Cluster‐Based Device Mobility Management in Named Data Networking for Vehicular Networks M Gohar, N Khan, A Ahmad, M Najam-Ul-Islam, S Sarwar, SJ Koh Mobile Information Systems 2018 (1), 1710591, 2018 | 24 | 2018 |
Lattice-Based Authentication Scheme to Prevent Quantum Attack in Public Cloud Environment Naveed Khan, Zhang Jianbiao, Intikhab Ullah, Muhammad Salman Pathan, Huhnkuk Lim CMC-Computers Materials & Continua 75 (No.1, 2023), 35-49, 2023 | 10* | 2023 |
Blockchain-based authentication schemes in smart environments: A systematic literature review MA Al Sibahee, ZA Abduljabbar, A Ngueilbaye, C Luo, J Li, Y Huang, ... IEEE Internet of Things Journal, 2024 | 6 | 2024 |
A Secure and Efficient Information Authentication Scheme for E-Healthcare System Naveed Khan, Jianbiao Zhang, Ghulam Ali Mallah, Shehzad Ashraf Chaudhry Computers, Materials & Continua 76 (3), 2023 | 5 | 2023 |
An ECC-based mutual data access control protocol for next-generation public cloud N Khan, Z Jianbiao, H Lim, J Ali, I Ullah, M Salman Pathan, SA Chaudhry Journal of Cloud Computing 12 (1), 101, 2023 | 4 | 2023 |