, Muhammad Khurram Khan:
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener. Comput. Syst. 63: 56-75 (2016) - [j130]Debiao He, Huaqun Wang, Muhammad Khurram Khan, Lina Wang:
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun. 10(14): 1795-1802 (2016) - [j129]Saru Kumari, Muhammad Khurram Khan, Xiong Li, Fan Wu:
Design of a user anonymous password authentication scheme without smart card. Int. J. Commun. Syst. 29(3): 441-458 (2016) - [j128]SK Hafizul Islam, Muhammad Khurram Khan:
Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. Int. J. Commun. Syst. 29(17): 2442-2456 (2016) - [j127]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu, Muhammad Khurram Khan:
A User Anonymous Mutual Authentication Protocol. KSII Trans. Internet Inf. Syst. 10(9): 4508-4528 (2016) - [j126]Mohammad Sabzinejad Farash, Omer Nawaz, Khalid Mahmood, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan:
A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments. J. Medical Syst. 40(7): 165:1-165:7 (2016) - [j125]Shehzad Ashraf Chaudhry, Muhammad Tawab Khan, Muhammad Khurram Khan, Taeshik Shon:
A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography. J. Medical Syst. 40(11): 230:1-230:13 (2016) - [j124]Adnan Akhunzada, Abdullah Gani, Nor Badrul Anuar, Ahmed Abdelaziz, Muhammad Khurram Khan, Amir Hayat, Samee U. Khan:
Secure and dependable software defined networks. J. Netw. Comput. Appl. 61: 199-221 (2016) - [j123]Zakira Inayat, Abdullah Gani, Nor Badrul Anuar, Muhammad Khurram Khan, Shahid Anwar:
Intrusion response systems: Foundations, design, and challenges. J. Netw. Comput. Appl. 62: 53-74 (2016) - [j122]Salman Iqbal, Miss Laiha Mat Kiah, Babak Dhaghighi, Muzammil Hussain, Suleman Khan, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 74: 98-120 (2016) - [j121]Junaid Shuja, Abdullah Gani, Muhammad Habib Ur Rehman, Ejaz Ahmed, Sajjad Ahmad Madani, Muhammad Khurram Khan, Kwangman Ko:
Towards native code offloading based MCC frameworks for multimedia applications: A survey. J. Netw. Comput. Appl. 75: 335-354 (2016) - [j120]Ahmad Karim, Rosli Salleh, Muhammad Khurram Khan, Aisha Siddiqa, Kim-Kwang Raymond Choo:
On the Analysis and Detection of Mobile Botnet Applications. J. Univers. Comput. Sci. 22(4): 567-588 (2016) - [j119]Jiafu Wan, Muhammad Khurram Khan, Meikang Qiu, Daqiang Zhang:
Cloud-assisted Industrial Systems and Applications. Mob. Networks Appl. 21(5): 822-824 (2016) - [j118]Saru Kumari, Muhammad Khurram Khan, Xiong Li:
A more secure digital rights management authentication scheme based on smart card. Multim. Tools Appl. 75(2): 1135-1158 (2016) - [j117]Saru Kumari, Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Qi Jiang, Muhammad Khurram Khan, Ashok Kumar Das:
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Multim. Tools Appl. 75(24): 17215-17245 (2016) - [j116]Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Ahmed Abdelaziz, Kwangman Ko, Muhammad Khurram Khan, Mohsen Guizani:
Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges. IEEE Netw. 30(6): 6-13 (2016) - [j115]Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, Abdullah Sharaf Alghamdi:
Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification. Peer-to-Peer Netw. Appl. 9(5): 841-853 (2016) - [j114]Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao, Xiaoke Zhao:
Robust three-factor remote user authentication scheme with key agreement for multimedia systems. Secur. Commun. Networks 9(13): 1916-1927 (2016) - [j113]Xiong Li, Jianwei Niu, Saru Kumari, Junguo Liao, Wei Liang, Muhammad Khurram Khan:
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Networks 9(15): 2643-2655 (2016) - [j112]SK Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan:
Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor. Secur. Commun. Networks 9(16): 3229-3238 (2016) - [j111]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Muhammad Khurram Khan, Marimuthu Karuppiah, Renuka Baliyan:
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Networks 9(16): 3527-3542 (2016) - [j110]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Muhammad Khurram Khan:
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur. Commun. Networks 9(17): 4596-4614 (2016) - [j109]Tanmoy Maitra, SK Hafizul Islam, Ruhul Amin, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar:
An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design. Secur. Commun. Networks 9(17): 4615-4638 (2016) - [j108]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar:
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur. Commun. Networks 9(17): 4650-4666 (2016) - [j107]Shehzad Ashraf Chaudhry, Imran Khan, Azeem Irshad, Muhammad Usman Ashraf, Muhammad Khurram Khan, Hafiz Farooq Ahmad:
A provably secure anonymous authentication scheme for Session Initiation Protocol. Secur. Commun. Networks 9(18): 5016-5027 (2016) - [j106]Qi Jiang, Muhammad Khurram Khan, Xiang Lu, Jianfeng Ma, Debiao He:
A privacy preserving three-factor authentication protocol for e-Health clouds. J. Supercomput. 72(10): 3826-3849 (2016) - [j105]Xiong Li, Jianwei Niu, Saru Kumari, SK Hafizul Islam, Fan Wu, Muhammad Khurram Khan, Ashok Kumar Das:
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security. Wirel. Pers. Commun. 89(2): 569-597 (2016) - [c51]Yifeng Cao, Xiao-Yang Liu, Linghe Kong, Min-You Wu, Muhammad Khurram Khan:
EHR: Routing Protocol for Energy Harvesting Wireless Sensor Networks. ICPADS 2016: 56-63 - [i1]Mahmoud Samir Fayed, Muhammad Khurram Khan:
SNKnock: A free security tool for Facebook users. CoRR abs/1612.05923 (2016) - 2015
- [j104]Saru Kumari, Muhammad Khurram Khan, Mohammed Atiquzzaman:
User authentication schemes for wireless sensor networks: A review. Ad Hoc Networks 27: 159-194 (2015) - [j103]Waleed Halboob, Haider Abbas, Muhammad Khurram Khan, Farrukh Aslam Khan, Maruf Pasha:
A framework to address inconstant user requirements in cloud SLAs management. Clust. Comput. 18(1): 123-133 (2015) - [j102]Adnan Akhunzada, Ejaz Ahmed, Abdullah Gani, Muhammad Khurram Khan, Muhammad Imran, Sghaier Guizani:
Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun. Mag. 53(4): 36-44 (2015) - [j101]Muhammad Khurram Khan, Ankita Chaturvedi, Dheerendra Mishra, Saru Kumari:
On the security enhancement of integrated electronic patient records information systems. Comput. Sci. Inf. Syst. 12(2): 857-872 (2015) - [j100]Wazir Zada Khan, Muhammad Khurram Khan, Fahad T. Bin Muhaya, Mohammed Y. Aalsalem, Han-Chieh Chao:
A Comprehensive Study of Email Spam Botnet Detection. IEEE Commun. Surv. Tutorials 17(4): 2271-2295 (2015) - [j99]Debiao He, Muhammad Khurram Khan, Neeraj Kumar:
A new handover authentication protocol based on bilinear pairing functions for wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 18(1/2): 67-74 (2015) - [j98]Muhammad Khurram Khan, Yang Xiang, Shi-Jinn Horng, Hsiao-Hwa Chen:
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014. Int. J. Distributed Sens. Networks 11: 958190:1-958190:2 (2015) - [j97]Shi-Jinn Horng, Shiang-Feng Tzeng, Po-Hsian Huang, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Inf. Sci. 317: 48-66 (2015) - [j96]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Mohammad S. Obaidat:
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System. J. Medical Syst. 39(11): 137:1-137:20 (2015) - [j95]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Xiong Li:
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems. J. Medical Syst. 39(11): 140:1-140:21 (2015) - [j94]Shehzad Ashraf Chaudhry, Khalid Mahmood, Husnain Naqvi, Muhammad Khurram Khan:
An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography. J. Medical Syst. 39(11): 175 (2015) - [j93]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Neeraj Kumar:
An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. J. Medical Syst. 39(11): 180 (2015) - [j92]Adnan Akhunzada, Mehdi Sookhak, Nor Badrul Anuar, Abdullah Gani, Ejaz Ahmed, Muhammad Shiraz, Steven Furnell, Amir Hayat, Muhammad Khurram Khan:
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions. J. Netw. Comput. Appl. 48: 44-57 (2015) - [j91]Ejaz Ahmed, Abdullah Gani, Muhammad Khurram Khan, Rajkumar Buyya, Samee Ullah Khan:
Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges. J. Netw. Comput. Appl. 52: 154-172 (2015) - [j90]Lu Leng, Andrew Beng Jin Teoh, Ming Li, Muhammad Khurram Khan:
Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code. Multim. Tools Appl. 74(24): 11683-11701 (2015) - [j89]Wenfang Zhang, Xiaomin Wang, Muhammad Khurram Khan:
A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems. Secur. Commun. Networks 8(6): 937-951 (2015) - [j88]SK Hafizul Islam, Muhammad Khurram Khan, Ali M. Al-Khouri:
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur. Commun. Networks 8(13): 2214-2231 (2015) - [j87]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, Saru Kumari, Muhammad Khurram Khan:
An enhanced privacy preserving remote user authentication scheme with provable security. Secur. Commun. Networks 8(18): 3782-3795 (2015) - [j86]SK Hafizul Islam, Muhammad Khurram Khan, Mohammad S. Obaidat, Fahad T. Bin Muhaya:
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps. Wirel. Pers. Commun. 84(3): 2013-2034 (2015) - [j85]Baojun Huang, Muhammad Khurram Khan, Libing Wu, Fahad T. Bin Muhaya, Debiao He:
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 85(1): 225-240 (2015) - [j84]Xiong Li, Junguo Liao, Saru Kumari, Wei Liang, Fan Wu, Muhammad Khurram Khan:
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design. Wirel. Pers. Commun. 85(1): 263-288 (2015) - [c50]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan:
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. CyberSA 2015: 1-7 - [c49]Ala' F. A. Aburumman, Wei Jye Seo, Md. Rafiqul Islam, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering. SecureComm 2015: 649-664 - 2014
- [j83]Dongli Jia, Xintao Duan, Muhammad Khurram Khan:
Binary Artificial Bee Colony optimization using bitwise operation. Comput. Ind. Eng. 76: 360-365 (2014) - [j82]Saru Kumari, Muhammad Khurram Khan, Xiong Li:
An improved remote user authentication scheme with key agreement. Comput. Electr. Eng. 40(6): 1997-2012 (2014) - [j81]Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta:
More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96(9): 793-816 (2014) - [j80]Saru Kumari, Muhammad Khurram Khan:
Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'. Int. J. Commun. Syst. 27(12): 3939-3955 (2014) - [j79]Muhammad Khurram Khan, Saru Kumari:
An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j78]Debiao He, Muhammad Khurram Khan, Shuhua Wu:
On the Security of a RSA-based Certificateless Signature Scheme. Int. J. Netw. Secur. 16(1): 78-80 (2014) - [j77]Lu Leng, Andrew Beng Jin Teoh, Ming Li, Muhammad Khurram Khan:
Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition. Neurocomputing 131: 377-387 (2014) - [j76]Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, Abdullah S. Alghamdi:
Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System. J. Medical Syst. 38(1): 9997 (2014) - [j75]Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Muhammad Khurram Khan, Ankita Chaturvedi:
Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Medical Syst. 38(5): 41 (2014) - [j74]Dheerendra Mishra, Sourav Mukhopadhyay, Ankita Chaturvedi, Saru Kumari, Muhammad Khurram Khan:
Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(6): 24 (2014) - [j73]SK Hafizul Islam, Muhammad Khurram Khan:
Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems. J. Medical Syst. 38(10): 135 (2014) - [j72]Mehdi Sookhak, Hamid Talebian, Ejaz Ahmed, Abdullah Gani, Muhammad Khurram Khan:
A review on remote data auditing in single cloud server: Taxonomy and open issues. J. Netw. Comput. Appl. 43: 121-141 (2014) - [j71]Shi-Jinn Horng, Didi Rosiyadi, Pingzhi Fan, Xian Wang, Muhammad Khurram Khan:
An adaptive watermarking scheme for e-government document images. Multim. Tools Appl. 72(3): 3085-3103 (2014) - [j70]Muhammad Khurram Khan, Saru Kumari:
Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems". Secur. Commun. Networks 7(2): 399-408 (2014) - [j69]Lu Leng, Andrew Beng Jin Teoh, Ming Li, Muhammad Khurram Khan:
A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion. Secur. Commun. Networks 7(11): 1860-1871 (2014) - [j68]Saru Kumari, Mridul Kumar Gupta, Muhammad Khurram Khan, Xiong Li:
An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement. Secur. Commun. Networks 7(11): 1921-1932 (2014) - [j67]Saru Kumari, Muhammad Khurram Khan:
More secure smart card-based remote user password authentication scheme with user anonymity. Secur. Commun. Networks 7(11): 2039-2053 (2014) - [j66]Pei-wei Tsai, Muhammad Khurram Khan, Jeng-Shyang Pan, Bin-Yih Liao:
Interactive Artificial Bee Colony Supported Passive Continuous Authentication System. IEEE Syst. J. 8(2): 395-405 (2014) - [j65]Farzana Azam, Zeeshan Shafi Khan, Muhammad Sher, Khaled Alghathbar, Muhammad Khurram Khan:
Attack containment in mobile ad-hoc networks through fair distribution of processing resources. Telecommun. Syst. 55(1): 93-103 (2014) - [j64]Shi-Jinn Horng, Shiang-Feng Tzeng, Xian Wang, Shaojie Qiao, Xun Gong, Muhammad Khurram Khan:
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs. Wirel. Pers. Commun. 79(2): 1445-1454 (2014) - [c48]Muhammad Khurram Khan, Saru Kumari, Xiaomin Wang, Rahul Kumar:
Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme. DASC 2014: 125-128 - [c47]Abdelouahid Derhab, Abdelghani Bouras, Fahad Bin Muhaya, Muhammad Khurram Khan, Yang Xiang:
Spam Trapping System: Novel security framework to fight against spam botnets. ICT 2014: 467-471 - [c46]Saru Kumari, Muhammad Khurram Khan, Xiong Li, Rahul Kumar:
Notes on "a password-based remote user authentication scheme without smart card". ISBAST 2014: 116-119 - [c45]Xiong Li, Muhammad Khurram Khan, Saru Kumari, Junguo Liao, Wei Liang:
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture. ISBAST 2014: 120-123 - [c44]Fajri Kurniawan, Mohammed S. Khalil, Muhammad Khurram Khan, Yasser M. Alginahi:
DWT+LSB-based fragile watermarking method for digital Quran images. ISBAST 2014: 290-297 - [c43]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Hassan M. Elkamchouchi:
The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices. ITNG 2014: 196-200 - [c42]Lu Leng, Gang Liu, Ming Li, Muhammad Khurram Khan, Ali M. Al-Khouri:
Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint Preprocessing. ITNG 2014: 523-528 - 2013
- [j63]Fagen Li, Fahad Bin Muhaya, Muhammad Khurram Khan, Tsuyoshi Takagi:
Lattice-based signcryption. Concurr. Comput. Pract. Exp. 25(14): 2112-2122 (2013) - [j62]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji:
Cyber security using arabic captcha scheme. Int. Arab J. Inf. Technol. 10(1): 76-84 (2013) - [j61]Dongli Jia, Xintao Duan, Muhammad Khurram Khan:
An Efficient Binary Differential Evolution with Parameter Adaptation. Int. J. Comput. Intell. Syst. 6(2): 328-336 (2013) - [j60]Muhammad Khurram Khan, Yang Xiang, Shi-Jinn Horng, Hsiao-Hwa Chen:
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j59]Debiao He, Muhammad Khurram Khan:
Cryptanalysis of a key agreement protocol based on chaotic Hash. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 172-177 (2013) - [j58]Debiao He, Jianhua Chen, Wenbo Shi, Muhammad Khurram Khan:
On the security of an authentication scheme for multi-server architecture. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 288-296 (2013) - [j57]Muhammad Khurram Khan, Saru Kumari, Pitam Singh:
Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'. KSII Trans. Internet Inf. Syst. 7(5): 967-979 (2013) - [j56]Shi-Jinn Horng, Shiang-Feng Tzeng, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles. KSII Trans. Internet Inf. Syst. 7(6): 1512-1532 (2013) - [j55]Waleed Halboob, Ali Mamat, Ramlan Mahmod, Muhammad Khurram Khan:
Temporal, Delegable and Cheap Update Access control to published XML Documents. J. Comput. Sci. 9(4): 427-432 (2013) - [j54]Adeela Waqar, Asad Raza, Haider Abbas, Muhammad Khurram Khan:
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata. J. Netw. Comput. Appl. 36(1): 235-248 (2013) - [j53]Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao:
An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5): 1365-1371 (2013) - [j52]Shi-Jinn Horng, Ling-Yuan Hsu, Tianrui Li, Shaojie Qiao, Xun Gong, Hsien-Hsin Chou, Muhammad Khurram Khan:
Using Sorted Switching Median Filter to remove high-density impulse noises. J. Vis. Commun. Image Represent. 24(7): 956-967 (2013) - [j51]Shi-Jinn Horng, Didi Rosiyadi, Tianrui Li, Takao Terano, Minyi Guo, Muhammad Khurram Khan:
A blind image copyright protection scheme for e-government. J. Vis. Commun. Image Represent. 24(7): 1099-1105 (2013) - [j50]Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Jong-Hyouk Lee:
Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans. Consumer Electron. 59(4): 811-817 (2013) - [j49]Muhammad Khurram Khan:
Editorial - Chaotic cryptography and its applications in telecommunication systems. Telecommun. Syst. 52(2): 513-514 (2013) - [j48]Xiaomin Wang, Wei Guo, Wenfang Zhang, Muhammad Khurram Khan, Khaled Alghathbar:
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network. Telecommun. Syst. 52(2): 515-524 (2013) - [j47]Shi-Jinn Horng, Shiang-Feng Tzeng, Yi Pan, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET. IEEE Trans. Inf. Forensics Secur. 8(11): 1860-1875 (2013) - [c41]Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta, Fahad Bin Muhaya:
Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device. BICS 2013: 271-277 - [c40]Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao:
Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement. ISBAST 2013: 105-110 - [c39]Lu Leng, Andrew Beng Jin Teoh, Ming Li, Muhammad Khurram Khan:
Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code. ISBAST 2013: 230-234 - [c38]Fajri Kurniawan, Mohammed Sayim Khalil, Muhammad Khurram Khan:
Core-Point Detection on Camera-Based Fingerprint Image. ISBAST 2013: 241-246 - [c37]Saru Kumari, Fahad Bin Muhaya, Muhammad Khurram Khan, R. Kumar:
Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme". ISBAST 2013: 247-250 - [c36]Fajri Kurniawan, Mohammed Sayim Khalil, Muhammad Khurram Khan, Yasser M. Alginahi:
Authentication and Tamper Detection of Digital Holy Quran Images. ISBAST 2013: 291-296 - [c35]Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao:
Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards. ISBAST 2013 - [c34]Muhammad Khurram Khan, Debiao He:
Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard". TrustCom/ISPA/IUCC 2013: 1708-1710 - 2012
- [j46]Mahmoud E. Farfoura, Shi-Jinn Horng, Jui-Lin Lai, Ray-Shine Run, Rong-Jian Chen, Muhammad Khurram Khan:
A blind reversible method for watermarking relational databases based on a time-stamping protocol. Expert Syst. Appl. 39(3): 3185-3196 (2012) - [j45]Muhammad Khurram Khan:
High performance biometrics recognition algorithms and systems. Future Gener. Comput. Syst. 28(1): 210-211 (2012) - [j44]Lijun Yan, Jeng-Shyang Pan, Shu-Chuan Chu, Muhammad Khurram Khan:
Adaptively weighted sub-directional two-dimensional linear discriminant analysis for face recognition. Future Gener. Comput. Syst. 28(1): 232-235 (2012) - [j43]Fagen Li, Muhammad Khurram Khan:
A biometric identity-based signcryption scheme. Future Gener. Comput. Syst. 28(1): 306-310 (2012) - [j42]Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Abdullah, Mohammad Yazid Bin Idris:
Intrinsic authentication of multimedia objects using biometric data manipulation. Int. Arab J. Inf. Technol. 9(4): 336-342 (2012) - [j41]Didi Rosiyadi, Shi-Jinn Horng, Pingzhi Fan, Xian Wang, Muhammad Khurram Khan, Yi Pan:
Copyright Protection for E-Government Document Images. IEEE Multim. 19(3): 62-73 (2012) - [j40]Soo-Young Kang, Jong Hyuk Park, Muhammad Khurram Khan, Jin Kwak:
Study on the common criteria methodology for secure ubiquitous environment construction. J. Intell. Manuf. 23(4): 933-939 (2012) - [j39]Saru Kumari, Muhammad Khurram Khan, Rahul Kumar:
Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'. J. Medical Syst. 37(4): 9952 (2012) - [j38]Muhammad Khurram Khan, Saru Kumari:
An Authentication Scheme for Secure Access to Healthcare Services. J. Medical Syst. 37(4): 9954 (2012) - [j37]Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi:
Identity-based online/offline signcryption for low power devices. J. Netw. Comput. Appl. 35(1): 340-347 (2012) - [j36]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Tai-Hoon Kim, Hassan M. Elkamchouchi:
Mobile one-time passwords: two-factor authentication using mobile phones. Secur. Commun. Networks 5(5): 508-516 (2012) - [j35]Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan, Khaled Alghathbar:
Analysis of existing remote attestation techniques. Secur. Commun. Networks 5(9): 1062-1082 (2012) - [j34]Muhammad Khurram Khan, Debiao He:
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Secur. Commun. Networks 5(11): 1260-1266 (2012) - [c33]Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta:
Further cryptanalysis of 'A remote authentication scheme using mobile device'. CASoN 2012: 234-237 - [c32]Muhammad Khurram Khan, Debiao He:
Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol". ICDKE 2012: 243-249 - [c31]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan:
Detecting counterfeit-money using RFID-enabled mobile devices. ICITST 2012: 74-79 - [c30]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan:
Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes. ISBAST 2012: 77-81 - 2011
- [j33]Dongli Jia, Guoxin Zheng, Boyang Qu, Muhammad Khurram Khan:
A hybrid particle swarm optimization algorithm for high-dimensional problems. Comput. Ind. Eng. 61(4): 1117-1122 (2011) - [j32]Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar:
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'. Comput. Commun. 34(3): 305-309 (2011) - [j31]Ling-Yuan Hsu, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Yuh-Rau Wang, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen:
MTPSO algorithm for solving planar graph coloring problem. Expert Syst. Appl. 38(5): 5525-5531 (2011) - [j30]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen:
A fast RFID tag identification algorithm based on counter and stack. Expert Syst. Appl. 38(6): 6829-6838 (2011) - [j29]Ling-Yuan Hsu, Shi-Jinn Horng, Mingxing He, Pingzhi Fan, Tzong-Wann Kao, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen:
Mutual funds trading strategy based on particle swarm optimization. Expert Syst. Appl. 38(6): 7582-7602 (2011) - [j28]Yao-Lin Huang, Shi-Jinn Horng, Mingxing He, Pingzhi Fan, Tzong-Wann Kao, Muhammad Khurram Khan, Jui-Lin Lai, I-Hong Kuo:
A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization. Expert Syst. Appl. 38(7): 8014-8023 (2011) - [j27]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen, Adi Sutanto:
An efficient phishing webpage detector. Expert Syst. Appl. 38(10): 12018-12027 (2011) - [j26]Ray-Shine Run, Shi-Jinn Horng, Wei-Hung Lin, Tzong-Wann Kao, Pingzhi Fan, Muhammad Khurram Khan:
An efficient wavelet-tree-based watermarking method. Expert Syst. Appl. 38(12): 14357-14366 (2011) - [j25]Muhammad Khurram Khan, Jiashu Zhang, Khaled Alghathbar:
Challenge-response-based biometric image scrambling for secure personal identification. Future Gener. Comput. Syst. 27(4): 411-418 (2011) - [j24]Dongli Jia, Guoxin Zheng, Muhammad Khurram Khan:
An effective memetic differential evolution algorithm based on chaotic local search. Inf. Sci. 181(15): 3175-3187 (2011) - [j23]Shih-Ying Lin, Shi-Jinn Horng, Tzong-Wann Kao, Chin-Shyurng Fahn, Pingzhi Fan, Yuan-Hsin Chen, Muhammad Khurram Khan, Anu G. Bourgeois, Takao Terano:
3D block-based medial axis transform and chessboard distance transform based on dominance. Image Vis. Comput. 29(4): 272-285 (2011) - [j22]Muhammad Khurram Khan:
Research advances in data hiding for multimedia security. Multim. Tools Appl. 52(2-3): 257-261 (2011) - [j21]Hong Zhao, Hongxia Wang, Muhammad Khurram Khan:
Statistical analysis of several reversible data hiding algorithms. Multim. Tools Appl. 52(2-3): 277-290 (2011) - [j20]Xianfeng Guo, Jiashu Zhang, Muhammad Khurram Khan, Khaled Alghathbar:
Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks. Sensors 11(2): 1607-1619 (2011) - [j19]Hong Zhao, Hongxia Wang, Muhammad Khurram Khan:
Steganalysis for palette-based images using generalized difference image and color correlogram. Signal Process. 91(11): 2595-2605 (2011) - [j18]Muhammad Khurram Khan:
Guest editorial for special issue on biometric systems and applications. Telecommun. Syst. 47(3-4): 183-184 (2011) - [j17]Muhammad Khurram Khan, Khaled Alghathbar, Jiashu Zhang:
Privacy-preserving and tokenless chaotic revocable face authentication scheme. Telecommun. Syst. 47(3-4): 227-234 (2011) - [j16]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Jong Hyuk Park:
Energy Efficient Distributed Face Recognition in Wireless Sensor Network. Wirel. Pers. Commun. 60(3): 571-582 (2011) - [c29]Muhammad Khurram Khan, Pei-wei Tsai, Jeng-Shyang Pan, Bin-Yih Liao:
