default search action
Insaf Ullah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Muhammad Asghar Khan, Insaf Ullah, Neeraj Kumar, Fatemeh Afghah, Gordana Barb, Fazal Noor, Saad Alqahtany:
A Certificate-Based Ring Signcryption Scheme for Securing UAV-Enabled Private Edge Computing Systems. IEEE Access 12: 83466-83479 (2024) - [j36]Muhammad Asghar Khan, Shumaila Javaid, Syed Agha Hassnain Mohsan, Muhammad Tanveer, Insaf Ullah:
Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review. IEEE Open J. Commun. Soc. 5: 6849-6871 (2024) - 2023
- [j35]Asad Ullah Khan, Nadeem Javaid, Muhammad Asghar Khan, Insaf Ullah:
A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things. Clust. Comput. 26(2): 945-960 (2023) - [j34]Zainab Jamroz, Insaf Ullah, Bilal Hassan, Noor Ul Amin, Muhammad Asghar Khan, Pascal Lorenz, Nisreen Innab:
An Optimal Authentication Scheme through Dual Signature for the Internet of Medical Things. Future Internet 15(8): 258 (2023) - [j33]Asad Iqbal, Muhammad Zubair, Muhammad Asghar Khan, Insaf Ullah, Ghani Ur Rehman, Alexey V. Shvetsov, Fazal Noor:
An Efficient and Secure Certificateless Aggregate Signature Scheme for Vehicular Ad hoc Networks. Future Internet 15(8): 266 (2023) - [j32]Usman Ali, Mohd Yamani Idna Bin Idris, Jaroslav Frnda, Mohamad Nizam Bin Ayub, Muhammad Asghar Khan, Nauman Khan, T. Rehannara Beegum, Ahmed Abdulhadi Jasim, Insaf Ullah, Mohammad Babar:
Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for Internet of Things environment. Internet Things 24: 100923 (2023) - [j31]Tahir Ali Shah, Insaf Ullah, Muhammad Asghar Khan, Pascal Lorenz, Nisreen Innab:
An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things. J. Sens. Actuator Networks 12(1): 10 (2023) - [j30]Muhammad Asghar Khan, Insaf Ullah, Ako Muhammad Abdullah, Syed Agha Hassnain Mohsan, Fazal Noor:
An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones. Sensors 23(3): 1063 (2023) - [j29]Insaf Ullah, Muhammad Asghar Khan, Ako Muhammad Abdullah, Fazal Noor, Nisreen Innab, Chien-Ming Chen:
Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme. Sensors 23(3): 1121 (2023) - [j28]Muhammad Asghar Khan, Hosam Alhakami, Wajdi Alhakami, Alexey V. Shvetsov, Insaf Ullah:
A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System. Sensors 23(12): 5419 (2023) - [j27]Muhammad Asghar Khan, Neeraj Kumar, Syed Agha Hassnain Mohsan, Wali Ullah Khan, Moustafa M. Nasralla, Mohammed H. Alsharif, Justyna Zywiolek, Insaf Ullah:
Swarm of UAVs for Network Management in 6G: A Technical Review. IEEE Trans. Netw. Serv. Manag. 20(1): 741-761 (2023) - [j26]Insaf Ullah, Muhammad Asghar Khan, Neeraj Kumar, Ako Muhammad Abdullah, Abeer Abdul-Aziz Alsanad, Fazal Noor:
A Conditional Privacy Preserving Heterogeneous Signcryption Scheme for Internet of Vehicles. IEEE Trans. Veh. Technol. 72(3): 3989-3998 (2023) - 2022
- [j25]Insaf Ullah, Abdullah Alomari, Ako Muhammad Abdullah, Neeraj Kumar, Amjad Alsirhani, Fazal Noor, Saddam Hussain, Muhammad Asghar Khan:
