Abdul Nasir Khan
Cited by
Cited by
Towards secure mobile cloud computing: A survey
AN Khan, MLM Kiah, SU Khan, SA Madani
Future Generation Computer Systems 29 (5), 1278-1299, 2013
Incremental proxy re-encryption scheme for mobile cloud computing environment
AN Khan, MLM Kiah, SA Madani, M Ali, AR Khan, S Shamshirband
The Journal of Supercomputing 68, 624-651, 2014
Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
S Shamshirband, NB Anuar, MLM Kiah, VA Rohani, D Petković, S Misra, ...
Journal of Network and Computer Applications 42, 102-117, 2014
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
AN Khan, MLM Kiah, M Ali, SA Madani, AUR Khan, S Shamshirband
The journal of supercomputing 70, 946-976, 2014
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
AN Khan, ML Mat Kiah, SA Madani, AR Khan, M Ali
The Journal of Supercomputing 66, 1687-1706, 2013
Context-aware mobile cloud computing and its challenges
M Othman, F Xia, AN Khan
IEEE Cloud Computing 2 (3), 42-49, 2015
Joint wireless power transfer and task offloading in mobile edge computing: a survey
E Mustafa, J Shuja, SK uz Zaman, AI Jehangiri, S Din, F Rehman, ...
Cluster Computing 25 (4), 2429-2448, 2022
MobiByte: an application development model for mobile cloud computing
AUR Khan, M Othman, AN Khan, SA Abid, SA Madani
Journal of Grid Computing 13, 605-628, 2015
A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach
AN Khan, ML Mat Kiah, M Ali, S Shamshirband, AR Khan
Journal of Grid Computing 13, 651-675, 2015
A survey on privacy and access control schemes in fog computing
T Khalid, MAK Abbasi, M Zuraiz, AN Khan, M Ali, RW Ahmad, ...
International Journal of Communication Systems 34 (2), e4181, 2021
A multi‐attack resilient lightweight IoT authentication scheme
A Adeel, M Ali, AN Khan, T Khalid, F Rehman, Y Jararweh, J Shuja
Transactions on Emerging Telecommunications Technologies 33 (3), e3676, 2022
A fog-based security framework for intelligent traffic light control system
T Khalid, AN Khan, M Ali, A Adeel, A ur Rehman Khan, J Shuja
Multimedia Tools and Applications 78, 24595-24615, 2019
Computation offloading cost estimation in mobile cloud application models
AR Khan, M Othman, AN Khan, J Shuja, S Mustafa
Wireless Personal Communications 97, 4897-4920, 2017
A study of incremental cryptography for security schemes in mobile cloud computing environments
AN Khan, MLM Kiah, SU Khan, SA Madani, AR Khan
2013 IEEE Symposium on Wireless Technology & Applications (ISWTA), 62-67, 2013
Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs
A Khurshid, AN Khan, FG Khan, M Ali, J Shuja, AR Khan
Concurrency and Computation: Practice and Experience, e4729, 2018
A lightweight and compromise‐resilient authentication scheme for IoTs
MF Aziz, AN Khan, J Shuja, IA Khan, FG Khan, AR Khan
Transactions on emerging telecommunications technologies 33 (3), e3813, 2022
Pirax: framework for application piracy control in mobile cloud environment
AR Khan, M Othman, M Ali, AN Khan, SA Madani
The Journal of Supercomputing 68, 753-776, 2014
FoNAC-An automated Fog Node Audit and Certification scheme
M Aslam, B Mohsin, A Nasir, S Raza
Computers & Security 93, 101759, 2020
A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment
AN Khan, M Ali, AR Khan, FG Khan, IA Khan, W Jadoon, S Shamshirband, ...
International Journal of Communication Systems 30 (16), e3308, 2017
An intelligent approach of sniffer detection.
AN Khan, K Qureshi, S Khan
Int. Arab J. Inf. Technol. 9 (1), 9-15, 2012
The system can't perform the operation now. Try again later.
Articles 1–20