Search filters

List of works by Muhammad Khurram Khan

A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy

scientific article published in 2022

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

scientific article published on 17 February 2017

A new handover authentication protocol based on bilinear pairing functions for wireless networks

A novel audio forensic data-set for digital multimedia forensics

A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor

scientific article published in 2018

A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor

scientific article published in 2015

A privacy preserving three-factor authentication protocol for e-Health clouds

article

A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography

scholarly article by Min Luo et al published 23 May 2017 in International Journal of Communication Systems

A secure and efficient public auditing scheme using RSA algorithm for cloud storage

A software agent enabled biometric security algorithm for secure file access in consumer storage devices

scientific article published in 2017

A survey on privacy protection in blockchain system

scholarly article

A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases

scientific article published on 05 April 2019

An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT

scientific article published in 2022

An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography

scholarly article by Baojun Huang et al published 24 May 2015 in Wireless Personal Communications

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography

scientific article published on 3 October 2015

An authentication scheme for secure access to healthcare services

scientific article published on 5 July 2013

An efficient chaos-based 2-party key agreement protocol with provable security

article by Min Luo et al published 6 February 2017 in International Journal of Communication Systems

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design

scientific article published in 2016

An improved biometrics-based remote user authentication scheme with user anonymity

scientific article

An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement

scientific article published in 2013

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

scientific article published in 2014

Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey

scientific article published on 15 July 2020

Bat algorithm–based beamforming for mmWave massive MIMO systems

scholarly article

Blockchain-based identity management systems: A review

journal article from 'Journal of Network and Computer Applications' published in 2020

Certificateless searchable public key encryption scheme for mobile healthcare system

scientific article published in 2018

Cryptanalysis and improvement of 'A privacy enhanced scheme for telecare medical information systems'.

scientific article

Cryptanalysis and improvement of Yan et al.'s biometric-based authentication scheme for telecare medicine information systems.

scientific article published in June 2014

Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems

scientific article published on 5 September 2014

Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme’

scientific article published in 2013

Cryptanalysis of a key agreement protocol based on chaotic Hash

scientific article published in 2013

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

scientific article

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment

scientific article

Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor

scientific article published in 2016

Design of a user anonymous password authentication scheme without smart card

scientific article published in 2014

EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

scholarly article by Debiao He et al published June 2018 in IEEE Systems Journal

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts

scientific article published in 2017

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography

scholarly article by Debiao He et al published 20 September 2016 in IET Communications

More secure smart card-based remote user password authentication scheme with user anonymity

scientific article published in 2013

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

scientific article published in 2016

On the design of a secure user authentication and key agreement scheme for wireless sensor networks

On the security of an authentication scheme for multi-server architecture

scientific article published in 2013

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment

scientific article published in 2017

PoRX: A reputation incentive scheme for blockchain consensus of IIoT

journal article from 'Future Generation Computer Systems' published in 2020

Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

scholarly article by Yuanyuan Zhang et al published 2015 in Mathematical Problems in Engineering

Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps

scientific article published in 2015

SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm

scientific article published in 2019

Security analysis of a publicly verifiable data possession scheme for remote storage

scientific article published in 2017

Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce

scientific article published on 26 April 2014