Follow
Shahzad Khan
Shahzad Khan
Shaheed Benazir Bhutto University
Verified email at sbbu.edu.pk
Title
Cited by
Cited by
Year
Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment
Z Ullah, B Raza, H Shah, S Khan, A Waheed
IEEE access 10, 36978-36994, 2022
972022
Security challenges of location privacy in VANETs and state-of-the-art solutions: A survey
S Khan, I Sharma, M Aslam, MZ Khan, S Khan
Future Internet 13 (4), 96, 2021
652021
An efficient QoS-based multi-path routing scheme for smart healthcare monitoring in wireless body area networks
G Mehmood, MZ Khan, AK Bashir, YD Al-Otaibi, S Khan
Computers and Electrical Engineering 109, 108517, 2023
552023
An efficient and secure revocation-enabled attribute-based access control for eHealth in smart society
S Khan, W Iqbal, A Waheed, G Mehmood, S Khan, M Zareei, RR Biswal
Sensors 22 (1), 336, 2022
272022
ABKS-PBM: Attribute-based keyword search with partial bilinear map
S Khan, S Khan, M Zareei, F Alanazi, N Kama, M Alam, A Anjum
IEEE Access 9, 46313-46324, 2021
72021
Oo-abms: Online/offline-aided attribute-based multi-keyword search
S Khan, M Zareei, S Khan, F Alanazi, M Alam, A Waheed
IEEE Access 9, 114392-114406, 2021
52021
An ultra low power and high throughput fpga implementation of sha-1 hash algorithm
S Khan, SS Paracha
International Journal of Computer Science and Information Security 12 (8), 80, 2014
42014
Verifiable privacy-preserving image retrieval in multi-owner multi-user settings
S Khan, H Abbas, W Iqbal
IEEE Transactions on Emerging Topics in Computational Intelligence 8 (2 …, 2024
32024
An optimized dynamic attribute-based searchable encryption scheme
S Khan, S Khan, A Waheed, G Mehmood, M Zareei, F Alanazi
PloS one 19 (10), e0268803, 2024
12024
Latency aware graph-based microservice placement in the edge-cloud continuum
S Khan, S Khan
Cluster Computing 28 (2), 88, 2025
2025
Secure semantic search using deep learning in a blockchain-assisted multi-user setting
S Khan, H Abbas, M Binsawad
Journal of Cloud Computing 13 (1), 29, 2024
2024
Evaluation of Cryptanalytic Algorithm for A5/2 Stream Cipher
S Khan, SS Peracha, ZUA Tariq
International Journal of Computer Science and Information Security 12 (4), 8, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–12