1. 2020
  2. Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme

    Irshad, A., Naqvi, H., Chaudhry, S. A., Usman, M., Shafiq, M., Mir, O. & Kanwal, A., 10 Sep 2020, In : Information Technology and Control. 47, 3, p. 431-466

    Research output: Contribution to journalArticle

  3. A Human-in-the-Loop Probabilistic CNN-Fuzzy Logic Framework for Accident Prediction in Vehicular Networks

    Usman, M., Carie, A., Marapelli, B., Dino Bedru, H. & Biswas, K., 1 Sep 2020, (Accepted/In press) In : IEEE Sensors Journal.

    Research output: Contribution to journalArticle

  4. Fuzzy-in-the-Loop Driven Low Cost and Secure Biometric User Access to Server

    Irshad, A., Usman, M., Chaudhry, S. A., Kashif Bashir, A., Jolfaei, A. & Srivastava, G., 1 Aug 2020, (Accepted/In press) In : IEEE Transactions on Reliability.

    Research output: Contribution to journalArticle

  5. Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures

    WAHEED, NAZAR., HE, XIANGJIAN., IKRAM, MUHAMMAD., Usman, M., SAJID HASHMI, SAAD. & Usman, M., 1 Jul 2020, (Accepted/In press) In : ACM Computing Surveys.

    Research output: Contribution to journalArticle

  6. Security, Reliability, Privacy, and Quality in Industrial Automation and Control

    Usman, M., Jolfaei, A., Gondal, I. & Kant, K., Jul 2020, In : IEEE Transactions on Industry Applications. 56, 4, p. 1-2 2 p.

    Research output: Contribution to journalEditorial

  7. Closing the Loop in Feedback Driven Learning Environments Using Trust Decision Making and Utility Theory

    Mahmud, K., Usman, M., Sindhu, M. A., Jolfaei, A. & Srivastava, G., 20 May 2020, In : IEEE Transactions on Emerging Topics in Computational Intelligence.

    Research output: Contribution to journalArticle

  8. Privacy Preserved Ranking of Industrial Sensing Services Using Topological Information

    Hameed, A., Usman, M. & Maqbool, O., 19 Mar 2020, In : IEEE Transactions on Industry Applications. 56, 4, p. 4457-4466 10 p., 9042308.

    Research output: Contribution to journalArticle

  9. A provably secure and efficient authenticated key agreement scheme for Energy Internet based Vehicle-to-Grid technology framework

    Irshad, A., Usman, M., Chaudhry, S. A., Naqvi, H. & Shafiq, M., 23 Jan 2020, In : IEEE Transactions on Industry Applications. 56, 4, p. 4425-4435

    Research output: Contribution to journalArticle

  10. 2019
  11. An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol

    Irshad, A., Chaudhry, S. A., Shafiq, M., Usman, M., Asif, M. & Kumari, S., 25 Jun 2019, In : Information Technology and Control. 48, 2, p. 211-224

    Research output: Contribution to journalArticle

  12. A provable and secure mobile user authentication Scheme for Mobile Cloud Computing Services

    Irshad, A., Chaudhry, S. A., Shafiq, M., Usman, M., Asif, M. & Gani, A., 19 Jun 2019, In : International Journal of Communication Systems. 32, 14, e3980.

    Research output: Contribution to journalArticle

Previous 1 2 Next

ID: 3561728