Biometric driven initiative system for passive continuous authentication. IAS 2011: 139-144 - [c28]Fahad Bin Muhaya, Muhammad Khurram Khan, Yang Xiang:
Polymorphic Malware Detection Using Hierarchical Hidden Markov Model. DASC 2011: 151-155 - [c27]M. Zubair Rafique, Nasser Alrayes, Muhammad Khurram Khan:
Application of evolutionary algorithms in detecting SMS spam at access layer. GECCO 2011: 1787-1794 - [c26]Lu Leng, Jiashu Zhang, Gao Chen, Muhammad Khurram Khan, Khaled Alghathbar:
Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition. ICCSA (5) 2011: 458-470 - [c25]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan:
OTP-Based Two-Factor Authentication Using Mobile Phones. ITNG 2011: 327-331 - [c24]M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar:
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms. ITNG 2011: 559-563 - [c23]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, Hassan M. Elkamchouchi:
Secure Instant Messaging Protocol for Centralized Communication Group. NTMS 2011: 1-4 - [c22]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan:
Information Security Awareness Campaign: An Alternate Approach. ISA 2011: 1-10 - [c21]M. Zubair Rafique, Muhammad Khurram Khan, Khaled Alghathbar, Muddassar Farooq:
Embedding High Capacity Covert Channels in Short Message Service (SMS). STA 2011: 1-10 - [c20]M. Zubair Rafique, Muhammad Khurram Khan, Khaled Alghathbar, Muddassar Farooq:
A Framework for Detecting Malformed SMS Attack. STA 2011: 11-20 - [c19]Lu Leng, Jiashu Zhang, Gao Chen, Muhammad Khurram Khan, Ping Bai:
Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion. STA 2011: 122-129 - [e4]Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, L. Javier García-Villalba, Kirk P. Arnett, Muhammad Khurram Khan:
Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 259, Springer 2011, ISBN 978-3-642-27188-5 [contents] - 2010
- [j15]Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee:
Chaos-based secure satellite imagery cryptosystem. Comput. Math. Appl. 60(2): 326-337 (2010) - [j14]Muhammad Khurram Khan, Ling Xie, Jiashu Zhang:
Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals. Digit. Signal Process. 20(1): 179-190 (2010) - [j13]Mohammed S. Khalil, Dzulkifli Bin Mohamad, Muhammad Khurram Khan, Qais Al-Nuzaili:
Fingerprint verification using statistical descriptors. Digit. Signal Process. 20(4): 1264-1273 (2010) - [j12]Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo:
Improvement of the Efficient Secret Broadcast Scheme. IEICE Trans. Inf. Syst. 93-D(12): 3396-3399 (2010) - [j11]Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo:
Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing. IEICE Trans. Inf. Syst. 93-D(12): 3400-3402 (2010) - [j10]Aneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya, Muhammad Sher, Muhammad Khurram Khan:
Information Sharing in Vehicular AdHoc Network. Int. J. Comput. Commun. Control 5(5): 892-899 (2010) - [j9]Muhammad Khurram Khan, Mohamed Kamel, Xudong Jiang:
Special issue on: Recent advances and future directions in biometrics personal identification. J. Netw. Comput. Appl. 33(3): 205-206 (2010) - [j8]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, Muhammad Khurram Khan, Kevin Octavius Sentosa:
Performance evaluation of score level fusion in multimodal biometric systems. Pattern Recognit. 43(5): 1789-1800 (2010) - [j7]Muhammad Khurram Khan, Khaled Alghathbar:
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'. Sensors 10(3): 2450-2459 (2010) - [j6]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Eun-suk Cho:
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem. Sensors 10(9): 8683-8695 (2010) - [c18]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf:
Face Recognition using Layered Linear Discriminant Analysis and Small Subspace. CIT 2010: 1407-1412 - [c17]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji:
Using Arabic CAPTCHA for Cyber Security. FGIT-SecTech/DRBC 2010: 8-17 - [c16]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar:
One-Time Password System with Infinite Nested Hash Chains. FGIT-SecTech/DRBC 2010: 161-170 - [c15]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar:
