Search Results - "Khurram, Muhammad"
-
1
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
Published in Sensors (Basel, Switzerland) (01-03-2010)“…User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor…”
Get full text
Journal Article -
2
An effective memetic differential evolution algorithm based on chaotic local search
Published in Information sciences (01-08-2011)“…This paper proposes an effective memetic differential evolution (DE) algorithm, or DECLS, that utilizes a chaotic local search (CLS) with a ‘shrinking’…”
Get full text
Journal Article -
3
Free‐Standing CoO‐POM Janus‐like Ultrathin Nanosheets
Published in Angewandte Chemie International Edition (25-05-2020)“…A single‐step solution‐based strategy is used to obtain 2D Janus‐like free‐standing ultrathin nanosheets build from two structurally unrelated species, that…”
Get full text
Journal Article -
4
Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions
Published in IEEE Communications surveys and tutorials (01-01-2018)“…Information-Centric Networking (ICN) is an appealing architecture that has received a remarkable interest from the research community thanks to its friendly…”
Get full text
Journal Article -
5
Trust Management Techniques for the Internet of Things: A Survey
Published in IEEE access (01-01-2019)“…A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of…”
Get full text
Journal Article -
6
An enhanced smart card based remote user password authentication scheme
Published in Journal of network and computer applications (01-09-2013)“…Smart card based password authentication is one of the simplest and efficient authentication mechanisms to ensure secure communication in insecure network…”
Get full text
Journal Article -
7
Enhanced Air Stability and High Li-Ion Conductivity of Li6.988P2.994Nb0.2S10.934O0.6 Glass–Ceramic Electrolyte for All-Solid-State Lithium–Sulfur Batteries
Published in ACS applied materials & interfaces (13-05-2020)“…The development of novel sulfide solid-state electrolytes with high Li-ion conductivity, excellent air-stability, and a stable electrode–electrolyte interface…”
Get full text
Journal Article -
8
On the Use of ON/OFF Traffic Models for Spatio-Temporal Analysis of Wireless Networks
Published in IEEE communications letters (01-07-2019)“…The spatial and temporal distribution of active users across a given region greatly affects the activity of base stations (BSs) and the cumulative interference…”
Get full text
Journal Article -
9
COVID-19 Pandemic and Department of Medicine, Rawalpindi Medical University
Published in Journal of Rawalpindi Medical College (23-06-2020)Get full text
Journal Article -
10
Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
Published in International journal of communication systems (01-12-2014)“…SUMMARY With the use of smart card in user authentication mechanisms, the concept of two‐factor authentication came into existence. This was a forward move…”
Get full text
Journal Article -
11
The Internet of Things: A Review of Enabled Technologies and Future Challenges
Published in IEEE access (2019)“…The Internet of Things (IoT) is an emerging classical model, envisioned as a system of billions of small interconnected devices for posing the state-of-the-art…”
Get full text
Journal Article -
12
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age
Published in IEEE transactions on dependable and secure computing (01-05-2017)“…Lightweight Elliptic Curve Cryptography (ECC) is a critical component for constructing the security system of Internet of Things (IoT). In this paper, we…”
Get full text
Journal Article -
13
Tax Salience: A Review of the Literature
Published in JISR Management and Social Sciences & Economics (30-12-2023)“…This study provides an understanding of tax salience through the review of the literature. The tax salience refers to the prominence and visibility of the…”
Get full text
Journal Article -
14
Performance Analysis of the Probabilistic Models of ISM Data Traffic in Cognitive Radio Enabled Radio Environments
Published in IEEE access (2020)“…Cognitive radio (CR) provides a way to utilize the radio resources in a smart manner. In order to exploit the benefits of CR technology either in CR systems or…”
Get full text
Journal Article -
15
A privacy preserving three-factor authentication protocol for e-Health clouds
Published in The Journal of supercomputing (01-10-2016)“…E-Health clouds are gaining increasing popularity by facilitating the storage and sharing of big data in healthcare. However, such an adoption also brings…”
Get full text
Journal Article -
16
Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things
Published in IEEE network (01-01-2018)“…The IoT is a novel platform for making objects more intelligent by connecting to the Internet. However, mass connections, big data processing, and huge power…”
Get full text
Journal Article -
17
Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art
Published in IEEE Communications surveys and tutorials (2017)“…The fundamental role of the software defined networks (SDNs) is to decouple the data plane from the control plane, thus providing a logically centralized…”
Get full text
Journal Article -
18
Engineering of Zirconium based metal-organic frameworks (Zr-MOFs) as efficient adsorbents
Published in Materials science & engineering. B, Solid-state materials for advanced technology (01-12-2020)“…Synthesis of porous materials is very attractive due to their various applications in era of water purification. The other advantage is due the structural and…”
Get full text
Journal Article -
19
A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing
Published in IEEE access (01-01-2017)“…In vehicular ad hoc networks (VANETs), trust establishment among vehicles is important to secure integrity and reliability of applications. In general, trust…”
Get full text
Journal Article -
20
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
Published in IEEE journal of biomedical and health informatics (01-07-2018)“…Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health-related…”
Get full text
Journal Article