Design and deployment of a trusted eucalyptus cloud I Khan, H Rehman, Z Anwar 2011 IEEE 4th International Conference on Cloud Computing, 380-387, 2011 | 54 | 2011 |
A protocol for preventing insider attacks in untrusted infrastructure-as-a-service clouds I Khan, Z Anwar, B Bordbar, E Ritter, H Rehman IEEE Transactions on Cloud Computing 6 (4), 942-954, 2016 | 13 | 2016 |
Triple-Entry Accounting (TEA) and Blockchain Implementation in Accounting and Finance-A Survey R Joseph, R Sharma, MI Sarwar, I Khan, AS Akram, T Alyas, S Atif, ... 2023 International Conference on Business Analytics for Technology and …, 2023 | 7 | 2023 |
A thin client friendly trusted execution framework for infrastructure-as-a-service clouds I Khan, H Rehman, MHF Al-Khatib, Z Anwar, M Alam Future generation computer systems 89, 239-248, 2018 | 7 | 2018 |
A Comprehensive Survey on Blockchain Technology Applications in Different Sectors of Pakistan to Develop Smart Cities A Imtiaz, D Shehzad, I Khan, A Imran, M Arif Pakistan Journal of Emerging Science and Technologies (PJEST) 4 (3), 2023 | 2 | 2023 |
SAuthMash: mobile agent based self authorization in mashups I Khan, M Nauman, M Alam, F Aziz Proceedings of the 7th International Conference on Frontiers of Information …, 2009 | 2 | 2009 |
An Improved Method of Vigenere Cipher to Securely Compress the Text by using Relative Frequency N Shoukat, M Azam, I Khan International Journal of Innovative Science and Research Technology 7 (10), 2022 | 1 | 2022 |