Certificate-Based Signcryption Scheme for Securing Wireless Communication in Industrial Internet of Things. IEEE Access 10: 105182-105194 (2022) - [j24]Tahir Ali Shah, Fahad Algarni, Insaf Ullah, Ako Muhammad Abdullah, Fazal Noor, Muhammad Asghar Khan:
Cost-Efficient Privacy-Preserving Authentication and Key Management Scheme for Internet of Vehicle Ecosystem. Complex. 2022: 8406649:1-8406649:8 (2022) - [j23]Faisal Bahadur, Arif Iqbal Umar, Insaf Ullah, Fahad Algarni, Muhammad Asghar Khan:
The Double Edge Sword Based Distributed Executor Service. Comput. Syst. Sci. Eng. 42(2): 589-604 (2022) - [j22]Insaf Ullah, Muhammad Asghar Khan, Fazlullah Khan, Mian Ahmad Jan, Ram Srinivasan, Spyridon Mastorakis, Saddam Hussain, Hizbullah Khattak:
An Efficient and Secure Multimessage and Multireceiver Signcryption Scheme for Edge-Enabled Internet of Vehicles. IEEE Internet Things J. 9(4): 2688-2697 (2022) - [j21]Fazal Subhan, Suheel Abdullah Malik, Muhammad Asghar Khan, Muhammad Adnan Aziz, Muhammad Irfan Uddin, Insaf Ullah:
Numerical Investigation of Thin Film Flow of a Third-Grade Fluid on a Moving Belt Using Evolutionary Algorithm-Based Heuristic Technique. J. Circuits Syst. Comput. 31(1): 2250011:1-2250011:13 (2022) - [j20]Amna Ikram, Waqar Aslam, Roza Hikmat Hama Aziz, Fazal Noor, Ghulam Ali Mallah, Sunnia Ikram, Muhammad Saeed Ahmad, Ako Muhammad Abdullah, Insaf Ullah:
Crop Yield Maximization Using an IoT-Based Smart Decision. J. Sensors 2022: 1-15 (2022) - [j19]Muhammad Asghar Khan, Insaf Ullah, Ali Alkhalifah, Sajjad Ur Rehman, Jawad Ali Shah, Muhammad Irfan Uddin, Mohammed H. Alsharif, Fahad Algarni:
A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems. IEEE Trans. Ind. Informatics 18(5): 3416-3425 (2022) - [i1]Muhammad Asghar Khan, Neeraj Kumar, Syed Agha Hassnain Mohsan, Wali Ullah Khan, Moustafa M. Nasralla, Mohammed H. Alsharif, Justyna Zywiolek, Insaf Ullah:
Swarm of UAVs for Network Management in 6G: A Technical Review. CoRR abs/2210.03234 (2022) - 2021
- [j18]Usman Ali, Mohd Yamani Idna Bin Idris, Mohamad Nizam Bin Ayub, Insaf Ullah, Ihsan Ali, Tarak Nandy, Muktar Yahuza, Nauman Khan:
RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption. IEEE Access 9: 49942-49959 (2021) - [j17]Muhammad Asghar Khan, Habib Shah, Sajjad Ur Rehman, Neeraj Kumar, Rozaida Ghazali, Danish Shehzad, Insaf Ullah:
Securing Internet of Drones With Identity-Based Proxy Signcryption. IEEE Access 9: 89133-89142 (2021) - [j16]Insaf Ullah, Ali Alkhalifah, Sajjad Ur Rehman, Neeraj Kumar, Muhammad Asghar Khan:
An Anonymous Certificateless Signcryption Scheme for Internet of Health Things. IEEE Access 9: 101207-101216 (2021) - [j15]Muhammad Asghar Khan, Fazal Noor, Insaf Ullah, Sajjad Ur Rehman, Shibli Nisar, Mohaira Ahmad:
An Efficient Medium Access Control Mechanism for Flying Ad-hoc Networks. Comput. Syst. Sci. Eng. 38(1): 47-63 (2021) - [j14]Saddam Hussain, Insaf Ullah, Hizbullah Khattak, Muhammad Asghar Khan, Chien-Ming Chen, Saru Kumari:
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT). J. Inf. Secur. Appl. 58: 102625 (2021) - [j13]Insaf Ullah, Noor Ul Amin, Muhammad Asghar Khan, Hizbullah Khattak, Saru Kumari:
