Shamsher Ullah

Orcid: 0000-0002-8726-3123

According to our database1, Shamsher Ullah authored at least 15 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Homomorphic Cryptography Authentication Scheme to Eliminate Machine Tools Gaps in Industry 4.0.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
TORAS: Trustworthy Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs.
IEEE Syst. J., June, 2023

Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network.
Phys. Commun., April, 2023

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey.
Comput. Sci. Rev., February, 2023

A typology of secure multicast communication over 5 G/6 G networks.
Int. J. Inf. Sec., 2023

A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies.
IEEE Commun. Surv. Tutorials, 2023

2022
Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation.
Sensors, 2022

QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing.
Multim. Tools Appl., 2022

A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization.
J. Cloud Comput., 2022

A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments.
J. Inf. Secur. Appl., 2022

2021
Blind signcryption scheme based on hyper elliptic curves cryptosystem.
Peer-to-Peer Netw. Appl., 2021

NRIC: A Noise Removal Approach for Nonlinear Isomap Method.
Neural Process. Lett., 2021

2020
A novel trusted third party based signcryption scheme.
Multim. Tools Appl., 2020

2019
Kernel homomorphic encryption protocol.
J. Inf. Secur. Appl., 2019

2017
A Review of Signcryption Schemes Based on Hyper Elliptic Curve.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017


  Loading...