default search action
Shahzaib Tahir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2018
- [b1]Shahzaib Tahir:
Privacy preserving search in large encrypted databases. City University London, UK, 2018
Journal Articles
- 2024
- [j22]Aftab Akram, Fawad Khan, Shahzaib Tahir, Asif Iqbal, Syed Aziz Shah, Abdullah Baz:
Privacy Preserving Inference for Deep Neural Networks: Optimizing Homomorphic Encryption for Efficient and Secure Classification. IEEE Access 12: 15684-15695 (2024) - [j21]Muhammad Sheeraz, Muhammad Hanif Durad, Shahzaib Tahir, Hasan Tahir, Saqib Saeed, Abdullah Mohammed Almuhaideb:
Advancing Snort IPS to Achieve Line Rate Traffic Processing for Effective Network Security Monitoring. IEEE Access 12: 61848-61859 (2024) - [j20]Awais Javed, Imran Rashid, Shahzaib Tahir, Saqib Saeed, Abdullah Mohammed Almuhaideb, Khalid A. Alissa:
AdamW+: Machine Learning Framework to Detect Domain Generation Algorithms for Malware. IEEE Access 12: 79138-79150 (2024) - [j19]Sadia Hussain, Shahzaib Tahir, Asif Masood, Hasan Tahir:
Blockchain-Enabled Secure Communication Framework for Enhancing Trust and Access Control in the Internet of Vehicles (IoV). IEEE Access 12: 110992-111006 (2024) - [j18]Waqas Ajmal Khan, Fawad Khan, Shahzaib Tahir, Yinghui Zhang, Faisal Amjad, Jawad Ahmad:
HLSBD2: a quantum secure hybrid level source based data deduplication for the cloud. J. Ambient Intell. Humaniz. Comput. 15(1): 89-102 (2024) - 2023
- [j17]Musfirah Ihtasham, Shahzaib Tahir, Hasan Tahir, Anum Hasan, Aiman Sultan, Saqib Saeed, Omer F. Rana:
Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS). IEEE Access 11: 115204-115218 (2023) - [j16]Haroon Malik, Shahzaib Tahir, Hasan Tahir, Musfirah Ihtasham, Fawad Khan:
A homomorphic approach for security and privacy preservation of Smart Airports. Future Gener. Comput. Syst. 141: 500-513 (2023) - [j15]Aiman Sultan, Shahzaib Tahir, Hasan Tahir, Tayyaba Anwer, Fawad Khan, Muttukrishnan Rajarajan, Omer F. Rana:
A Novel Image-Based Homomorphic Approach for Preserving the Privacy of Autonomous Vehicles Connected to the Cloud. IEEE Trans. Intell. Transp. Syst. 24(2): 1936-1948 (2023) - 2022
- [j14]Zeeshan Zulkifl, Fawad Khan, Shahzaib Tahir, Mehreen Afzal, Waseem Iqbal, Abdul Rehman, Saqib Saeed, Abdullah Mohammed Almuhaideb:
FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs. IEEE Access 10: 15644-15656 (2022) - [j13]Muhammad Awais, Shahzaib Tahir, Fawad Khan, Hasan Tahir, Ruhma Tahir, Rabia Latif, Mir Yasir Umair:
A novel searchable encryption scheme to reduce the access pattern leakage. Future Gener. Comput. Syst. 133: 338-350 (2022) - [j12]Malik Hamza Murtaza, Hasan Tahir, Shahzaib Tahir, Zahoor Ahmed Alizai, Qaiser Riaz, Mehdi Hussain:
A portable hardware security module and cryptographic key generator. J. Inf. Secur. Appl. 70: 103332 (2022) - [j11]Faiqa Amjad, Fawad Khan, Shahzaib Tahir, Tahreem Yaqoob, Haider Abbas:
ENCVIDC: an innovative approach for encoded video content classification. Neural Comput. Appl. 34(21): 18685-18702 (2022) - [j10]Yasir Iqbal, Shahzaib Tahir, Hasan Tahir, Fawad Khan, Saqib Saeed, Abdullah Mohammed Almuhaideb, Adeel M. Syed:
A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine. Sensors 22(12): 4432 (2022) - 2021
- [j9]Shahzaib Tahir, Hasan Tahir, Ali Sajjad, Muttukrishnan Rajarajan, Fawad Khan:
