Muhammad Sher

According to our database1, Muhammad Sher authored at least 73 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN.
Peer Peer Netw. Appl., 2020

2019
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre.
IEEE Syst. J., 2019

Fisher score and Matthews correlation coefficient-based feature subset selection for heart disease diagnosis using support vector machines.
Knowl. Inf. Syst., 2019

2018
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data.
J. Supercomput., 2018

An improved and robust biometrics-based three factor authentication scheme for multiserver environments.
J. Supercomput., 2018

An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multim. Tools Appl., 2018

A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multim. Tools Appl., 2018

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
KSII Trans. Internet Inf. Syst., 2018

Automated multi-feature human interaction recognition in complex environment.
Comput. Ind., 2018

2017
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
Wirel. Pers. Commun., 2017

Handover Based IMS Registration Scheme for Next Generation Mobile Networks.
Wirel. Commun. Mob. Comput., 2017

An improved and provably secure privacy preserving authentication protocol for SIP.
Peer Peer Netw. Appl., 2017

A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme.
Multim. Tools Appl., 2017

Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network.
J. Comput. Networks Commun., 2017

Flow-based intrusion detection: Techniques and challenges.
Comput. Secur., 2017

Applying One-Class Classification Techniques to IP Flow Records for Intrusion Detection.
Balt. J. Mod. Comput., 2017

2016
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre.
J. Supercomput., 2016

Energy efficient communication in body area networks using collaborative communication in Rayleigh fading channel.
Telecommun. Syst., 2016

Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks.
Sensors, 2016

Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks.
J. Sensors, 2016

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services.
KSII Trans. Internet Inf. Syst., 2016

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture.
KSII Trans. Internet Inf. Syst., 2016

Conversion of Legal Text to a Logical Rules Set from Medical Law Using the Medical Relational Model and the World Rule Model for a Medical Decision Support System.
Informatics, 2016

A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography.
Electron. Commer. Res., 2016

2015
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2015

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography.
Multim. Tools Appl., 2015

Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems.
J. Medical Syst., 2015

Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks.
Int. J. Distributed Sens. Networks, 2015

Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment.
IACR Cryptol. ePrint Arch., 2015

Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning.
Proceedings of the Enterprise Security - Second International Workshop, 2015

A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Attack containment in mobile ad-hoc networks through fair distribution of processing resources.
Telecommun. Syst., 2014

A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme.
Secur. Commun. Networks, 2014

Database workload management through CBR and fuzzy based characterization.
Appl. Soft Comput., 2014

Workload management: a technology perspective with respect to self-* characteristics.
Artif. Intell. Rev., 2014

ACE: Adaptive Cooperation in EEDBR for Underwater Wireless Sensor Networks.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

CoDBR: Cooperative Depth Based Routing for Underwater Wireless Sensor Networks.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
Editorial "Secure Multimedia Communication in Vehicular Adhoc Network".
Multim. Tools Appl., 2013

On The Limits Of Perfect Security For Steganographic System.
CoRR, 2013

Comparison of glacier change detection using pixel based and object based classification techniques.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

2012
A survey of dynamic replication strategies for improving data availability in data grids.
Future Gener. Comput. Syst., 2012

System Analysis and Modeling Using SysML.
Proceedings of the International Conference on IT Convergence and Security, 2012

Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem.
Proceedings of the Information Systems, Technology and Management, 2012

2011
Presence Based Secure Instant Messaging Mechanism for IP Multimedia Subsystem.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

2010
Sensor Based Framework for Secure Multimedia Communication in VANET.
Sensors, 2010

HMM and fuzzy logic: A hybrid approach for online Urdu script-based languages' character recognition.
Knowl. Based Syst., 2010

Enhanced Relevance-Based Approach for Network Controls.
Informatica (Slovenia), 2010

Information Sharing in Vehicular AdHoc Network.
Int. J. Comput. Commun. Control, 2010

State Of The Art In Digital Steganography Focusing ASCII Text Documents
CoRR, 2010

Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Autonomic View of Query Optimizers in Database Management Systems.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

Secure single packet IP Traceback mechanism to identify the source.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Issues of Security and Network Load in Presence - A Survey.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Autonomicity in Oracle Database Management System.
Proceedings of the International Conference on Data Storage and Data Engineering, 2010

2009
A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging.
Inf. Secur. J. A Glob. Perspect., 2009

Digital steganography for ASCII text documents Ph.D. research proposal.
Proceedings of the FIT '09, 2009

Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture.
Proceedings of the High Performance Computing and Applications, 2009

2008
Provisioning IMS-based seamless triple play services over different access networks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Performance analysis of TCP in VANETs by using 802.11e.
Proceedings of the 16th International Conference on Networks, 2008

Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
Secure Service Provisioning (SSP) framework for IP Multimedia Subsystem (IMS).
PhD thesis, 2007

A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications.
Comput. Networks, 2007

Mobile multimedia broadcasting vulnerability threats, attacks and security solutions.
Proceedings of the 9th IFIP International Conference on Mobile Wireless Communications Networks, 2007

Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model.
Proceedings of the The Second International Conference on Availability, 2007

2006
IT-Based Open Service Delivery Platforms for Mobile Networks.
Proceedings of the Handbook of Mobile Middleware., 2006

Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS).
J. Networks, 2006

Development of IMS Privacy & Security Framework for Open IMS Fokus Testbed.
J. Mobile Multimedia, 2006

Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks.
Proceedings of the Q2SWinet'06, 2006

Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS).
Proceedings of the The First International Conference on Availability, 2006

2005
Network Access Security Management (NASM) Model for Next Generation Mobile Telecommunication Networks.
Proceedings of the Mobility Aware Technologies and Applications, 2005

Security Associations Management (SAM) Model for IP Multimedia System (IMS).
Proceedings of the Network Control and Engineering for QoS, 2005

2004
Face Identification based on Biological Trait using Infrared Images after Cold Effect Enhancement and Sunglasses Filtering.
Proceedings of the 12-th International Conference in Central Europe on Computer Graphics, 2004


  Loading...