Azeem Irshad

Orcid: 0000-0002-1366-2834

According to our database1, Azeem Irshad authored at least 56 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Research on the evaluation method of English textbook readability based on the TextCNN model and its application in teaching design.
PeerJ Comput. Sci., 2024

SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks.
IEEE Access, 2024

2023
MCLA Task Offloading Framework for 5G-NR-V2X-Based Heterogeneous VECNs.
IEEE Trans. Intell. Transp. Syst., December, 2023

Energy efficient indoor localisation for narrowband internet of things.
CAAI Trans. Intell. Technol., December, 2023

SUSIC: A Secure User Access Control Mechanism for SDN-Enabled IIoT and Cyber-Physical Systems.
IEEE Internet Things J., September, 2023

An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics.
Wirel. Pers. Commun., March, 2023

Review: a comparative study of state-of-the-art skin image segmentation techniques with CNN.
Multim. Tools Appl., March, 2023

A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System.
IEEE Trans. Intell. Transp. Syst., February, 2023

BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment.
IEEE Access, 2023

2022
A low-cost privacy preserving user access in mobile edge computing framework.
Comput. Electr. Eng., 2022

2021
A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks.
Wirel. Pers. Commun., 2021

Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server.
IEEE Trans. Reliab., 2021

Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment.
ACM Trans. Internet Techn., 2021

A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework.
IEEE Syst. J., 2021

Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost.
Int. J. Commun. Syst., 2021

Comment on 'ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications'.
IET Networks, 2021

A Physical Capture Resistant Authentication Scheme for the Internet of Drones.
IEEE Commun. Stand. Mag., 2021

A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment.
Comput. Networks, 2021

2020
An Improved SIP Authenticated Key Agreement Based on Dongqing et al.
Wirel. Pers. Commun., 2020

A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT.
Int. J. Commun. Syst., 2020

An Improved Lightweight Authentication Protocol for Wireless Body Area Networks.
IEEE Access, 2020

2019
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre.
IEEE Syst. J., 2019

Ranked Sense Multiple Access Control Protocol for Multichannel Cognitive Radio-Based IoT Networks.
Sensors, 2019

Handshake Sense Multiple Access Control for Cognitive Radio-Based IoT Networks.
Sensors, 2019

An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol.
Inf. Technol. Control., 2019

Performance analysis of secure communications over correlated slow-fading additive white Gaussian noise channels.
Int. J. Commun. Syst., 2019

A provable and secure mobile user authentication scheme for mobile cloud computing services.
Int. J. Commun. Syst., 2019

Self-Citation Analysis on Google Scholar Dataset for H-Index Corrections.
IEEE Access, 2019

2018
An efficient and secure design of multi-server authenticated key agreement protocol.
J. Supercomput., 2018

Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks.
Sensors, 2018

Adaptive and Economically-Robust Group Selling of Spectrum Slots for Cognitive Radio-Based Networks.
Sensors, 2018

An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multim. Tools Appl., 2018

A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multim. Tools Appl., 2018

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
KSII Trans. Internet Inf. Syst., 2018

Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme.
Inf. Technol. Control., 2018

An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment.
Int. J. Commun. Syst., 2018

2017
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
Wirel. Pers. Commun., 2017

An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wirel. Pers. Commun., 2017

Comments on "A privacy preserving three-factor authentication protocol for e-health clouds".
J. Supercomput., 2017

A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme.
Multim. Tools Appl., 2017

An improved lightweight multiserver authentication scheme.
Int. J. Commun. Syst., 2017

2016
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre.
J. Supercomput., 2016

A provably secure anonymous authentication scheme for Session Initiation Protocol.
Secur. Commun. Networks, 2016

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services.
KSII Trans. Internet Inf. Syst., 2016

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture.
KSII Trans. Internet Inf. Syst., 2016

Extended state space recursive least squares.
Digit. Signal Process., 2016

2015
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2015

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography.
Multim. Tools Appl., 2015

Flexible and efficient aggregation framework for antifragile wireless mesh networks.
J. Reliab. Intell. Environ., 2015

Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment.
IACR Cryptol. ePrint Arch., 2015

2014
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme.
Secur. Commun. Networks, 2014

Skill Specific Spoken Dialogues Based Personalized ATM Design to Maximize Effective Interaction for Visually Impaired Persona.
Proceedings of the Design, User Experience, and Usability. User Experience Design Practice, 2014

2011
An Algorithm for Prediction of Overhead Messages in Client-Server Based Wireless Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

2010
Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

2009
Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN.
Proceedings of the High Performance Computing and Applications, 2009


  Loading...