Privacy-preserving COVID-19 contact tracing using blockchain. J. Commun. Networks 23(5): 360-373 (2021) - [j8]Ruhma Tahir, Shahzaib Tahir, Hasan Tahir, Klaus D. McDonald-Maier, Gareth Howells, Ali Sajjad:
A novel ICMetric public key framework for secure communication. J. Netw. Comput. Appl. 195: 103235 (2021) - [j7]Ahmed Raheeq Sultan, Imran Rashid, Fawad Khan, Shahzaib Tahir, Maruf Pasha, Aiman Sultan:
A new secure authentication based distance bounding protocol. PeerJ Comput. Sci. 7: e517 (2021) - [j6]Fawad Khan, Saad Khan, Shahzaib Tahir, Jawad Ahmad, Hasan Tahir, Syed Aziz Shah:
Granular Data Access Control with a Patient-Centric Policy Update for Healthcare. Sensors 21(10): 3556 (2021) - 2020
- [j5]Ahmed Yar Khan, Rabia Latif, Seemab Latif, Shahzaib Tahir, Gohar Batool, Tanzila Saba:
Malicious Insider Attack Detection in IoTs Using Data Analytics. IEEE Access 8: 11743-11753 (2020) - [j4]Shahzaib Tahir, Liutauras Steponkus, Sushmita Ruj, Muttukrishnan Rajarajan, Ali Sajjad:
A parallelized disjunctive query based searchable encryption scheme for big data. Future Gener. Comput. Syst. 109: 583-592 (2020) - 2019
- [j3]Zahoor Ahmed Alizai, Hasan Tahir, Malik Hamza Murtaza, Shahzaib Tahir, Klaus D. McDonald-Maier:
Key-Based Cookie-Less Session Management Framework for Application Layer Security. IEEE Access 7: 128544-128554 (2019) - [j2]Shahzaib Tahir, Sushmita Ruj, Ali Sajjad, Muttukrishnan Rajarajan:
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment. Comput. Commun. 133: 102-114 (2019) - [j1]Shahzaib Tahir, Sushmita Ruj, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan, Cornelius Glackin:
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data. IEEE Trans. Emerg. Top. Comput. 7(4): 530-544 (2019)
Conference and Workshop Papers
- 2024
- [c9]Haleemah Zia, Humza Naseer, Atif Ahmad, Shahzaib Tahir:
Building Dynamic Situation Awareness to Combat Evolving Cyber Threats: The Role of AI Resources. ACIS 2024 - 2023
- [c8]Muhammad Sharjeel Zareen, Shahzaib Tahir, Baber Aslam:
Authentication and Authorization of IoT Edge Devices Using Artificial Intelligence. IFIPIoT (1) 2023: 442-453 - 2021
- [c7]Asif Raza Kazmi, Mehreen Afzal, Haider Abbas, Shahzaib Tahir, Abdul Rauf:
Is Blockchain Overrated? EUC 2021: 187-192 - 2018
- [c6]Shahzaib Tahir, Muttukrishnan Rajarajan:
Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain Networks. iThings/GreenCom/CPSCom/SmartData 2018: 1628-1633 - [c5]Waqar Asif, Indranil Ghosh Ray, Shahzaib Tahir, Muttukrishnan Rajarajan:
Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations. SNPD 2018: 329-334 - 2017
- [c4]Cornelius Glackin, Gérard Chollet, Nazim Dugan, Nigel Cannings, Julie A. Wall, Shahzaib Tahir, Indranil Ghosh Ray, Muttukrishnan Rajarajan:
Privacy preserving encrypted phonetic search of speech data. ICASSP 2017: 6414-6418 - [c3]Shahzaib Tahir, Muttukrishnan Rajarajan, Ali Sajjad:
A ranked searchable encryption scheme for encrypted data hosted on the Public Cloud. ICOIN 2017: 242-247 - [c2]Shahzaib Tahir, Sushmita Ruj, Muttukrishnan Rajarajan:
An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme. TrustCom/BigDataSE/ICESS 2017: 425-432 - 2014
- [c1]Shahzaib Tahir, Mehreen Afzal, Muhammad Tahir:
An ICMetric based key generation scheme for controlled group communication. IISA 2014: 373-378
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint