Ali Sajjad

Orcid: 0000-0003-0150-8060

According to our database1, Ali Sajjad authored at least 38 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Transparent Encryption for IoT Using Offline Key Exchange over Public Blockchains.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
A Novel Image Encryption Technique Using Multi-Coupled Map Lattice System with Generalized Symmetric Map and Adaptive Control Parameter.
SN Comput. Sci., 2023

A resource efficient pseudo random number generator based on sawtooth maps for Internet of Things.
Secur. Priv., 2023

2022
Gutenberg and the MOOC.
Int. J. Emerg. Technol. Learn., June, 2022

Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains.
Int. J. Inf. Sec., 2022

2021
A novel ICMetric public key framework for secure communication.
J. Netw. Comput. Appl., 2021

Privacy-preserving COVID-19 contact tracing using blockchain.
J. Commun. Networks, 2021

2020
Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study.
Sensors, 2020

A parallelized disjunctive query based searchable encryption scheme for big data.
Future Gener. Comput. Syst., 2020

A cloud-edge based data security architecture for sharing and analysing cyber threat information.
Future Gener. Comput. Syst., 2020

A scalable and secure model for surveillance cameras in resource constrained IoT systems.
Proceedings of the ICCBDC '20: 2020 4th International Conference on Cloud and Big Data Computing, 2020

2019
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment.
Comput. Commun., 2019

Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

Data Protection as a Service in the Multi-Cloud Environment.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
Cryptography for Security in IoT.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

2017
A secure cloud framework for ICMetric based IoT health devices.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

A ranked searchable encryption scheme for encrypted data hosted on the Public Cloud.
Proceedings of the 2017 International Conference on Information Networking, 2017

An architecture for privacy-preserving sharing of CTI with 3<sup>rd</sup> party analysis services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

EncSwift and key management: An integrated approach in an industrial setting.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Deploying Visual Analytics Through a Multi-cloud Service Store with Encrypted Big Data (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Managed security service distribution model.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
A secure and scalable communication framework for inter-cloud services.
PhD thesis, 2015

A scalable and dynamic application-level secure communication framework for inter-cloud services.
Future Gener. Comput. Syst., 2015

Security-as-a-Service in Multi-cloud and Federated Cloud Environments.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Integrating Security Services in Cloud Service Stores.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
A Low-Overhead Secure Communication Framework for an Inter-cloud Environment.
Proceedings of the Intelligent Cloud Computing - First International Conference, 2014

Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2012
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment.
Proceedings of the 18th IEEE International Conference on Networks, 2012

2009
On achieving good operating points on an ROC plane using stochastic anomaly score prediction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2005
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing.
Proceedings of the NODe 2005, 2005

Framework of an Application-Aware Adaptation Scheme for Disconnected Operations.
Proceedings of the Active and Programmable Networks, 2005

A Trust Model for Ubiquitous Systems based on Vectors of Trust Values.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

Mobile-to-Grid Middleware: An Approach for Breaching the Divide Between Mobile and Grid Environments.
Proceedings of the Networking, 2005

AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments.
Proceedings of the Advances in Grid Computing, 2005


  Loading...