Contactless Biometrics in Wireless Sensor Network: A Survey. FGIT-SecTech/DRBC 2010: 236-243 - [c14]Lu Leng, Jiashu Zhang, Jing Xu, Muhammad Khurram Khan, Khaled Alghathbar:
Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. ICTC 2010: 467-471 - [c13]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar:
Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset. IIH-MSP 2010: 384-388 - [c12]Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar:
Security Analysis of Firewall Rule Sets in Computer Networks. SECURWARE 2010: 51-56 - [c11]Muhammad Khurram Khan, Khaled Alghathbar:
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'. AST/UCMA/ISA/ACN 2010: 55-60 - [e3]Chin-Chen Chang, Thanos Vasilakos, Purnendu Das, Tai-Hoon Kim, Byeong-Ho Kang, Muhammad Khurram Khan:
Advanced Communication and Networking - Second International Conference, ACN 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Communications in Computer and Information Science 77, 2010, ISBN 978-3-642-13404-3 [contents] - [e2]Tai-Hoon Kim, Haeng-Kon Kim, Muhammad Khurram Khan, Kiumi Akingbehin, Wai-Chi Fang, Dominik Slezak:
Advances in Software Engineering - International Conference, ASEA 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 117, Springer 2010, ISBN 978-3-642-17577-0 [contents] - [e1]Tai-Hoon Kim, Wai-Chi Fang, Muhammad Khurram Khan, Kirk P. Arnett, Heau-Jo Kang, Dominik Slezak:
Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 122, Springer 2010, ISBN 978-3-642-17609-8 [contents]
2000 – 2009
- 2009
- [c10]Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan:
Bio-chaotic Stream Cipher-Based Iris Image Encryption. CSE (2) 2009: 739-744 - [c9]Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar:
Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding). FGIT-BSBT 2009: 97-107 - [c8]Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan:
Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. ICIC (1) 2009: 1014-1024 - [c7]Muhammad Khurram Khan:
Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. NSS 2009: 420-424 - 2008
- [j5]Muhammad Khurram Khan, Jiashu Zhang:
Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71(13-15): 3026-3031 (2008) - 2007
- [j4]Muhammad Khurram Khan, Jiashu Zhang:
Improving the security of 'a flexible biometrics remote user authentication scheme'. Comput. Stand. Interfaces 29(1): 82-85 (2007) - [j3]Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhammad Khurram Khan:
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput. Stand. Interfaces 29(5): 507-512 (2007) - [c6]Muhammad Khurram Khan, Ling Xie, Jiashu Zhang:
Robust Hiding of Fingerprint-Biometric Data into Audio Signals. ICB 2007: 702-712 - [c5]Muhammad Khurram Khan, Jiashu Zhang:
An Intelligent Fingerprint-Biometric Image Scrambling Scheme. ICIC (2) 2007: 1141-1151 - 2006
- [j2]Muhammad Khurram Khan, Jiashu Zhang:
Pointing a Finger toward Standardized and Automated Biometrics. IEEE Multim. 13(4): 73-75 (2006) - [j1]Anthony D. Joseph, Alastair R. Beresford, Jean Bacon, David Naveen Cottingham, Jonathan J. Davies, Brian D. Jones, Haitao Guo, Wei Guan, Yong Lin, Houbing Song, Liviu Iftode, Simone Fuchs, Bernhard Lamprecht, Kyandoghere Kyamakya, Jorge González Fernández, Juan Carlos Yelmo García, Yod Samuel Martín García, Jorge de Gracia Santos, Milind Nimesh, Gang Pan, Zhaohui Wu, Qing Wu, Zhenyu Shan, Jie Sun, Jian Lu, Guoqing Yang, Muhammad Khurram Khan, Jiashu Zhang:
Intelligent Transportation Systems. IEEE Pervasive Comput. 5(4): 63-67 (2006) - [c4]Muhammad Khurram Khan, Jiashu Zhang:
Enhancing the Transmission Security of Content-Based Hidden Biometric Data. ISNN (2) 2006: 214-223 - [c3]Muhammad Khurram Khan, Jiashu Zhang:
An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. ISPEC 2006: 260-268 - 2005
- [c2]Muhammad Khurram Khan, Jiashu Zhang:
Securing Biometric Templates for Reliable Identity Authentication. ICIC (2) 2005: 723-732 - 2004
- [c1]Muhammad Khurram Khan, Jiashu Zhang, Lei Tian:
Protecting Biometric Data for Personal Identification. SINOBIOMETRICS 2004: 629-638
Coauthor Index
aka: Fahad T. Bin Muhaya
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint