Abdul Ghafoor Abbasi

According to our database1, Abdul Ghafoor Abbasi authored at least 25 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Towards a verifiable and secure data sharing platform for livestock supply chain.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2020
Blockchain and edge computing-based architecture for participatory smart city applications.
Concurr. Comput. Pract. Exp., 2020

Creating a Traceable Product Story in Manufacturing Supply Chains Using IPFS.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

2019
Towards Trusted Security Context Exchange Protocol for SDN Based Low Latency Networks.
Proceedings of the Computer Safety, Reliability, and Security, 2019

2017
Towards a secure service provisioning framework in a Smart city environment.
Future Gener. Comput. Syst., 2017

VeidBlock: Verifiable Identity using Blockchain and Ledger in a Software Defined Network.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

2015
Secure Layered Architecture for Session Initiation Protocol Based on SIPSSO: Formally Proved by Scyther.
Proceedings of the 12th International Conference on Information Technology, 2015

Quantum Cryptography Trends: A Milestone in Information Security.
Proceedings of the Hybrid Intelligent Systems, 2015

2014
Towards Cloud Based Smart Cities Data Security and Privacy Management.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

A Secure Architecture for Inter-cloud Virtual Machine Migration.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA.
Proceedings of the SECRYPT 2014, 2014

Secure Virtual Machine Migration (SV2M) in Cloud Federation.
Proceedings of the SECRYPT 2014, 2014

2013
Assessment Criteria for Cloud Identity Management Systems.
Proceedings of the IEEE 19th Pacific Rim International Symposium on Dependable Computing, 2013

Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013

Secure and privacy enhanced email system as a cloud service.
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013

Assessment Criteria for Trust Models in Cloud Computing.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Security Aspects of Virtualization in Cloud Computing.
Proceedings of the Computer Information Systems and Industrial Management, 2013

A solution to Perceptual Aliasing through Probabilistic Fuzzy Logic and SIFT.
Proceedings of the 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2013

2011
CryptoNET : Generic Security Framework for Cloud Computing Environments.
PhD thesis, 2011

Security extensions of Windows environment based on FIPS 201 (PIV) smart card.
Proceedings of the 2011 World Congress on Internet Security, 2011

2009
A model and design of a security provider for Java applications.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

CryptoNET: Secure federation protocol and authorization policies for SMI.
Proceedings of the CRiSIS 2009, 2009

2006
Interoperability: IEEEE FIPA Compliant MAS with Web Services Resource Framework.
Proceedings of the iiWAS'2006, 2006

2004
SAGE: Next Generation Multi-Agent System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

Autonomous Cache-Provision Agreement for Scalability of Directory in MAS.
Proceedings of the 16th Eureopean Conference on Artificial Intelligence, 2004


  Loading...