Towards a secure service provisioning framework in a smart city environment Z Khan, Z Pervez, AG Abbasi Future Generation Computer Systems 77, 112-135, 2017 | 99 | 2017 |
Towards cloud based smart cities data security and privacy management Z Khan, Z Pervez, A Ghafoor 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014 | 93 | 2014 |
Cloud based secure and privacy enhanced authentication & authorization protocol U Khalid, A Ghafoor, M Irum, MA Shibli Procedia Computer Science 22, 680-688, 2013 | 78 | 2013 |
Veidblock: Verifiable identity using blockchain and ledger in a software defined network AG Abbasi, Z Khan Companion Proceedings of the10th International Conference on Utility and …, 2017 | 49 | 2017 |
Assessment criteria for trust models in cloud computing A Kanwal, R Masood, UE Ghazia, MA Shibli, AG Abbasi 2013 IEEE International Conference on Green Computing and Communications and …, 2013 | 43 | 2013 |
Security aspects of virtualization in cloud computing M Kazim, R Masood, MA Shibli, AG Abbasi Computer Information Systems and Industrial Management: 12th IFIP TC8 …, 2013 | 38 | 2013 |
SAGE: Next generation multi-agent system A Ghafoor, MU Rehman, ZA Khan, A Ali, H Suguri Proceedings of the International Conference on Parallel and Distributed …, 2004 | 36 | 2004 |
Analysis of BYOD security frameworks S Ali, MN Qureshi, AG Abbasi 2015 Conference on Information Assurance and Cyber Security (CIACS), 56-61, 2015 | 35 | 2015 |
Security analysis of VoIP architecture for identifying SIP vulnerabilities UU Rehman, AG Abbasi 2014 International Conference on Emerging Technologies (ICET), 87-93, 2014 | 32 | 2014 |
Blockchain and edge computing–based architecture for participatory smart city applications Z Khan, AG Abbasi, Z Pervez Concurrency and Computation: Practice and Experience 32 (12), e5566, 2020 | 31 | 2020 |
Enhanced adaptive data hiding method using LSB and pixel value differencing M Hussain, Q Riaz, S Saleem, A Ghafoor, KH Jung Multimedia Tools and Applications 80, 20381-20401, 2021 | 29 | 2021 |
Dismi-an intent interface for application-centric transport network services P Sköldström, S Junique, A Ghafoor, A Marsico, D Siracusa 2017 19th International Conference on Transparent Optical Networks (ICTON), 1-4, 2017 | 19 | 2017 |
Towards Attribute‐Centric Access Control: an ABAC versus RBAC argument A Fatima, Y Ghazi, MA Shibli, AG Abassi Security and Communication Networks 9 (16), 3152-3166, 2016 | 17 | 2016 |
A secure architecture for inter-cloud virtual machine migration T Zeb, A Ghafoor, A Shibli, M Yousaf International Conference on Security and Privacy in Communication Networks …, 2015 | 15 | 2015 |
SIGNED: Smart cIty diGital twiN vErifiable data framework Z Pervez, Z Khan, A Ghafoor, K Soomro IEEE Access 11, 29430-29446, 2023 | 14 | 2023 |
CryptoNET: Design and implementation of the secure email system A Ghafoor, S Muftic, G Schmölzer 2009 Proceedings of the 1st International Workshop on Security and …, 2009 | 13 | 2009 |
CryptoNET: software protection and secure execution environment A Ghafoor, S Muftic Int. J. Computer Science and Network Security 10 (2), 19-26, 2010 | 11 | 2010 |
An interactive intent-based negotiation scheme for application-centric networks A Marsico, M Santuari, M Savi, D Siracusa, A Ghafoor, S Junique, ... 2017 IEEE Conference on Network Softwarization (NetSoft), 1-2, 2017 | 10 | 2017 |
Web contents protection, secure execution and authorized distribution AG Abbasi, S Muftic, I Hotamov 2010 Fifth International Multi-conference on Computing in the Global …, 2010 | 10 | 2010 |
Adaptive transport protocols in multi agent system A Mehmood, A Ghafoor, HF Ahmed, Z Iqbal Fifth International Conference on Information Technology: New Generations …, 2008 | 10 | 2008 |