default search action
Abdul Nasir Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Abid Mehmood, Arslan Shafique, Moatsum Alawida, Abdul Nasir Khan:
Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques. IEEE Access 12: 27530-27555 (2024) - [j29]Sana Nasim Karam, Kashif Bilal, Abdul Nasir Khan, Junaid Shuja, Said Jadid Abdulkadir:
Energy-efficient routing protocol for reliable low-latency Internet of Things in oil and gas pipeline monitoring. PeerJ Comput. Sci. 10: e1908 (2024) - 2023
- [j28]Imtiaz Ali shah, Abid Mehmood, Abdul Nasir Khan, Mourad Elhadef, Atta ur Rehman Khan:
HeuCrip: a malware detection approach for internet of battlefield things. Clust. Comput. 26(2): 977-992 (2023) - [j27]Abid Mehmood, Arslan Shafique, Shehzad Ashraf Chaudhry, Moatsum Alawida, Abdul Nasir Khan, Neeraj Kumar:
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption. J. Inf. Secur. Appl. 78: 103590 (2023) - 2022
- [j26]Ehzaz Mustafa, Junaid Shuja, Sardar Khaliq uz Zaman, Ali Imran Jehangiri, Sadia Din, Faisal Rehman, Saad Mustafa, Tahir Maqsood, Abdul Nasir Khan:
Joint wireless power transfer and task offloading in mobile edge computing: a survey. Clust. Comput. 25(4): 2429-2448 (2022) - [j25]Adil Adeel, Mazhar Ali, Abdul Nasir Khan, Tauqeer Khalid, Faisal Rehman, Yaser Jararweh, Junaid Shuja:
A multi-attack resilient lightweight IoT authentication scheme. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j24]Muhammad Faisal Aziz, Abdul Nasir Khan, Junaid Shuja, Iftikhar Ahmed Khan, Fiaz Gul Khan, Atta ur Rehman Khan:
A lightweight and compromise-resilient authentication scheme for IoTs. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - 2021
- [j23]Tauqeer Khalid, Muhammad Abbas Khan Abbasi, Maria Zuraiz, Abdul Nasir Khan, Mazhar Ali, Raja Wasim Ahmad, Joel J. P. C. Rodrigues, Mudassar Aslam:
A survey on privacy and access control schemes in fog computing. Int. J. Commun. Syst. 34(2) (2021) - 2020
- [j22]Mudassar Aslam, Bushra Mohsin, Abdul Nasir Khan, Shahid Raza:
FoNAC - An automated Fog Node Audit and Certification scheme. Comput. Secur. 93: 101759 (2020) - [j21]Usman Ali Khan, Iftikhar Ahmed Khan, Ahmad Din, Waqas Jadoon, Rab Nawaz Jadoon, Muhammad Amir Khan, Fiaz Gul Khan, Abdul Nasir Khan:
Towards a Complete Set of Gym Exercises Detection Using Smartphone Sensors. Sci. Program. 2020: 6471438:1-6471438:12 (2020) - [j20]Muhammad Sohail Khan, Muhammad Faisal Abrar, Dohyeun Kim, Faiza Tila, Iftikhar Ahmed Khan, Junaid Shuja, Abdul Nasir Khan:
Resource-based direct manipulation: a user-centric visual interface for operational customization of future smart appliances. Telecommun. Syst. 75(3): 291-306 (2020)
2010 – 2019
- 2019
- [j19]Anum Khurshid, Abdul Nasir Khan, Fiaz Gul Khan, Mazhar Ali, Junaid Shuja, Atta ur Rehman Khan:
Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs. Concurr. Comput. Pract. Exp. 31(8) (2019) - [j18]Daniyal Sakhawat, Abdul Nasir Khan, Mudassar Aslam, Anthony T. Chronopoulos:
Agent-based ARP cache poisoning detection in switched LAN environments. IET Networks 8(1): 67-73 (2019) - [j17]Tauqeer Khalid, Abdul Nasir Khan, Mazhar Ali, Adil Adeel, Atta ur Rehman Khan, Junaid Shuja:
A fog-based security framework for intelligent traffic light control system. Multim. Tools Appl. 78(17): 24595-24615 (2019) - 2017
- [j16]Fiaz Gul Khan, Bartolomeo Montrucchio, Bilal Jan, Abdul Nasir Khan, Waqas Jadoon, Shahaboddin Shamshirband, Anthony Theodore Chronopoulos, Iftikhar Ahmed Khan:
