Search Results - "Badshah, Akhtar"

Refine Results
  1. 1

    Secure Internet of Vehicles (IoV) With Decentralized Consensus Blockchain Mechanism by Tu, Shanshan, Yu, Haoyu, Badshah, Akhtar, Waqas, Muhammad, Halim, Zahid, Ahmad, Iftekhar

    Published in IEEE transactions on vehicular technology (01-09-2023)
    “…The Internet of vehicles (IoV) is increasingly being used to realize the vision of intelligent transportation systems with the rapid development of computation…”
    Get full text
    Journal Article
  2. 2

    Network Intrusion Detection System (NIDS) Based on Pseudo-Siamese Stacked Autoencoders in Fog Computing by Tu, Shanshan, Waqas, Muhammad, Badshah, Akhtar, Yin, Mingxi, Abbas, Ghulam

    Published in IEEE transactions on services computing (01-11-2023)
    “…The proliferation of Internet of Things (IoT) devices in the 5G era has resulted in increased security vulnerabilities and zero-day attacks, underscoring the…”
    Get full text
    Journal Article
  3. 3

    AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation by Badshah, Akhtar, Waqas, Muhammad, Muhammad, Fazal, Abbas, Ghulam, Abbas, Ziaul Haq, Chaudhry, Shehzad Ashraf, Chen, Sheng

    “…The next-generation Internet of vehicles (IoVs) seamlessly connects humans, vehicles, roadside units (RSUs), and service platforms, to improve road safety,…”
    Get full text
    Journal Article
  4. 4

    USAF-IoD: Ultralightweight and Secure Authenticated Key Agreement Framework for Internet of Drones Environment by Badshah, Akhtar, Abbas, Ghulam, Waqas, Muhammad, Tu, Shanshan, Abbas, Ziaul Haq, Muhammad, Fazal, Chen, Sheng

    Published in IEEE transactions on vehicular technology (01-08-2024)
    “…The use of Internet of Drones (IoD) technology has surged across various domains such as logistics, surveying, industrial inspections, emergency response,…”
    Get full text
    Journal Article
  5. 5

    A Novel Framework for Smart Systems Using Blockchain-Enabled Internet of Things by Badshah, Akhtar, Waqas, Muhammad, Muhammad, Fazal, Abbas, Ghulam, Abbas, Ziaul Haq

    Published in IT professional (01-05-2022)
    “…The revolution brought about by intelligent Internet of Things (IoT) systems has impacted every sphere of life, including but not limited to smart healthcare,…”
    Get full text
    Journal Article
  6. 6

    A Provable Secure and Efficient Authentication Framework for Smart Manufacturing Industry by Hammad, Muhammad, Badshah, Akhtar, Abbas, Ghulam, Alasmary, Hisham, Waqas, Muhammad, Khan, Wasim Ahmed

    Published in IEEE access (01-01-2023)
    “…Smart manufacturing is transforming the manufacturing industry by enhancing productivity and quality, driving growth in the global economy. The Internet of…”
    Get full text
    Journal Article
  7. 7

    Drivers of COVID-19 Vaccine Uptake amongst Healthcare Workers (HCWs) in Nigeria by Agha, Sohail, Chine, Adaobi, Lalika, Mathias, Pandey, Samikshya, Seth, Aparna, Wiyeh, Alison, Seng, Alyssa, Rao, Nandan, Badshah, Akhtar

    Published in Vaccines (Basel) (11-10-2021)
    “…This study applied a behavioral lens to understand drivers of COVID-19 vaccination uptake among healthcare workers (HCWs) in Nigeria. The study used data from…”
    Get full text
    Journal Article
  8. 8

    Blockchain-Assisted Lightweight Authenticated Key Agreement Security Framework for Smart Vehicles-Enabled Intelligent Transportation System by Badshah, Akhtar, Abbas, Ghulam, Waqas, Muhammad, Muhammad, Fazal, Abbas, Ziaul Haq, Bilal, Muhammad, Song, Houbing

    “…Intelligent Transportation Systems (ITS) supported by smart vehicles have revolutionized modern transportation, offering a wide range of applications and…”
    Get full text
    Journal Article
  9. 9

    CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things by Tanveer, Muhammad, Badshah, Akhtar, Khan, Abd Ullah, Alasmary, Hisham, Chaudhry, Shehzad Ashraf

    Published in Internet of things (Amsterdam. Online) (01-10-2023)
    “…The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and…”
    Get full text
    Journal Article
  10. 10

    LAKE-BSG: Lightweight authenticated key exchange scheme for blockchain-enabled smart grids by Badshah, Akhtar, Waqas, Muhammad, Abbas, Ghulam, Muhammad, Fazal, Abbas, Ziaul Haq, Vimal, S., Bilal, Muhammad

    “…The Smart grid employs information and communication networks to collect data on energy production and consumption, and then utilize it to improve efficiency,…”
    Get full text
    Journal Article
  11. 11

    Building corporate sector partnerships. (techniques on how to take part in urban development programs and promotions of partnerships.) by Badshah, Akhtar

    Published in PM. Public Management (01-10-1997)
    “…Four cases of how corporations can take an active role in community development are presented. The cases include the Citra Niaga Urban Development Project…”
    Get full text
    Journal Article Trade Publication Article
  12. 12
  13. 13

    EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing by Tu, Shanshan, Badshah, Akhtar, Alasmary, Hisham, Waqas, Muhammad

    Published in IEEE transactions on mobile computing (01-05-2024)
    “…Wearable computing has shown tremendous potential to revolutionize and uplift the standard of our lives. However, researchers and field experts have often…”
    Get full text
    Magazine Article
  14. 14

    Enhancing Security in The Internet of Things Ecosystem using Reinforcement Learning and Blockchain by Badshah, Akhtar, Waqas, Muhammad, Tu, Shanshan, Abbas, Ghulam

    “…Internet of Things (IoT) is a promising technology that attains significant consideration in diverse industrial areas, i.e., agriculture, engineering,…”
    Get full text
    Conference Proceeding
  15. 15

    Blockchain Boundary Security Protection based on Trusted Computing by Wang, Xiaoping, Badshah, Akhtar, Tu, Shanshan, Waqas, Muhammad

    “…Blockchain has the characteristics of openness and decentralization and faces many security threats in application scenarios. Apply trusted computing…”
    Get full text
    Conference Proceeding
  16. 16

    Blockchain-Based Security Management Platform by Wang, Xiaoping, Badshah, Akhtar, Tu, Shanshan, Waqas, Muhammad

    “…As a new generation of information technology, blockchain plays an increasingly prominent role in social operation, bringing significant changes to the…”
    Get full text
    Conference Proceeding
  17. 17

    Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing by Tu, Shanshan, Huang, Fengming, Zhang, Shengju, Badshah, Akhtar, Alasmary, Hisham, Waqas, Muhammad

    “…Securing Internet of Things (IoT) devices in fog computing systems can be challenging due to the inherent limitations of IoT devices. For instance,…”
    Get full text
    Conference Proceeding
  18. 18

    Social Netwoks and Digital Security by Tabassam, Sehrish, Shah, Habib, Alghamdi, Kholoud, Badshah, Akhtar

    “…Social networks are of utmost popularity in current era. People from various age groups are part of them as it attracts the user and totally engage them. As…”
    Get full text
    Conference Proceeding
  19. 19
  20. 20