Search

Your search keyword '"Muhammad Khurram"' showing total 264 results

Search Constraints

Start Over You searched for: Author "Muhammad Khurram" Remove constraint Author: "Muhammad Khurram" Topic computer Remove constraint Topic: computer
264 results on '"Muhammad Khurram"'

Search Results

1. Cybersecurity Digital Labels for Connected and Autonomous Vehicles

2. Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View

3. Fuzzy Based Hybrid Focus Value Estimation for Multi Focus Image Fusion

4. A Novel Auto-Annotation Technique for Aspect Level Sentiment Analysis

5. MHADBOR: AI-Enabled Administrative-Distance-Based Opportunistic Load Balancing Scheme for an Agriculture Internet of Things Network

6. On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing

7. Secure Distributed Mobile Volunteer Computing with Android

8. Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones

9. Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems

10. EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System

11. Augmenting Cybersecurity in Autonomous Vehicles: Innovative Recommendations for Aspiring Entrepreneurs

12. Verifiable dynamic ranked search with forward privacy over encrypted cloud data

13. Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios

14. A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things

15. Guest Editorial: Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures

16. Comments on 'Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC'

17. Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV

18. Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications

19. A New Remote Fuzzy User Password Authentication Scheme Using Sub-tree for Cloud Computing

20. Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies

21. ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things

22. A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems

23. Joint-learning segmentation in Internet of drones (IoD)-based monitor systems

24. PoRX: A reputation incentive scheme for blockchain consensus of IIoT

25. Comprehensive Review of Cybercrime Detection Techniques

26. DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain

27. Performance Analysis of the Probabilistic Models of ISM Data Traffic in Cognitive Radio Enabled Radio Environments

28. Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks

29. Hand-based multibiometric systems: state-of-the-art and future challenges

30. Comment on 'Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication'

31. A survey on the blockchain techniques for the Internet of Vehicles security

32. Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment

33. Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance

34. A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases

35. Data Preprocessing: A preliminary step for web data mining

36. g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices

37. Cloud-Based Wireless Body Area Networks: Managing Data for Better Health Care

38. An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment

39. Towards augmented proactive cyberthreat intelligence

40. A survey on privacy protection in blockchain system

41. Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session key Generation Scheme for Healthcare Applications

42. Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique

43. An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network

44. Digital Labels: Influencing Consumers Trust and Raising Cybersecurity Awareness for Adopting Autonomous Vehicles

45. Adaptive Container Scheduling in Cloud Data Centers: A Deep Reinforcement Learning Approach

46. Designing secure and lightweight user access to drone for smart city surveillance

47. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment

48. A secure and efficient public auditing scheme using RSA algorithm for cloud storage

49. A novel audio forensic data-set for digital multimedia forensics

50. On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

Catalog

Books, media, physical & digital resources