default search action
Syed Husnain Abbas Naqvi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j29]Saeed Ullah Jan, Anwar Ghani, Abdulrahman Alzahrani, Muhammad Usman Tariq, Fahad Algarni, Syed Husnain Abbas Naqvi:
SKALP: Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing. Trans. Emerg. Telecommun. Technol. 35(9) (2024) - 2023
- [j28]Syed Muhammad Saqlain Shah, Javed I. Khan, Syed Husnain Abbas Naqvi, Anwar Ghani:
Symmetric mean binary pattern-based Pakistan sign language recognition using multiclass support vector machines. Neural Comput. Appl. 35(1): 949-972 (2023) - 2021
- [j27]Afzal Badshah, Anwar Ghani, Azeem Irshad, Husnain Naqvi, Saru Kumari:
Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost. Int. J. Commun. Syst. 34(3) (2021) - 2019
- [j26]Anwar Ghani, Syed Husnain Abbas Naqvi, Muhammad U. Ilyas, Muhammad Khurram Khan, Ali Hassan:
Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks Using Collaborative Communication. IEEE Access 7: 26558-26570 (2019) - [j25]Ghani Ur Rehman, Anwar Ghani, Muhammad Zubair, Syed Husnain Abbas Naqvi, Dhananjay Singh, Shad Muhammad:
IPS: Incentive and Punishment Scheme for Omitting Selfishness in the Internet of Vehicles (Iov). IEEE Access 7: 109026-109037 (2019) - [j24]Asif Nawaz, Sohail Asghar, Syed Husnain Abbas Naqvi:
A segregational approach for determining aspect sentiments in social media analysis. J. Supercomput. 75(5): 2584-2602 (2019) - 2018
- [j23]Saleem Zahid, Shahbaz Akhtar Abid, Nadir Shah, Syed Husnain Abbas Naqvi, Waqar Mehmood:
Distributed Partition Detection With Dynamic Replication Management in a DHT-Based MANET. IEEE Access 6: 18731-18746 (2018) - [j22]Syed Muhammad Saqlain Shah, Syed Husnain Abbas Naqvi, Imran Khan, Muhammad Ramzan, Zulqarnain, Hikmat Ullah Khan:
Shape Based Pakistan Sign Language Categorization Using Statistical Features and Support Vector Machines. IEEE Access 6: 59242-59252 (2018) - [j21]Khalid Mahmood, Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Xiong Li, Arun Kumar Sangaiah:
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 81: 557-565 (2018) - [j20]Khalid Mahmood, Xiong Li, Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Arun Kumar Sangaiah, Joel J. P. C. Rodrigues:
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Gener. Comput. Syst. 88: 491-500 (2018) - [j19]Khalid Mahmood, Husnain Naqvi, Bander A. Alzahrani, Zahid Mehmood, Azeem Irshad, Shehzad Ashraf Chaudhry:
An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment. Int. J. Commun. Syst. 31(18) (2018) - [j18]Azeem Irshad, Husnain Naqvi, Shehzad Ashraf Chaudhry, Muhammad Usman, Muhammad Shafiq, Omid Mir, Ambrina Kanwal:
Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme. Inf. Technol. Control. 47(3): 431-446 (2018) - [j17]Shehzad Ashraf Chaudhry, Husnain Naqvi, Muhammad Khurram Khan:
An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multim. Tools Appl. 77(5): 5503-5524 (2018) - [j16]Shehzad Ashraf Chaudhry, Husnain Naqvi, Mohammad Sabzinejad Farash, Taeshik Shon, Muhammad Sher:
An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J. Supercomput. 74(8): 3504-3520 (2018) - [j15]Azeem Irshad, Husnain Naqvi, Shehzad Ashraf Chaudhry, Shouket Raheem, Saru Kumari, Ambrina Kanwal, Muhammad Usman:
An efficient and secure design of multi-server authenticated key agreement protocol. J. Supercomput. 74(9): 4771-4797 (2018) - 2017
- [j14]Shehzad Ashraf Chaudhry, Husnain Naqvi, Muhammad Sher, Mohammad Sabzinejad Farash, Mahmood Ul Hassan:
An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Netw. Appl. 10(1): 1-15 (2017) - [j13]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, SK Hafizul Islam, Taeshik Shon:
A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks. Wirel. Pers. Commun. 93(2): 311-335 (2017) - [j12]Shehzad Ashraf Chaudhry, Husnain Naqvi, Khalid Mahmood, Hafiz Farooq Ahmad, Muhammad Khurram Khan:
An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 96(4): 5355-5373 (2017) - 2016
