default search action
Ali Sajjad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Mamun I. Abu-Tair, Unsub Zia, Jamshed Memon, Bryan W. Scotney, Jorge Martínez Carracedo, Ali Sajjad:
Transparent Encryption for IoT Using Offline Key Exchange over Public Blockchains. AINA (4) 2024: 301-313 - 2023
- [j11]Unsub Zia, Mark McCartney, Bryan W. Scotney, Jorge Martínez, Ali Sajjad:
A resource efficient pseudo random number generator based on sawtooth maps for Internet of Things. Secur. Priv. 6(5) (2023) - [j10]Syed Muhammad Unsub Zia, Mark McCartney, Bryan W. Scotney, Jorge Martínez, Ali Sajjad:
A Novel Image Encryption Technique Using Multi-Coupled Map Lattice System with Generalized Symmetric Map and Adaptive Control Parameter. SN Comput. Sci. 4(1): 81 (2023) - 2022
- [j9]Shama Urooj, Ali Sajjad, Neelam Bano, Muhammad Mukarram:
Gutenberg and the MOOC. Int. J. Emerg. Technol. Learn. 17(12): 93-105 (2022) - [j8]Unsub Zia, Mark McCartney, Bryan W. Scotney, Jorge Martínez, Mamun I. AbuTair, Jamshed Memon, Ali Sajjad:
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. Int. J. Inf. Sec. 21(4): 917-935 (2022) - 2021
- [j7]Shahzaib Tahir, Hasan Tahir, Ali Sajjad, Muttukrishnan Rajarajan, Fawad Khan:
Privacy-preserving COVID-19 contact tracing using blockchain. J. Commun. Networks 23(5): 360-373 (2021) - [j6]Ruhma Tahir, Shahzaib Tahir, Hasan Tahir, Klaus D. McDonald-Maier, Gareth Howells, Ali Sajjad:
A novel ICMetric public key framework for secure communication. J. Netw. Comput. Appl. 195: 103235 (2021) - 2020
- [j5]David W. Chadwick, Wenjun Fan, Gianpiero Costantino, Rogério de Lemos, Francesco Di Cerbo, Ian Herwono, Mirko Manea, Paolo Mori, Ali Sajjad, Xiao-Si Wang:
A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Gener. Comput. Syst. 102: 710-722 (2020) - [j4]Shahzaib Tahir, Liutauras Steponkus, Sushmita Ruj, Muttukrishnan Rajarajan, Ali Sajjad:
A parallelized disjunctive query based searchable encryption scheme for big data. Future Gener. Comput. Syst. 109: 583-592 (2020) - [j3]Mamun I. Abu-Tair, Soufiene Djahel, Philip Perry, Bryan W. Scotney, Unsub Zia, Jorge Martínez Carracedo, Ali Sajjad:
Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study. Sensors 20(21): 6131 (2020) - [c25]Unsub Zia, Bryan W. Scotney, Mark McCartney, Jorge Martínez, Mamun I. AbuTair, Ali Sajjad:
A scalable and secure model for surveillance cameras in resource constrained IoT systems. ICCBDC 2020: 92-96
2010 – 2019
- 2019
- [j2]Shahzaib Tahir, Sushmita Ruj, Ali Sajjad, Muttukrishnan Rajarajan:
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment. Comput. Commun. 133: 102-114 (2019) - [c24]Maurizio Colombo, Rasool Asal, Quang Hieu Hieu, Fadi Ali El-Moussa, Ali Sajjad, Theo Dimitrakos:
Data Protection as a Service in the Multi-Cloud Environment. CLOUD 2019: 81-85 - [c23]Wenjun Fan, Joanna Ziembicka, Rogério de Lemos, David W. Chadwick, Francesco Di Cerbo, Ali Sajjad, Xiao-Si Wang, Ian Herwono:
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud. CSCloud/EdgeCom 2019: 74-80 - 2018
- [c22]Jorge Martínez Carracedo, Michael Milliken, Pushpinder Kaur Chouhan, Bryan W. Scotney, Zhiwei Lin, Ali Sajjad, Mark Shackleton:
Cryptography for Security in IoT. IoTSMS 2018: 23-30 - 2017
- [c21]Enrico Bacis, Marco Rosa, Ali Sajjad:
EncSwift and key management: An integrated approach in an industrial setting. CNS 2017: 483-486 - [c20]Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogério de Lemos:
An architecture for privacy-preserving sharing of CTI with 3rd party analysis services. ICITST 2017: 293-297 - [c19]Shahzaib Tahir, Muttukrishnan Rajarajan, Ali Sajjad:
