关注
Mazhar Ali
Mazhar Ali
PhD
在 cuiatd.edu.pk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Security in cloud computing: Opportunities and challenges
M Ali, SU Khan, AV Vasilakos
Information sciences 305, 357-383, 2015
9962015
SeDaSC: secure data sharing in clouds
M Ali, R Dhamotharan, E Khan, SU Khan, AV Vasilakos, K Li, AY Zomaya
IEEE Systems Journal 11 (2), 395-404, 2017
2442017
A taxonomy and survey on green data center networks
K Bilal, SUR Malik, O Khalid, A Hameed, E Alvarez, V Wijaysekara, R Irfan, ...
Future Generation Computer Systems 36, 189-208, 2014
2392014
Incremental proxy re-encryption scheme for mobile cloud computing environment
AN Khan, MLM Kiah, SA Madani, M Ali, AR Khan, S Shamshirband
The Journal of Supercomputing 68, 624-651, 2014
1222014
DROPS: Division and replication of data in the cloud for optimal performance and security
M Ali, K Bilal, S Khan, B Veeravalli, K Li, A Zomaya
IEEE Transactions on Cloud computing 6 (2), 303-315, 2018
882018
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
AN Khan, MLM Kiah, M Ali, SA Madani, AUR Khan, S Shamshirband
The Journal of Supercomputing 70, 946-976, 2014
812014
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
AN Khan, ML Mat Kiah, SA Madani, AR Khan, M Ali
The Journal of Supercomputing 66, 1687-1706, 2013
722013
DaSCE: Data security for cloud environment with semi-trusted third party
M Ali, S Malik, S Khan
IEEE Transactions on Cloud Computing 5 (4), 642-655, 2017
582017
Towards a fog enabled efficient car parking architecture
KS Awaisi, A Abbas, M Zareei, HA Khattak, MUS Khan, M Ali, IU Din, ...
IEEE Access 7, 159100-159111, 2019
542019
A survey on energy-efficient methodologies and architectures of network-on-chip
A Abbas, M Ali, A Fayyaz, A Ghosh, A Kalra, SU Khan, MUS Khan, ...
Computers & Electrical Engineering 40 (8), 333-347, 2014
542014
A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach
AN Khan, ML Mat Kiah, M Ali, S Shamshirband, AR Khan
Journal of Grid Computing 13, 651-675, 2015
452015
Personalized healthcare cloud services for disease risk assessment and wellness management using social media
A Abbas, M Ali, MUS Khan, SU Khan
Pervasive and Mobile Computing 28, 81-99, 2016
432016
A survey on privacy and access control schemes in fog computing
T Khalid, MAK Abbasi, M Zuraiz, AN Khan, M Ali, RW Ahmad, ...
International Journal of Communication Systems 34 (2), e4181, 2021
402021
A multi‐attack resilient lightweight IoT authentication scheme
A Adeel, M Ali, AN Khan, T Khalid, F Rehman, Y Jararweh, J Shuja
Transactions on Emerging Telecommunications Technologies 33 (3), e3676, 2022
382022
3D-RP: A DHT-based routing protocol for MANETs
SA Abid, M Othman, N Shah, M Ali, AR Khan
The Computer Journal 58 (2), 258-279, 2015
382015
Segregating spammers and unsolicited bloggers from genuine experts on Twitter
MUS Khan, M Ali, A Abbas, SU Khan, AY Zomaya
IEEE Transactions on Dependable and Secure Computing 15 (4), 551-560, 2016
362016
A fog-based security framework for intelligent traffic light control system
T Khalid, AN Khan, M Ali, A Adeel, A ur Rehman Khan, J Shuja
Multimedia Tools and Applications 78, 24595-24615, 2019
322019
Secure‐CamFlow: a device‐oriented security model to assist information flow control systems in cloud environments for IoTs
A Khurshid, AN Khan, FG Khan, M Ali, J Shuja, AR Khan
Concurrency and Computation: Practice and Experience 31 (8), e4729, 2019
322019
On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs)
MUS Khan, A Abbas, M Ali, M Jawad, SU Khan, K Li, AY Zomaya
IEEE Systems Journal 12 (1), 82-91, 2018
312018
Bot detection using a single post on social media
S Mohammad, MUS Khan, M Ali, L Liu, M Shardlow, R Nawaz
2019 Third World Conference on Smart Trends in Systems Security and …, 2019
302019
系统目前无法执行此操作,请稍后再试。
文章 1–20