Search Results - "Shamshad, Salman"

Refine Results
  1. 1

    A Neural Computing-Based Access Control Protocol for AI-Driven Intelligent Flying Vehicles in Industry 5.0-Assisted Consumer Electronics by Mahmood, Khalid, Tariq, Tayyaba, Sangaiah, Arun Kumar, Ghaffar, Zahid, Saleem, Muhammad Asad, Shamshad, Salman

    Published in IEEE transactions on consumer electronics (01-02-2024)
    “…The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry…”
    Get full text
    Journal Article
  2. 2

    A Provably Secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System by Mahmood, Khalid, Ferzund, Javed, Saleem, Muhammad Asad, Shamshad, Salman, Das, Ashok Kumar, Park, Youngho

    “…The emergence of contemporary technologies like cloud computing and the Internet of Things (IoT) has revolutionized the trends in the cyber world to serve…”
    Get full text
    Journal Article
  3. 3

    Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application With Blockchain-Based Authentication by Ayub, Muhammad Faizan, Li, Xiong, Mahmood, Khalid, Shamshad, Salman, Saleem, Muhammad Asad, Omar, Marwan

    Published in IEEE transactions on consumer electronics (01-02-2024)
    “…The development of the industrial Internet of Things and smart grid networks has emphasized the importance of secure smart grid communication for the future of…”
    Get full text
    Journal Article
  4. 4

    An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network by Saleem, Muhammad Asad, Li, Xiong, Ayub, Muhammad Faizan, Shamshad, Salman, Wu, Fan, Abbas, Haider

    “…The popularity of vehicles promotes the evolution of smart cities. This development makes vehicular ad-hoc network (VANET) a widely used inter-vehicular…”
    Get full text
    Journal Article
  5. 5

    Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System by Mahmood, Khalid, Shamshad, Salman, Ayub, Muhammad Faizan, Ghaffar, Zahid, Khan, Muhammad Khurram, Das, Ashok Kumar

    “…The epidemic growth of the Internet of Things (IoT) objects have revolutionized Maritime Transportation Systems (MTS). Though, it becomes challenging for the…”
    Get full text
    Journal Article
  6. 6

    Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET by Saleem, Muhammad Asad, Li, Xiong, Mahmood, Khalid, Shamshad, Salman, Ayub, Muhammad Faizan, Bashir, Ali Kashif, Omar, Marwan

    Published in IEEE transactions on consumer electronics (01-02-2024)
    “…Globally, the development of Intelligent Cyber-Physical Transportation Systems (ICTS) aims to tackle several challenges, including reducing traffic accidents…”
    Get full text
    Journal Article
  7. 7

    An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function by Badar, Hafiz Muhammad Sanaullah, Qadri, Salman, Shamshad, Salman, Ayub, Muhammad Faizan, Mahmood, Khalid, Kumar, Neeraj

    Published in IEEE transactions on smart grid (01-09-2021)
    “…Smart grid plays an important role in managing demand response management in modern smart city using Information and Communication Technologies (ICTs). In…”
    Get full text
    Journal Article
  8. 8

    Security Analysis on "A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems" by Saleem, Muhammad Asad, Shamshad, Salman, Ahmed, Shafiq, Ghaffar, Zahid, Mahmood, Khalid

    Published in IEEE systems journal (01-12-2021)
    “…The Internet of Things (IoT) facilitates different devices and objects to get connected with the Internet. This connectivity helps to switch data via various…”
    Get full text
    Journal Article
  9. 9

    A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System by Zia, Maryam, Obaidat, Mohammad S., Mahmood, Khalid, Shamshad, Salman, Saleem, Muhammad Asad, Chaudhry, Shehzad Ashraf

    “…Wireless Body Area Network (WBAN) is a vital application of the Internet of Things (IoT) that plays a significant role in gathering a patient's healthcare…”
    Get full text
    Journal Article
  10. 10

    A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance by Akram, Muhammad Wahid, Bashir, Ali Kashif, Shamshad, Salman, Saleem, Muhammad Asad, AlZubi, Ahmad Ali, Chaudhry, Shehzad Ashraf, Alzahrani, Bander A., Zikria, Yousaf Bin

    “…The rising popularity of ICT and the Internet has enabled Unmanned Aerial Vehicle (UAV) to offer advantageous assistance to Vehicular Ad-hoc Network (VANET),…”
    Get full text
    Journal Article
  11. 11