An optimized magnetostatic field solver on GPU using open computing language. Concurr. Comput. Pract. Exp. 29(5) (2017) - [j15]Bilal Jan, Fiaz Gul Khan, Bartolomeo Montrucchio, Anthony Theodore Chronopoulos, Shahaboddin Shamshirband, Abdul Nasir Khan:
Introducing ToPe-FFT: An OpenCL-based FFT library targeting GPUs. Concurr. Comput. Pract. Exp. 29(21) (2017) - [j14]Sardar Khaliq uz Zaman, Atta ur Rehman Khan, Saif Ur Rehman Malik, Abdul Nasir Khan, Tahir Maqsood, Sajjad Ahmad Madani:
Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems. Comput. Syst. Sci. Eng. 32(3) (2017) - [j13]Abdul Nasir Khan, Mazhar Ali, Atta ur Rehman Khan, Fiaz Gul Khan, Iftikhar Ahmed Khan, Waqas Jadoon, Shahab Shamshirband, Anthony T. Chronopoulos:
A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment. Int. J. Commun. Syst. 30(16) (2017) - [j12]Atta ur Rehman Khan, Mazliza Othman, Abdul Nasir Khan, Junaid Shuja, Saad Mustafa:
Computation Offloading Cost Estimation in Mobile Cloud Application Models. Wirel. Pers. Commun. 97(3): 4897-4920 (2017) - 2015
- [j11]Atta ur Rehman Khan, Mazliza Othman, Feng Xia, Abdul Nasir Khan:
Context-Aware Mobile Cloud Computing and Its Challenges. IEEE Cloud Comput. 2(3): 42-49 (2015) - [j10]Atta ur Rehman Khan, Mazliza Othman, Abdul Nasir Khan, Shahbaz Akhtar Abid, Sajjad Ahmad Madani:
MobiByte: An Application Development Model for Mobile Cloud Computing. J. Grid Comput. 13(4): 605-628 (2015) - [j9]Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Shahaboddin Shamshirband, Atta ur Rehman Khan:
A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach. J. Grid Comput. 13(4): 651-675 (2015) - 2014
- [j8]Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petkovic, Sanjay Misra, Abdul Nasir Khan:
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J. Netw. Comput. Appl. 42: 102-117 (2014) - [j7]Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Mazhar Ali, Atta ur Rehman Khan, Shahaboddin Shamshirband:
Incremental proxy re-encryption scheme for mobile cloud computing environment. J. Supercomput. 68(2): 624-651 (2014) - [j6]Atta ur Rehman Khan, Mazliza Othman, Mazhar Ali, Abdul Nasir Khan, Sajjad Ahmad Madani:
Pirax: framework for application piracy control in mobile cloud environment. J. Supercomput. 68(2): 753-776 (2014) - [j5]Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Sajjad Ahmad Madani, Atta ur Rehman Khan, Shahaboddin Shamshirband:
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment. J. Supercomput. 70(2): 946-976 (2014) - [i2]Atta ur Rehman Khan, Mazliza Othman, Abdul Nasir Khan:
A Novel Application Licensing Framework for Mobile Cloud Environment. CoRR abs/1401.0034 (2014) - 2013
- [j4]Abdul Nasir Khan, Miss Laiha Mat Kiah, Samee Ullah Khan, Sajjad Ahmad Madani:
Towards secure mobile cloud computing: A survey. Future Gener. Comput. Syst. 29(5): 1278-1299 (2013) - [j3]Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Atta ur Rehman Khan, Mazhar Ali:
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J. Supercomput. 66(3): 1687-1706 (2013) - [i1]Atta ur Rehman Khan, Mazliza Othman, Abdul Nasir Khan, Imran Ali Khan:
Framework for Ubiquitous Social Networks. CoRR abs/1307.2953 (2013) - 2012
- [j2]Abdul Nasir Khan, Kalim Qureshi, Sumair Khan:
An intelligent approach of sniffer detection. Int. Arab J. Inf. Technol. 9(1): 9-15 (2012)
2000 – 2009
- 2009
- [j1]Abdul Nasir Khan, Kalim Qureshi, Sumair Khan:
Enhanced Switched Network Sniffer Detection Technique Based on IP Packet Routing. Inf. Secur. J. A Glob. Perspect. 18(4): 153-162 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint