مرور بر اساس تاریخ انتشار Muhammad Khurram Khan

Showing results 1 to 20 of 20
PreviewIssue DateTitleContributor(s)
2017Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G SystemsSiyu Lin; Linghe Kong; Qian Gao; Muhammad Khurram Khan; Zhangdui Zhong; Xi Jin; Peng Zeng
2017Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge ArchitecturesJunaid Shuja; Saad Mustafa; Raja Wasim Ahmad; Sajjad A. Madani; Abdullah Gani; Muhammad Khurram Khan
2017Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETsShiang-Feng Tzeng; Shi-Jinn Horng; Tianrui Li; Xian Wang; Po-Hsian Huang; Muhammad Khurram Khan
2017Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and CiphertextsVanga Odelu; Ashok Kumar Das; Muhammad Khurram Khan; Kim-Kwang Raymond Choo; Minho Jo
2017Fog Computing Over IoT: A Secure Deployment and Formal VerificationSamman Zahra; Masoom Alam; Qaisar Javaid; Abdul Wahid; Nadeem Javaid; Saif Ur Rehman Malik; Muhammad Khurram Khan
2017Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud ComputingMehdi Sookhak; F. Richard Yu; Ying He; Hamid Talebian; Nader Sohrabi Safa; Nan Zhao; Muhammad Khurram Khan; Neeraj Kumar
7565732.pdf.jpg2016Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptographyDebiao He; Huaqun Wang; Muhammad Khurram Khan; Lina Wang
2017Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and ChallengesLinghe Kong; Muhammad Khurram Khan; Fan Wu; Guihai Chen; Peng Zeng
2017On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of AgeZhe Liu; Xinyi Huang; Zhi Hu; Muhammad Khurram Khan; Hwajeong Seo; Lu Zhou
7738411.pdf.jpg2016On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc NetworkMahdi Zareei; Ehab Mahmoud Mohamed; Mohammad Hossein Anisi; César Vargas Rosales; Kazuya Tsukamoto; Muhammad Khurram Khan
2017Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification TechniqueAkande Sheriff Abiodun; Mohammad Hossein Anisi; Ihsan Ali; Adnan Akhunzada; Muhammad Khurram Khan
2017Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT EnvironmentMohammad Wazid; Ashok Kumar Das; Muhammad Khurram Khan; Abdulatif Al-Dhawailie Al-Ghaiheb; Neeraj Kumar; Athanasios V. Vasilakos
2017A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog ComputingSeyed Ahmad Soleymani; Abdul Hanan Abdullah; Mahdi Zareei; Mohammad Hossein Anisi; Cesar Vargas-Rosales; Muhammad Khurram Khan; Shidrokh Goudarzi
2017A software agent enabled biometric security algorithm for secure file access in consumer storage devicesRuhul Amin; R. Simon Sherratt; Debasis Giri; Sk Hafizul Islam; Muhammad Khurram Khan
7764293.pdf.jpg2016Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and ChallengesSuleman Khan; Abdullah Gani; Ainuddin Wahid Abdul Wahab; Ahmed Abdelaziz; Kwangman Ko; Muhammad Khurram Khan; Mohsen Guizani
2017Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1Linghe Kong; Kui Ren; Muhammad Khurram Khan; Qi Li; Ammar Rayes; Merouane Debbah; Yuichi Nakamura
2017Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2Linghe Kong; Kui Ren; Muhammad Khurram Khan; Qi Li; Ammar Rayes; Merouane Debbah; Yuichi Nakamura
2017Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-ArtSuleman Khan; Abdullah Gani; Ainuddin Wahid Abdul Wahab; Mohsen Guizani; Muhammad Khurram Khan
2017Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open IssuesAdnan Akhunzada; Muhammad Khurram Khan
7802631.pdf.jpg2016Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT AnalysisSuleman Khan; Abdullah Gani; Ainuddin Wahid Abdul Wahab; Salman Iqbal; Ahmed Abdelaziz; Omar Adil Mahdi; Abdelmuttlib Ibrahim Abdallaahmed; Muhammad Shiraz; Yusor Rafid Bahar Al-Mayouf; Ziar Khan; Kwangman Ko; Muhammad Khurram Khan; Victor Chang