    Comments on “A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things” by Shamshad, Salman, Mahmood, Khalid, Kumari, Saru

    Published in Wireless personal communications (01-05-2020)
    “…The Internet of Things (IoT) introduces a novel model for the future internet that aims to offer communication between numerous interactive objects via…”
    Get full text
    Journal Article
  12. 12

    A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices by Ayub, Muhammad Faizan, Shamshad, Salman, Mahmood, Khalid, Islam, SK Hafizul, Parizi, Reza M., Choo, Kim-Kwang Raymond

    Published in IEEE transactions on consumer electronics (01-11-2020)
    “…Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary to…”
    Get full text
    Journal Article
  13. 13

    Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC" by Shamshad, Salman, Mahmood, Khalid, Kumari, Saru, Khan, Muhammad Khurram

    Published in IEEE systems journal (01-03-2021)
    “…The radical progress in web services has drained more attraction towards escalating the security of several applications that serve and interact with the…”
    Get full text
    Journal Article
  14. 14

    A Provably Secure and Lightweight Access Control Protocol for EI-based Vehicle to Grid Environment by Shamshad, Salman, Mahmood, Khalid, Shamshad, Usman, Hussain, Ibrar, Hussain, Shafiq, Das, Ashok Kumar

    Published in IEEE internet of things journal (15-09-2023)
    “…The Energy Internet (EI) presents a novel paradigm for renewable energy distribution that utilizes communication and computing technologies to revolutionize…”
    Get full text
    Journal Article
  15. 15

    Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment by Ahmed, Shafiq, Shamshad, Salman, Ghaffar, Zahid, Mahmood, Khalid, Kumar, Neeraj, Parizi, Reza M., Choo, Kim-Kwang Raymond

    Published in IEEE transactions on smart grid (01-11-2021)
    “…In this paper, we introduce a robust authentication protocol for Vehicle-to-Grid (V2G) communication through lightweight and secure cryptographic primitives…”
    Get full text
    Journal Article
  16. 16

    An Efficient Privacy-Preserving Authenticated Key Establishment Protocol for Health Monitoring in Industrial Cyber-Physical Systems by Shamshad, Salman, Mahmood, Khalid, Hussain, Shafiq, Garg, Sahil, Das, Ashok Kumar, Kumar, Neeraj, Rodrigues, Joel J. P. C.

    Published in IEEE internet of things journal (01-04-2022)
    “…Industry 5.0 is the automation, digitization, and data communication of the industrial procedure that comprises industrial cyber-physical systems (I-CPSs),…”
    Get full text
    Journal Article
  17. 17

    On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing by Shamshad, Salman, Rana, Minahil, Mahmood, Khalid, Khan, Muhammad Khurram, Obaidat, Mohammad S.

    Published in Wireless personal communications (01-05-2022)
    “…With the rapidly growing user experience and traffic growth requirements in the Mobile Edge Computing (MEC) environment, the conventional security protocols…”
    Get full text
    Journal Article
  18. 18

    Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication" by Mahmood, Khalid, Shamshad, Salman, Kumari, Saru, Khan, Muhammad Khurram, Obaidat, Mohammad S.

    Published in IEEE systems journal (01-03-2021)
    “…In the advanced technological world, vehicular communications are used in numerous business and safety applications for smart traffic management. With the help…”
    Get full text
    Journal Article
  19. 19

    An Identity-Based Authentication Protocol for the Telecare Medical Information System (TMIS) Using a Physically Unclonable Function by Shamshad, Salman, Ayub, Muhammad Faizan, Mahmood, Khalid, Rana, Minahil, Shafiq, Akasha, Rodrigues, Joel J. P.C.

    Published in IEEE systems journal (01-09-2022)
    “…Telecare Medical Information System (TMIS) encourages patients to securely exchange their health data with a remote medical server for real-time remote…”
    Get full text
    Journal Article
  20. 20

    An enhanced scheme for mutual authentication for healthcare services by Shamshad, Salman, Ayub, Muhammad Faizan, Mahmood, Khalid, Kumari, Saru, Chaudhry, Shehzad Ashraf, Chen, Chien-Ming

    Published in Digital communications and networks (01-04-2022)
    “…With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers fast and convenient healthcare services to patients at…”
    Get full text
    Journal Article