Search Results - "Khurram, Muhammad"

Refine Results
  1. 1

    Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks' by Khan, Muhammad Khurram, Alghathbar, Khaled

    Published in Sensors (Basel, Switzerland) (01-03-2010)
    “…User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor…”
    Get full text
    Journal Article
  2. 2

    An effective memetic differential evolution algorithm based on chaotic local search by Jia, Dongli, Zheng, Guoxin, Khurram Khan, Muhammad

    Published in Information sciences (01-08-2011)
    “…This paper proposes an effective memetic differential evolution (DE) algorithm, or DECLS, that utilizes a chaotic local search (CLS) with a ‘shrinking’…”
    Get full text
    Journal Article
  3. 3

    Free‐Standing CoO‐POM Janus‐like Ultrathin Nanosheets by Akram, Bilal, Shi, Wenxiong, Zhang, Hao, Ullah, Shaheed, Khurram, Muhammad, Wang, Xun

    Published in Angewandte Chemie International Edition (25-05-2020)
    “…A single‐step solution‐based strategy is used to obtain 2D Janus‐like free‐standing ultrathin nanosheets build from two structurally unrelated species, that…”
    Get full text
    Journal Article
  4. 4

    Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions by Din, Ikram Ud, Hassan, Suhaidi, Khan, Muhammad Khurram, Guizani, Mohsen, Ghazali, Osman, Habbal, Adib

    Published in IEEE Communications surveys and tutorials (01-01-2018)
    “…Information-Centric Networking (ICN) is an appealing architecture that has received a remarkable interest from the research community thanks to its friendly…”
    Get full text
    Journal Article
  5. 5

    Trust Management Techniques for the Internet of Things: A Survey by Ud Din, Ikram, Guizani, Mohsen, Kim, Byung-Seo, Hassan, Suhaidi, Khurram Khan, Muhammad

    Published in IEEE access (01-01-2019)
    “…A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of…”
    Get full text
    Journal Article
  6. 6

    An enhanced smart card based remote user password authentication scheme by Li, Xiong, Niu, Jianwei, Khurram Khan, Muhammad, Liao, Junguo

    “…Smart card based password authentication is one of the simplest and efficient authentication mechanisms to ensure secure communication in insecure network…”
    Get full text
    Journal Article
  7. 7

    Enhanced Air Stability and High Li-Ion Conductivity of Li6.988P2.994Nb0.2S10.934O0.6 Glass–Ceramic Electrolyte for All-Solid-State Lithium–Sulfur Batteries by Ahmad, Niaz, Zhou, Lei, Faheem, Muhammad, Tufail, Muhammad Khurram, Yang, Le, Chen, Renjie, Zhou, Yaodan, Yang, Wen

    Published in ACS applied materials & interfaces (13-05-2020)
    “…The development of novel sulfide solid-state electrolytes with high Li-ion conductivity, excellent air-stability, and a stable electrode–electrolyte interface…”
    Get full text
    Journal Article
  8. 8

    On the Use of ON/OFF Traffic Models for Spatio-Temporal Analysis of Wireless Networks by Marvi, Murk, Aijaz, Adnan, Khurram, Muhammad

    Published in IEEE communications letters (01-07-2019)
    “…The spatial and temporal distribution of active users across a given region greatly affects the activity of base stations (BSs) and the cumulative interference…”
    Get full text
    Journal Article
  9. 9
  10. 10

    Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme' by Kumari, Saru, Khan, Muhammad Khurram

    “…SUMMARY With the use of smart card in user authentication mechanisms, the concept of two‐factor authentication came into existence. This was a forward move…”
    Get full text
    Journal Article
  11. 11

    The Internet of Things: A Review of Enabled Technologies and Future Challenges by Ud Din, Ikram, Guizani, Mohsen, Hassan, Suhaidi, Kim, Byung-Seo, Khurram Khan, Muhammad, Atiquzzaman, Mohammed, Ahmed, Syed Hassan

    Published in IEEE access (2019)
    “…The Internet of Things (IoT) is an emerging classical model, envisioned as a system of billions of small interconnected devices for posing the state-of-the-art…”
    Get full text
    Journal Article
  12. 12

    On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age by Liu, Zhe, Huang, Xinyi, Hu, Zhi, Khan, Muhammad Khurram, Seo, Hwajeong, Zhou, Lu

    “…Lightweight Elliptic Curve Cryptography (ECC) is a critical component for constructing the security system of Internet of Things (IoT). In this paper, we…”
    Get full text
    Journal Article
  13. 13

    Tax Salience: A Review of the Literature by Shabbir, Muhammad Khurram

    “…This study provides an understanding of tax salience through the review of the literature. The tax salience refers to the prominence and visibility of the…”
    Get full text
    Journal Article
  14. 14

    Performance Analysis of the Probabilistic Models of ISM Data Traffic in Cognitive Radio Enabled Radio Environments by Ehsan, Muhammad Khurram

    Published in IEEE access (2020)
    “…Cognitive radio (CR) provides a way to utilize the radio resources in a smart manner. In order to exploit the benefits of CR technology either in CR systems or…”
    Get full text
    Journal Article
  15. 15

    A privacy preserving three-factor authentication protocol for e-Health clouds by Jiang, Qi, Khan, Muhammad Khurram, Lu, Xiang, Ma, Jianfeng, He, Debiao

    Published in The Journal of supercomputing (01-10-2016)
    “…E-Health clouds are gaining increasing popularity by facilitating the storage and sharing of big data in healthcare. However, such an adoption also brings…”
    Get full text
    Journal Article
  16. 16

    Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things by Shichao Li, Ning Zhang, Siyu Lin, Linghe Kong, Katangur, Ajay, Khan, Muhammad Khurram, Minming Ni, Gang Zhu

    Published in IEEE network (01-01-2018)
    “…The IoT is a novel platform for making objects more intelligent by connecting to the Internet. However, mass connections, big data processing, and huge power…”
    Get full text
    Journal Article
  17. 17

    Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art by Khan, Suleman, Gani, Abdullah, Abdul Wahab, Ainuddin Wahid, Guizani, Mohsen, Khan, Muhammad Khurram

    “…The fundamental role of the software defined networks (SDNs) is to decouple the data plane from the control plane, thus providing a logically centralized…”
    Get full text
    Journal Article
  18. 18
  19. 19

    A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing by Ahmad Soleymani, Seyed, Hanan Abdullah, Abdul, Zareei, Mahdi, Hossein Anisi, Mohammad, Vargas-Rosales, Cesar, Khurram Khan, Muhammad, Goudarzi, Shidrokh

    Published in IEEE access (01-01-2017)
    “…In vehicular ad hoc networks (VANETs), trust establishment among vehicles is important to secure integrity and reliability of applications. In general, trust…”
    Get full text
    Journal Article
  20. 20

    Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment by Das, Ashok Kumar, Wazid, Mohammad, Kumar, Neeraj, Khan, Muhammad Khurram, Choo, Kim-Kwang Raymond, Park, YoungHo

    “…Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health-related…”
    Get full text
    Journal Article