Abid Khan

According to our database1, Abid Khan authored at least 46 papers between 1997 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions.
Computer Networks, 2019

2018
Towards ontology-based multilingual URL filtering: a big data problem.
The Journal of Supercomputing, 2018

Provenance Inference Techniques: Taxonomy, comparative analysis and design challenges.
J. Network and Computer Applications, 2018

Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits.
J. Network and Computer Applications, 2018

Structures and data preserving homomorphic signatures.
J. Network and Computer Applications, 2018

Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks.
Future Generation Comp. Syst., 2018

Secure policy execution using reusable garbled circuit in the cloud.
Future Generation Comp. Syst., 2018

Secure provenance using an authenticated data structure approach.
Computers & Security, 2018

An efficient privacy mechanism for electronic health records.
Computers & Security, 2018

RALBA: a computation-aware load balancing scheduler for cloud computing.
Cluster Computing, 2018

Detection of rank attack in routing protocol for Low Power and Lossy Networks.
Annales des Télécommunications, 2018

Improved Generalization for Secure Data Publishing.
IEEE Access, 2018

A Fault Tolerant Approach for Malicious URL Filtering.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Data trustworthiness in IoT.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
Congestion Detection and Alleviation in Multihop Wireless Sensor Networks.
Wireless Communications and Mobile Computing, 2017

Formal modeling and verification of security controls for multimedia systems in the cloud.
Multimedia Tools Appl., 2017

Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks.
J. Sensors, 2017

Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes.
J. Network and Computer Applications, 2017

Region based cooperative routing in underwater wireless sensor networks.
J. Network and Computer Applications, 2017

Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.
J. Network and Computer Applications, 2017

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.
Computers & Security, 2017

τ-safety: A privacy model for sequential publication with arbitrary updates.
Computers & Security, 2017

A high-level domain-specific language for SIEM (design, development and formal verification).
Cluster Computing, 2017

Towards a set aggregation-based data integrity scheme for smart grids.
Annales des Télécommunications, 2017

Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment.
IEEE Access, 2017

Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development.
IEEE Access, 2017

A trust management system model for cloud.
Proceedings of the 2017 International Symposium on Networks, Computers and Communications, 2017

Secure Logging as a Service Using Reversible Watermarking.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

2016
Sink-to-Sink Coordination Framework Using RPL: Routing Protocol for Low Power and Lossy Networks.
J. Sensors, 2016

Buyer seller watermarking protocols issues and challenges - A survey.
J. Network and Computer Applications, 2016

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs.
TIIS, 2016

Adaptive Reputation Weights Assignment Scheme for MANETs.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Aggregated Signatures for Chaining: A Secure Provenance Scheme.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Introducing Secure Provenance in IoT: Requirements and Challenges.
Proceedings of the 2016 International Workshop on Secure Internet of Things, 2016

A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Secure login protocols: An analysis on modern attacks and solutions.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

2013
REECH-ME: Regional Energy Efficient Cluster Heads Based on Maximum Energy Routing Protocol for WSNs.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2010
Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop.
Proceedings of the ARES 2010, 2010

2009
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS).
Proceedings of the Advances in Information Security and Assurance, 2009

CLUSMA: a mobile agent based clustering middleware for wireless sensor networks.
Proceedings of the FIT '09, 2009

Performance analysis of prioritized and non prioritized handoff call queuing schemes in mobile cellular networks.
Proceedings of the FIT '09, 2009

Mobile agent watermarking (MAW): security properties and attacks revisited.
Proceedings of the FIT '09, 2009

2008
On the security properties and attacks against Mobile agent watermark encapsulation(MAWE).
Proceedings of the IEEE International Conference on Systems, 2008

2007
Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A Novel Method of Watermarking Relational Databases using Character String.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2006

1997
Design and implementation of a software bridge with packet filtering and statistics collection functions.
Int. Journal of Network Management, 1997


  Loading...