Forty years of attacks on the RSA cryptosystem: A brief survey M Mumtaz, L Ping Journal of Discrete Mathematical Sciences and Cryptography 22 (1), 9-29, 2019 | 57 | 2019 |
Droidcc: A scalable clone detection approach for android applications to detect similarity at source code level J Akram, Z Shi, M Mumtaz, P Luo 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 34 | 2018 |
Universities services in the new social ecosystems: Using conversational agents to help teach information security risk analysis S Kowalski, R Hoffmann, R Jain, M Mumtaz SOTICS 2011, The First International Conference on Social Eco-Informatics, 91-94, 2011 | 24 | 2011 |
An RSA based authentication system for smart IoT environment M Mumtaz, J Akram, L Ping 2019 IEEE 21st International Conference on High Performance Computing and …, 2019 | 20 | 2019 |
DroidMD: An Efficient and Scalable Android Malware Detection Approach at Source Code Level PL J. Akram,M. Mumtaz,G. Jabeen International Journal of Information and Computer Security 15 ((2-3)), 299-321, 2021 | 13 | 2021 |
IBFET: Index‐based features extraction technique for scalable code clone detection at file level granularity J Akram, M Mumtaz, P Luo Software: Practice and Experience 50 (1), 22-46, 2020 | 12 | 2020 |
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code J Akram, Z Shi, M Mumtaz, L Ping The 30th International Conference on Software Engineering and Knowledge …, 2018 | 12 | 2018 |
Harmonic incursion at the point of common coupling due to small grid-connected power stations M Mumtaz, SI Khan, WA Chaudhry, ZA Khan Journal of Electrical Systems and Information Technology 2 (3), 368-377, 2015 | 8 | 2015 |
An improved cryptanalysis of large RSA decryption exponent with constrained secret key M Mumtaz, L Ping International Journal of Information and Computer Security (IJICS), 2021 | 5 | 2021 |
DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool. J Akram, Z Shi, M Mumtaz, P Luo J. Inf. Sci. Eng. 36 (1), 13-29, 2020 | 5 | 2020 |
Remarks on the Cryptanalysis of Common Prime RSA for IoT Constrained Low Power Devices M Majid, L Ping Information Sciences, 2020 | 4 | 2020 |
Cryptanalysis of a special case of RSA large decryption exponent using lattice basis reduction method M Mumtaz, L Ping 2021 IEEE 6th International Conference on Computer and Communication Systems …, 2021 | 2 | 2021 |
Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack M Mumtaz, P Luo Cryptology ePrint Archive, 2020 | 2 | 2020 |
Strong authentication protocol based on Java Crypto chips M Mumtaz, S Muftic, NB Abdullah Proceedings of the 5th IEEE International Conference on IT Convergence and …, 2015 | 2 | 2015 |
E_Universities Services in the new social eco-systems: Using Conversational Agents to help Teach Information Security Risk Analysis R Hoffman, S Kowalski, R Jain, M Mumtaz | 1 | 2013 |
E_Universities Services in the New Social Eco-systems: Security Risk Analysis: Using Conversational Agents to Help Teach Information Security Risk Analysis R Hoffmann, S Kowalski, R Jain, M Mumtaz | 1 | 2011 |
Industry 4.0: The Digital Revolution Unleashing Sustainable Supply Chains M Tayyab, M Mumtaz, NZ Jhanjhi, SM Muzammal Digital Transformation for Improved Industry and Supply Chain Performance, 54-69, 2024 | | 2024 |
Industry 4.0: The Digital Revolution Unleashing Sustainable Supply Chain SMM Muhammad Tayyab, Majid Mumtaz, Noor Zaman Jhanjhi Digital Transformation for Improved Industry and Supply Chain Performance, 421, 2024 | | 2024 |
Swarm Security: Tackling Threats in the Age of Drone Swarms M Tayyab, M Mumtaz, SM Muzammal, NZ Jhanjhi Cybersecurity Issues and Challenges in the Drone Industry, 324-342, 2024 | | 2024 |
Strong Authentication Protocol based on Java Crypto Chip as a Secure Element M Mumtaz, S Muftic, N bin Abdullah ASTESJ 1 (5), 21-26, 2016 | | 2016 |