Haseeb Ahmad

According to our database1, Haseeb Ahmad authored at least 32 papers between 2014 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
A sketch is worth a thousand navigational instructions.
Auton. Robots, 2021

Pairing-Free for Public Key Encryption With Equality Test Scheme.
IEEE Access, 2021

2020
Sentiment analysis of extremism in social media from textual information.
Telematics Informatics, 2020

Image and command hybrid model for vehicle control using Internet of Vehicles.
Trans. Emerg. Telecommun. Technol., 2020

2019
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography.
KSII Trans. Internet Inf. Syst., 2019

A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
Comput. J., 2019

Attribute-Based Signcryption From Lattices in the Standard Model.
IEEE Access, 2019

The Experimental Investigation of the Influence of Gender in Enjoyment, Ease of use, Satisfaction, and Usefulness during Interaction in Gaming Environment.
Proceedings of the XX International Conference on Human Computer Interaction, 2019

2018
Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT.
Wirel. Commun. Mob. Comput., 2018

Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018

A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography.
Sensors, 2018

Primitives towards verifiable computation: a survey.
Frontiers Comput. Sci., 2018

Ligature based Urdu Nastaleeq sentence recognition using gated bidirectional long short term memory.
Clust. Comput., 2018

Quantifying team precedence in the game of cricket.
Clust. Comput., 2018

A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems.
IEEE Access, 2018

IoT based smart interaction framework for elearning.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

2017
Identifying Influential People Based on Interaction Strength.
J. Inf. Process. Syst., 2017

Prediction of Rising Venues in Citation Networks.
J. Adv. Comput. Intell. Intell. Informatics, 2017

Pairing-free equality test over short ciphertexts.
Int. J. Distributed Sens. Networks, 2017

Minimum length key in MST cryptosystems.
Sci. China Inf. Sci., 2017

Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing.
IEEE Access, 2017

Prediction of Rising Stars in the Game of Cricket.
IEEE Access, 2017

Minimal logarithmic signatures for one type of classical groups.
Appl. Algebra Eng. Commun. Comput., 2017

2016
Clustering by fast search and find of density peaks via heat diffusion.
Neurocomputing, 2016

Challenges of Fully Homomorphic Encryptions for the Internet of Things.
IEICE Trans. Inf. Syst., 2016

Construction of DNA codes by using algebraic number theory.
Finite Fields Their Appl., 2016

Public Key Encryption in Non-Abelian Groups.
CoRR, 2016

2015
Minimal Logarithmic Signatures for one type of Classical Groups.
CoRR, 2015

Minimal Logarithmic Signatures for Sporadic Groups.
CoRR, 2015

A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Fuzzy Clustering by Fast Search and Find of Density Peaks.
Proceedings of the International Conference on Identification, 2015

2014
All exceptional groups of lie type have minimal logarithmic signatures.
Appl. Algebra Eng. Commun. Comput., 2014


  Loading...