An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System. J. Medical Syst. 45(1): 4 (2021) - [j12]Insaf Ullah, Sherali Zeadally, Noor Ul Amin, Muhammad Asghar Khan, Hizbullah Khattak:
Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN). Microprocess. Microsystems 81: 103477 (2021) - [j11]Insaf Ullah, Ali Alkhalifah, Muhammad Asghar Khan, Samih Mohemmed Mostafa:
Cost-Effective Proxy Signcryption Scheme for Internet of Things. Mob. Inf. Syst. 2021: 2427434:1-2427434:10 (2021) - [j10]Muhammad Asghar Khan, Tanweer Ahmad Cheema, Insaf Ullah, Fazal Noor, Sajjad Ur Rehman, Ateeq Ur Rehman, Muhammad Adnan Aziz:
A Dual-Mode Medium Access Control Mechanism for UAV-Enabled Intelligent Transportation System. Mob. Inf. Syst. 2021: 5578490:1-5578490:13 (2021) - [j9]Muhammad Asghar Khan, Insaf Ullah, Neeraj Kumar, Omar Sami Oubbati, Ijaz Mansoor Qureshi, Fazal Noor, Fahim Ullah Khanzada:
An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks. IEEE Trans. Veh. Technol. 70(5): 4839-4851 (2021) - 2020
- [j8]Muhammad Asghar Khan, Insaf Ullah, Shibli Nisar, Fazal Noor, Ijaz Mansoor Qureshi, Fahim Ullah Khanzada, Noor Ul Amin:
An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network. IEEE Access 8: 36807-36828 (2020) - [j7]Saddam Hussain, Insaf Ullah, Hizbullah Khattak, Muhammad Adnan, Saru Kumari, Syed Sajid Ullah, Muhammad Asghar Khan, Shah Jahan Khattak:
A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid. IEEE Access 8: 93230-93248 (2020) - [j6]Syed Sajid Ullah, Insaf Ullah, Hizbullah Khattak, Muhammad Asghar Khan, Muhammad Adnan, Saddam Hussain, Noor Ul Amin, Muazzam Ali Khan Khattak:
A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things. IEEE Access 8: 98910-98928 (2020) - [j5]Insaf Ullah, Noor Ul Amin, Ahmad Almogren, Muhammad Asghar Khan, Muhammad Irfan Uddin, Qiaozhi Hua:
A Lightweight and Secured Certificate-Based Proxy Signcryption (CB-PS) Scheme for E-Prescription Systems. IEEE Access 8: 199197-199212 (2020) - [j4]Zahid Ullah, Asim Zeb, Insaf Ullah, Khalid Mahmood Awan, Yousaf Saeed, Muhammad Irfan Uddin, Mahmoud Ahmad Al-Khasawneh, Marwan Mahmoud, Mahdi Zareei:
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN). Mob. Inf. Syst. 2020: 4138516:1-4138516:13 (2020) - [j3]Muhammad Asghar Khan, Insaf Ullah, Shibli Nisar, Fazal Noor, Ijaz Mansoor Qureshi, Fahim Ullah Khanzada, Hizbullah Khattak, Muhammad Adnan Aziz:
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption. Mob. Inf. Syst. 2020: 8861947:1-8861947:15 (2020) - [j2]Manazara Rehman, Hizbullah Khattak, Ahmed Saeed Alzahrani, Insaf Ullah, Muhammad Adnan, Syed Sajid Ullah, Noor Ul Amin, Saddam Hussain, Shah Jahan Khattak:
A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking-Enabled Internet of Things. Wirel. Commun. Mob. Comput. 2020: 8857272:1-8857272:20 (2020)
2010 – 2019
- 2019
- [j1]Insaf Ullah, Noor Ul Amin, Mahdi Zareei, Asim Zeb, Hizbullah Khattak, Ajab Khan, Shidrokh Goudarzi:
A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications. Symmetry 11(11): 1386 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 01:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint