Mazhar Ali

According to our database1, Mazhar Ali authored at least 26 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs.
Concurrency and Computation: Practice and Experience, 2019

2018
Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter.
IEEE Trans. Dependable Sec. Comput., 2018

DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security.
IEEE Trans. Cloud Computing, 2018

On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs).
IEEE Systems Journal, 2018

Mitigation and Improving SHA-1 Standard Using Collision Detection Approach.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

Techno-Economic Study of Electricity Generation from Wind at Kallar-Kahar Region in Pakistan.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

Convolutional Neural Networks as Means to Identify Apposite Sensor Combination for Human Activity Recognition.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

2017
DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party.
IEEE Trans. Cloud Computing, 2017

SeDaSC: Secure Data Sharing in Clouds.
IEEE Systems Journal, 2017

A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment.
Int. J. Communication Systems, 2017

2016
Personalized healthcare cloud services for disease risk assessment and wellness management using social media.
Pervasive and Mobile Computing, 2016

Security and Dependability of Cloud-Assisted Internet of Things.
IEEE Cloud Computing, 2016

Boosting the Accuracy of AdaBoost for Object Detection and Recognition.
Proceedings of the International Conference on Frontiers of Information Technology, 2016

2015
Security in cloud computing: Opportunities and challenges.
Inf. Sci., 2015

A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach.
J. Grid Comput., 2015

Merging of DHT-based logical networks in MANETs.
Trans. Emerging Telecommunications Technologies, 2015

3D-RP: A DHT-Based Routing Protocol for MANETs.
Comput. J., 2015

A Cloud Based Framework for Identification of Influential Health Experts from Twitter.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
Pirax: framework for application piracy control in mobile cloud environment.
The Journal of Supercomputing, 2014

Incremental proxy re-encryption scheme for mobile cloud computing environment.
The Journal of Supercomputing, 2014

BSS: block-based sharing scheme for secure data storage services in mobile cloud environment.
The Journal of Supercomputing, 2014

Evolution of Genuine Multipartite Entanglement of Specific and Random States Under non-Markovian Noise.
Open Syst. Inform. Dynam., 2014

A taxonomy and survey on Green Data Center Networks.
Future Generation Comp. Syst., 2014

A survey on energy-efficient methodologies and architectures of network-on-chip.
Computers & Electrical Engineering, 2014

2013
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing.
The Journal of Supercomputing, 2013

2007
The Jamiołkowski Isomorphism and a Simplified Proof for the Correspondence Between Vectors Having Schmidt Number k and k-Positive Maps.
Open Syst. Inform. Dynam., 2007


  Loading...