Towards secure mobile cloud computing: A survey AN Khan, MLM Kiah, SU Khan, SA Madani Future Generation Computer Systems 29 (5), 1278-1299, 2013 | 541 | 2013 |
Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks S Shamshirband, NB Anuar, MLM Kiah, VA Rohani, D Petković, S Misra, ... Journal of Network and Computer Applications 42, 102-117, 2014 | 129 | 2014 |
Incremental proxy re-encryption scheme for mobile cloud computing environment AN Khan, MLM Kiah, SA Madani, M Ali, AR Khan, S Shamshirband The Journal of Supercomputing 68, 624-651, 2014 | 129 | 2014 |
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment AN Khan, MLM Kiah, M Ali, SA Madani, AUR Khan, S Shamshirband The journal of supercomputing 70, 946-976, 2014 | 85 | 2014 |
Joint wireless power transfer and task offloading in mobile edge computing: a survey E Mustafa, J Shuja, SK uz Zaman, AI Jehangiri, S Din, F Rehman, ... Cluster Computing 25 (4), 2429-2448, 2022 | 76 | 2022 |
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing AN Khan, ML Mat Kiah, SA Madani, AR Khan, M Ali The Journal of Supercomputing 66, 1687-1706, 2013 | 74 | 2013 |
Context-aware mobile cloud computing and its challenges M Othman, F Xia, AN Khan IEEE Cloud Computing 2 (3), 42-49, 2015 | 63 | 2015 |
MobiByte: an application development model for mobile cloud computing AUR Khan, M Othman, AN Khan, SA Abid, SA Madani Journal of Grid Computing 13, 605-628, 2015 | 56 | 2015 |
A survey on privacy and access control schemes in fog computing T Khalid, MAK Abbasi, M Zuraiz, AN Khan, M Ali, RW Ahmad, ... International Journal of Communication Systems 34 (2), e4181, 2021 | 52 | 2021 |
A multi‐attack resilient lightweight IoT authentication scheme A Adeel, M Ali, AN Khan, T Khalid, F Rehman, Y Jararweh, J Shuja Transactions on Emerging Telecommunications Technologies 33 (3), e3676, 2022 | 48 | 2022 |
A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach AN Khan, ML Mat Kiah, M Ali, S Shamshirband, AR Khan Journal of Grid Computing 13, 651-675, 2015 | 46 | 2015 |
A fog-based security framework for intelligent traffic light control system T Khalid, AN Khan, M Ali, A Adeel, A ur Rehman Khan, J Shuja Multimedia Tools and Applications 78, 24595-24615, 2019 | 40 | 2019 |
Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs A Khurshid, AN Khan, FG Khan, M Ali, J Shuja, AR Khan Concurrency and Computation: Practice and Experience, e4729, 2018 | 35 | 2018 |
Computation offloading cost estimation in mobile cloud application models AR Khan, M Othman, AN Khan, J Shuja, S Mustafa Wireless Personal Communications 97 (3), 4897-4920, 2017 | 33 | 2017 |
A study of incremental cryptography for security schemes in mobile cloud computing environments AN Khan, MLM Kiah, SU Khan, SA Madani, AR Khan 2013 IEEE Symposium on Wireless Technology & Applications (ISWTA), 62-67, 2013 | 33 | 2013 |
A lightweight and compromise‐resilient authentication scheme for IoTs MF Aziz, AN Khan, J Shuja, IA Khan, FG Khan, AR Khan Transactions on emerging telecommunications technologies 33 (3), e3813, 2022 | 32 | 2022 |
Pirax: framework for application piracy control in mobile cloud environment AR Khan, M Othman, M Ali, AN Khan, SA Madani The Journal of Supercomputing 68, 753-776, 2014 | 21 | 2014 |
FoNAC-An automated Fog Node Audit and Certification scheme M Aslam, B Mohsin, A Nasir, S Raza Computers & Security 93, 101759, 2020 | 20 | 2020 |
A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment AN Khan, M Ali, AR Khan, FG Khan, IA Khan, W Jadoon, S Shamshirband, ... International Journal of Communication Systems 30 (16), e3308, 2017 | 20 | 2017 |
An intelligent approach of sniffer detection. AN Khan, K Qureshi, S Khan Int. Arab J. Inf. Technol. 9 (1), 9-15, 2012 | 15 | 2012 |