- [j11]Khalid Mahmood, Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Hafiz Farooq Ahmad:
A lightweight message authentication scheme for Smart Grid communications in power sector. Comput. Electr. Eng. 52: 114-124 (2016) - [j10]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, Muhammad Sher:
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res. 16(1): 113-139 (2016) - [j9]Imran Khan, Muhammad Sher, Javed I. Khan, Syed Muhammd Saqlain, Anwar Ghani, Syed Husnain Abbas Naqvi, Muhammad Usman Ashraf:
Conversion of Legal Text to a Logical Rules Set from Medical Law Using the Medical Relational Model and the World Rule Model for a Medical Decision Support System. Informatics 3(1): 2 (2016) - [j8]Anwar Ghani, Syed Husnain Abbas Naqvi, Muhammad Sher, Zeeshan Shafi Khan, Imran Khan, Muhammad Saqlain:
Energy efficient communication in body area networks using collaborative communication in Rayleigh fading channel. Telecommun. Syst. 63(3): 357-370 (2016) - [j7]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Husnain Naqvi, Mohammad Sabzinejad Farash:
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre. J. Supercomput. 72(4): 1623-1644 (2016) - 2015
- [j6]Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Muhammad Sher, Mohammad Sabzinejad Farash:
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems. J. Medical Syst. 39(6): 66:1-66:11 (2015) - [j5]Shehzad Ashraf Chaudhry, Khalid Mahmood, Husnain Naqvi, Muhammad Khurram Khan:
An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography. J. Medical Syst. 39(11): 175 (2015) - [j4]Shehzad Ashraf Chaudhry, Nizamuddin, Muhammad Sher, Anwar Ghani, Husnain Naqvi, Azeem Irshad:
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multim. Tools Appl. 74(5): 1711-1723 (2015) - [j3]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, Saru Kumari, Muhammad Khurram Khan:
An enhanced privacy preserving remote user authentication scheme with provable security. Secur. Commun. Networks 8(18): 3782-3795 (2015) - 2014
- [j2]Husnain Naqvi, Stevan M. Berber, Zoran A. Salcic:
Energy efficient collaborative communications in AWGN and Rayleigh fading channel in wireless sensor networks. Wirel. Commun. Mob. Comput. 14(14): 1382-1396 (2014) - 2010
- [j1]Husnain Naqvi, Stevan M. Berber, Zoran Salcic:
Energy efficient collaborative communication with imperfect phase synchronization and Rayleigh fading in wireless sensor networks. Phys. Commun. 3(2): 119-128 (2010)
Conference and Workshop Papers
- 2015
- [c8]Shehzad Ashraf Chaudhry, Khalid Mahmood, Husnain Naqvi, Muhammad Sher:
A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography. CIT/IUCC/DASC/PICom 2015: 1960-1965 - 2010
- [c7]Syed Husnain Abbas Naqvi, Stevan M. Berber, Zoran Salcic:
Energy Efficient MISO Collaborative Communication System in AWGN and Rayleigh Fading Channel. GLOBECOM 2010: 1-5 - [c6]Husnain Naqvi, Stevan M. Berber, Zoran A. Salcic:
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks. AST/UCMA/ISA/ACN 2010: 214-227 - 2009
- [c5]Husnain Naqvi, Muhammad Sulayman, Mehwish Riaz:
Adaptive Beamforming in Wireless Sensor Network in the Presence of Interference Sources. FGIT-FGCN 2009: 105-113 - [c4]Muhammad Sulayman, Mehwish Riaz, Husnain Naqvi, Muhammad Amir Aman:
Using Area-Team to Evaluate the Software Architecture for an Online Banking System: A Case Study. FGIT-ASEA 2009: 111-118 - [c3]Husnain Naqvi, Stevan M. Berber, Zoran A. Salcic:
Performance Analysis of Collaborative Communication with Imperfect Frequency Synchronization and AWGN in Wireless Sensor Networks. FGIT-FGCN 2009: 114-121 - [c2]Mehwish Riaz, Muhammad Sulayman, Husnain Naqvi:
Architectural Decay during Continuous Software Evolution and Impact of 'Design for Change' on Software Architecture. FGIT-ASEA 2009: 119-126 - [c1]Husnain Naqvi, Stevan M. Berber, Zoran Salcic:
Performance analysis of collaborative communication in the presence of phase errors and AWGN in wireless sensor networks. IWCMC 2009: 394-398
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint