1. |
AN Khan,F.G Khan A lightweight and compromise‐resilient authentication scheme for IoTs, Transactions on Emerging Telecommunications Technologies, 2022 |
2. |
E. Mustafa,J.Shujah,T. Maqsood,S. Mustafa,F. Rehman,AN Khan,S.K.Zaman,Ali Imran Jehangiri,Sadia Din Joint wireless power transfer and task offloading in mobile edge computing: a survey, Cluster Computing, 2021 |
3. |
Muhammad Amir Khan,I.A.Khan,Ahmad Din,W.Jadoon,R.Jadoon,F.G Khan,AN Khan,Usman Ali Khan Towards a Complete Set of Gym Exercises Detection Using Smartphone Sensors, Scientific Programming, 2020 |
4. |
I.A.Khan,Ahmad Din,W.Jadoon,F.G Khan,AN Khan,R.Jadoon Towards a Complete Set of Gym Exercises Detection Using Smartphone Sensors, Scientific Programming, 2020 |
5. |
I.A.Khan,J.Shujah,AN Khan Resource-based direct manipulation: a user-centric visual interface for operational customization of future smart appliances, Telecommunication Systems, 2020 |
6. |
AN Khan,I.A.Khan A lightweight and compromise‐resilient authentication scheme for IoTs, Transactions on Emerging Telecommunication Technologies, 2019 |
7. |
T. Khalid,MAK Abbassi,M Zuraiz,AN Khan,Dr. Mazhar Ali,R.Wasim,JJPC Rodrigues,Mudassar Aslam A survey on privacy and access control schemes in fog computing, International Journal of Communication Systems, 2019 |
8. |
T. Khalid,AN Khan,Dr. Mazhar Ali,A. Adeel,A. R. Khan,J.Shujah A fog-based security framework for intelligent traffic light control system, Multimedia Tools and Applications, 2019 |
9. |
Adil Adeel,Dr. Mazhar Ali,AN Khan,Tauqeer Khalid,F. Rehman,Yaser Jararweh,J.Shujah A multi-attack resilient lightweight IoT authenticationscheme, Transactions on Emerging Telecommunications Technologies, 2019 |
10. |
Anum Khurshid,AN Khan,F.G Khan,Dr. Mazhar Ali,J.Shujah,Atta Ur Rehman Khan Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs, Concurrency and Computation Practice and Experience, 2019 |
11. |
Daniyal Sakhawat,AN Khan,Mudassar Aslam,Anthony T Chronopoulos Agent-based ARP Cache Poisoning Detection (AACPD) in Switched LAN Environments, IET Networks Journal, 2018 |
12. |
AN Khan,Dr. Mazhar Ali,F.G Khan,I.A.Khan,W.Jadoon A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment , Journal of Communication Systems, Wiley, 2017, 2017 |
13. |
AN Khan,J.Shujah,S. Mustafa Computation offloading Cost Estimation in Mobile Cloud Application Models, Wireless Personal Communication, Springer, 2017, 2017 |
14. |
F.G Khan,AN Khan Introducing ToPe-FFT; an OpenCL based FFT Library targeting GPUs, Concurrency and Computation: Practice and Experience by wiley, 2017 |
15. |
S.K.Zaman,A. R. Khan,S. R. Malik,AN Khan,T. Maqsood,S. A. Madani Performance analysis and formal verification of task scheduling heuristics for makespan optimization and workflow distribution in Large-scale Computing Systems, Computer Systems Science & Engineering, 2017 |
16. |
F.G Khan,AN Khan,W.Jadoon,I.A.Khan An optimized magnetostatic field solver on GPU using open computing language, Concurrency and Computation practice and experience, 2017 |
17. |
F.G Khan,AN Khan A Comparison of Proxy Re-Encryption Schemes – A Survey, International Journal of Computer Science and Information Security (IJCSIS), 2016 |
18. |
AN Khan,MLM Kiah,Dr. Mazhar Ali,S. Shamshir,A. R. Khan A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach, Journal of Grid Computing, 2015 |
19. |
A. R. Khan,Mazliza Othman,AN Khan,S. A. Abid,S.Madani MobiByte: An Application Development Model for Mobile Cloud Computing, Journal of Grid Computing , 2015 |
20. |
Shahaboddin Shamshirband,Mazhar Ali,AN Khan,A. R. Khan,M. L. Mat Kiah A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach, December 2015, 2015 |
21. |
Feng Xia,AN Khan,Mazliza Othman Context-Aware Mobile Cloud Computing & Its Challenges, IEEE Cloud Computing, 2015 |
22. |
AN Khan, M. L. Mat Kiah,Mazhar Ali,S.Madani,A. R. Khan,Shahaboddin Shamshirband BSS: block-based sharing scheme for secure data storage services in mobile cloud environment, Journal of Supercomputing (Tier 2), 2014 |
23. |
Nor Badrul Anuar,M. L. Mat Kiah, Vala Ali Rohania,Dalibor Petkovicb,Sanjay Misrac,AN Khan,Shahaboddin Shamshirband Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks, Journal of Network and Computer Applications (Tier 1), 2014 |
24. |
AN Khan,Dr. Mazhar Ali Incremental proxy re-encryption scheme for mobile cloud computing environment, Journal of Super Computing, 2014 |
25. |
AN Khan,M. L. Mat Kiah,Mazhar Ali,S.Madani,Atta ur Rehman Khan,Shahaboddin Shamshirband Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment, Journal of Supercomputing (Tier 2), 2014 |
26. |
Dr. Atta UR Rehman,Dr. Mazhar Ali,AN Khan Pirax: framework for application piracy control in mobile cloud environment, Journal of Super Computing, 2014 |
27. |
AN Khan,Samee U. Khan, M.L. Mat Kiah,S.Madani Towards secure mobile cloud computing: A survey, Future Generation Computer Systems (Tier 1), 2013 |
28. |
AN Khan,M. L. Mat Kiah,S.Madani,Atta ur Rehman Khan,Mazhar Ali Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing, Journal of Supercomputing (Tier 2), 2013 |
29. |
AN Khan,Dr. Mazhar Ali Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing, Journal of Super Computing, 2013 |
30. |
AN Khan,S.Khan,Kalim Qureshi An Intelligent Approach of Sniffer Detection, The International Arab Journal of Information Technology (Tier 4), 2012 |
31. |
AN Khan,S.Khan,Kalim Qureshi Enhanced Switched Network Sniffer Detection Technique Based on IP Packet Routing, Information Security Journal: A Global Perspective, 2009 |