A ranked searchable encryption scheme for encrypted data hosted on the Public Cloud. ICOIN 2017: 242-247 - [c18]Ruhma Tahir, Hasan Tahir, Ali Sajjad, Klaus D. McDonald-Maier:
A secure cloud framework for ICMetric based IoT health devices. ICC 2017: 171:1-171:10 - 2016
- [c17]Gery Ducatel, Joshua Daniel, Theo Dimitrakos, Fadi Ali El-Moussa, Robert Rowlingson, Ali Sajjad:
Managed security service distribution model. CCIS 2016: 404-408 - [c16]Mark Shackleton, Fadi Ali El-Moussa, Robert Rowlingson, Alex Healing, John Crowther, Joshua Daniel, Theo Dimitrakos, Ali Sajjad:
Deploying Visual Analytics Through a Multi-cloud Service Store with Encrypted Big Data (Short Paper). OTM Conferences 2016: 883-889 - 2015
- [b1]Ali Sajjad:
A secure and scalable communication framework for inter-cloud services. City University London, UK, 2015 - [j1]Ali Sajjad, Muttukrishnan Rajarajan, Andrea Zisman, Theo Dimitrakos:
A scalable and dynamic application-level secure communication framework for inter-cloud services. Future Gener. Comput. Syst. 48: 19-27 (2015) - [c15]Quang Hieu Vu, Maurizio Colombo, Rasool Asal, Ali Sajjad, Fadi Ali El-Moussa, Theo Dimitrakos:
Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment. CNS 2015: 638-642 - [c14]Joshua Daniel, Fadi Ali El-Moussa, Gery Ducatel, Pramod S. Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos:
Integrating Security Services in Cloud Service Stores. IFIPTM 2015: 226-239 - [c13]Pramod S. Pawar, Ali Sajjad, Theo Dimitrakos, David W. Chadwick:
Security-as-a-Service in Multi-cloud and Federated Cloud Environments. IFIPTM 2015: 251-261 - 2014
- [c12]Joshua Daniel, Theodosis Dimitrakos, Fadi Ali El-Moussa, Gery Ducatel, Pramod S. Pawar, Ali Sajjad:
Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store. CloudCom 2014: 1021-1026 - [c11]Ali Sajjad, Muttukrishnan Rajarajan, Theo Dimitrakos:
A Low-Overhead Secure Communication Framework for an Inter-cloud Environment. ICC 2014: 121-136 - 2012
- [c10]Ali Sajjad, Andrea Zisman, Muttukrishnan Rajarajan, Srijith K. Nair, Theo Dimitrakos:
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment. ICON 2012: 428-433
2000 – 2009
- 2009
- [c9]Muhammad Qasim Ali, Hassan Khan, Ali Sajjad, Syed Ali Khayam:
On achieving good operating points on an ROC plane using stochastic anomaly score prediction. CCS 2009: 314-323 - 2008
- [c8]Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam:
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. RAID 2008: 351-371 - 2005
- [c7]Hassan Jameel, Umar Kalim, Ali Sajjad, Sungyoung Lee, Taewoong Jeon:
Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments. EGC 2005: 932-941 - [c6]Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo Lee, Sungyoung Lee:
A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure. EUC Workshops 2005: 1225-1234 - [c5]Ali Sajjad, Hassan Jameel, Umar Kalim, Sangman Han, Young-Koo Lee, Sungyoung Lee:
AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure. ICAS/ICNS 2005: 73 - [c4]Umar Kalim, Hassan Jameel, Ali Sajjad, Sungyoung Lee:
Mobile-to-Grid Middleware: An Approach for Breaching the Divide Between Mobile and Grid Environments. ICN (1) 2005: 1-8 - [c3]Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajjad, Sungyoung Lee, Young-Koo Lee:
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values. ISM 2005: 674-679 - [c2]Umar Kalim, Hassan Jameel, Ali Sajjad, Sangman Han, Sungyoung Lee, Young-Koo Lee:
Framework of an Application-Aware Adaptation Scheme for Disconnected Operations. IWAN 2005: 218-223 - [c1]Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo Lee, Sungyoung Lee:
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing. NODe/GSEM 2005: 311-322
Coauthor Index
aka: Theo Dimitrakos
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint