Malicious insider attack detection in IoTs using data analytics AY Khan, R Latif, S Latif, S Tahir, G Batool, T Saba IEEE Access 8, 11743-11753, 2019 | 102 | 2019 |
FBASHI: Fuzzy and blockchain-based adaptive security for healthcare IoTs Z Zulkifl, F Khan, S Tahir, M Afzal, W Iqbal, A Rehman, S Saeed, ... IEEE Access 10, 15644-15656, 2022 | 60 | 2022 |
A new secure and lightweight searchable encryption scheme over encrypted cloud data S Tahir, S Ruj, Y Rahulamathavan, M Rajarajan, C Glackin IEEE Transactions on Emerging Topics in Computing 7 (4), 530-544, 2017 | 51 | 2017 |
Privacy-preserving searchable encryption framework for permissioned blockchain networks S Tahir, M Rajarajan 2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018 | 39 | 2018 |
Privacy preserving encrypted phonetic search of speech data C Glackin, G Chollet, N Dugan, N Cannings, J Wall, S Tahir, IG Ray, ... 2017 IEEE International Conference on Acoustics, Speech and Signal …, 2017 | 36 | 2017 |
Privacy-preserving COVID-19 contact tracing using blockchain S Tahir, H Tahir, A Sajjad, M Rajarajan, F Khan Journal of Communications and Networks 23 (5), 360-373, 2021 | 27 | 2021 |
Fuzzy keywords enabled ranked searchable encryption scheme for a public cloud environment S Tahir, S Ruj, A Sajjad, M Rajarajan Computer Communications 133, 102-114, 2019 | 26 | 2019 |
A parallelized disjunctive query based searchable encryption scheme for big data S Tahir, L Steponkus, S Ruj, M Rajarajan, A Sajjad Future Generation Computer Systems 109, 583-592, 2020 | 22 | 2020 |
Artificial intelligence/machine learning in IoT for authentication and authorization of edge devices MS Zareen, S Tahir, M Akhlaq, B Aslam 2019 International Conference on Applied and Engineering Mathematics (ICAEM …, 2019 | 20 | 2019 |
Key-based cookie-less session management framework for application layer security ZA Alizai, H Tahir, MH Murtaza, S Tahir, K Mcdonald-Maier Ieee Access 7, 128544-128554, 2019 | 18 | 2019 |
Granular data access control with a patient-centric policy update for healthcare F Khan, S Khan, S Tahir, J Ahmad, H Tahir, SA Shah Sensors 21 (10), 3556, 2021 | 17 | 2021 |
A novel homomorphic approach for preserving privacy of patient data in telemedicine Y Iqbal, S Tahir, H Tahir, F Khan, S Saeed, AM Almuhaideb, AM Syed Sensors 22 (12), 4432, 2022 | 16 | 2022 |
Big data—an evolving concern for forensic investigators S Tahir, W Iqbal 2015 First International Conference on Anti-Cybercrime (ICACC), 1-6, 2015 | 16 | 2015 |
A ranked searchable encryption scheme for encrypted data hosted on the public cloud S Tahir, M Rajarajan, A Sajjad 2017 International Conference on Information Networking (ICOIN), 242-247, 2017 | 14 | 2017 |
A novel trust management model for edge computing R Latif, MU Ahmed, S Tahir, S Latif, W Iqbal, A Ahmad Complex & Intelligent Systems, 1-17, 2022 | 12 | 2022 |
A homomorphic approach for security and privacy preservation of Smart Airports H Malik, S Tahir, H Tahir, M Ihtasham, F Khan Future Generation Computer Systems 141, 500-513, 2023 | 11 | 2023 |
PUF-based key generation scheme for secure group communication using MEMS M Mehdi, MT Ajani, H Tahir, S Tahir, Z Alizai, F Khan, Q Riaz, M Hussain Electronics 10 (14), 1691, 2021 | 10 | 2021 |
Enhanced lightweight cloud-assisted mutual authentication scheme for wearable devices M Hassan, K Mansoor, S Tahir, W Iqbal 2019 International Conference on Applied and Engineering Mathematics (ICAEM …, 2019 | 10 | 2019 |
A novel image-based homomorphic approach for preserving the privacy of autonomous vehicles connected to the cloud A Sultan, S Tahir, H Tahir, T Anwer, F Khan, M Rajarajan, O Rana IEEE Transactions on Intelligent Transportation Systems 24 (2), 1936-1948, 2022 | 8 | 2022 |
A novel searchable encryption scheme to reduce the access pattern leakage M Awais, S Tahir, F Khan, H Tahir, R Tahir, R Latif, MY Umair Future Generation Computer Systems 133, 338-350, 2022 | 8 | 2022 |