default search action
Bashir Alam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j23]Pranav Shrivastava, Bashir Alam, Mansaf Alam:
An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing. Clust. Comput. 27(10): 13675-13691 (2024) - [j22]Pranav Shrivastava, Bashir Alam, Mansaf Alam:
Blockchain assisted blind signature algorithm with data integrity verification scheme. Concurr. Comput. Pract. Exp. 36(13) (2024) - [j21]Pranav Shrivastava, Bashir Alam, Mansaf Alam:
A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing. Multim. Tools Appl. 83(1): 2683-2702 (2024) - 2023
- [j20]Pranav Shrivastava, Bashir Alam, Mansaf Alam:
Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud. Clust. Comput. 26(6): 3673-3688 (2023) - 2021
- [j19]Wakar Ahmad, Bashir Alam, Sanchit Ahuja, Sahil Malik:
A dynamic VM provisioning and de-provisioning based cost-efficient deadline-aware scheduling algorithm for Big Data workflow applications in a cloud environment. Clust. Comput. 24(1): 249-278 (2021) - [j18]Wakar Ahmad, Bashir Alam:
An efficient list scheduling algorithm with task duplication for scientific big data workflow in heterogeneous computing environments. Concurr. Comput. Pract. Exp. 33(5) (2021) - [j17]Om Pal, Bashir Alam, Vinay Thakur, Surendra Singh:
Key management for blockchain technology. ICT Express 7(1): 76-80 (2021) - [j16]Anshu Kumar Dwivedi, Pawan Singh Mehra, Om Pal, Mohammad Najmud Doja, Bashir Alam:
EETSP: Energy-efficient two-stage routing protocol for wireless sensor network-assisted Internet of Things. Int. J. Commun. Syst. 34(17) (2021) - [j15]Wakar Ahmad, Bashir Alam, Aman Atman:
An energy-efficient big data workflow scheduling algorithm under budget constraints for heterogeneous cloud environment. J. Supercomput. 77(10): 11946-11985 (2021) - 2020
- [j14]Om Pal, Bashir Alam:
Efficient and Secure Key Management for Conditional Access Systems. IEEE Trans. Consumer Electron. 66(1): 1-10 (2020) - 2019
- [j13]Pawan Singh Mehra, Mohammad Najmud Doja, Bashir Alam:
Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN. Int. J. Commun. Syst. 32(3) (2019) - [j12]Om Pal, Bashir Alam:
Efficient and secure conditional access system for pay-TV systems. Multim. Tools Appl. 78(13): 18835-18853 (2019) - [j11]Pawan Singh Mehra, Mohammad Najmud Doja, Bashir Alam:
Enhanced Clustering Algorithm based on Fuzzy Logic (E-CAFL) for WSN E-CAFL for Homogeneous WSN. Scalable Comput. Pract. Exp. 20(1): 41-54 (2019) - [j10]Pawan Singh Mehra, Mohammad Najmud Doja, Bashir Alam:
Stability Enhancement in LEACH (SE-LEACH) for Homogeneous WSN. EAI Endorsed Trans. Scalable Inf. Syst. 6(20): e5 (2019) - 2018
- [j9]Shweta Malhotra, Mohammad Najmud Doja, Bashir Alam, Mansaf Alam:
Skipnet-Octree Based Indexing Technique for Cloud Database Management System. Int. J. Inf. Technol. Web Eng. 13(3): 1-13 (2018) - [j8]Arvind Kumar, Bashir Alam:
Task Scheduling in Real Time Systems with Energy Harvesting and Energy Minimization. J. Comput. Sci. 14(8): 1126-1133 (2018) - 2017
- [j7]Shweta Malhotra, Mohammad Najmud Doja, Bashir Alam, Mansaf Alam:
E-GENMR: Enhanced Generalized Query Processing using Double Hashing Technique through MapReduce in Cloud Database Management System. J. Comput. Sci. 13(7): 234-246 (2017) - [j6]Vivek Sharma, Bashir Alam, Mohammad Najmud Doja:
ANFIS Aided AODV Routing Protocolfor Mobile Ad Hoc Networks. J. Comput. Sci. 13(10): 514-523 (2017) - 2014
- [j5]Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja:
A Refinement of Dijkstra's Algorithm for Extraction of Shortest Paths in generalized Real Time-multigraphs. J. Comput. Sci. 10(4): 593-603 (2014) - 2013
- [j4]Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja:
An Algorithm for Extracting Intuitionistic Fuzzy Shortest Path in a Graph. Appl. Comput. Intell. Soft Comput. 2013: 970197:1-970197:5 (2013) - [j3]Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja:
Generalization of Dijkstra's Algorithm for Extraction of Shortest Paths in Directed multigraphs. J. Comput. Sci. 9(3): 377-382 (2013) - [j2]Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja:
Real Time multigraphs for Communication Networks: an intuitionistic fuzzy Mathematical Model. J. Comput. Sci. 9(7): 847-855 (2013) - [j1]Bashir Alam:
Fuzzy Round Robin CPU Scheduling Algorithm. J. Comput. Sci. 9(8): 1079-1085 (2013)
Conference and Workshop Papers
- 2023
- [c2]Mohammad Basit, Bashir Alam, Zubaida Fatima, Salman Shaikh:
Natural Disaster Tweets Classification Using Multimodal Data. EMNLP 2023: 7584-7594 - [c1]Bashir Alam, Azmat Hussain, Muhammad Fayaz:
An Effective Approach for Air Quality Prediction in Bishkek Based on Machine Learning techniques. ICAAI 2023: 42-47
Informal and Other Publications
- 2016
- [i2]Shweta Malhotra, Mohammad Najmud Doja, Bashir Alam, Mansaf Alam:
GENMR: Generalized Query Processing through Map Reduce In Cloud Database Management System. CoRR abs/1603.08102 (2016) - 2014
- [i1]Musheer Ahmad, Bashir Alam, Omar Farooq:
Chaos Based Mixed Keystream Generation for Voice Data Encryption. CoRR abs/1403.4782 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint