Theo dõi
Shahzad Khan
Shahzad Khan
Shaheed Benazir Bhutto University
Email được xác minh tại sbbu.edu.pk
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment
Z Ullah, B Raza, H Shah, S Khan, A Waheed
IEEE access 10, 36978-36994, 2022
962022
Security challenges of location privacy in VANETs and state-of-the-art solutions: A survey
S Khan, I Sharma, M Aslam, MZ Khan, S Khan
Future Internet 13 (4), 96, 2021
652021
An efficient QoS-based multi-path routing scheme for smart healthcare monitoring in wireless body area networks
G Mehmood, MZ Khan, AK Bashir, YD Al-Otaibi, S Khan
Computers and Electrical Engineering 109, 108517, 2023
552023
An efficient and secure revocation-enabled attribute-based access control for eHealth in smart society
S Khan, W Iqbal, A Waheed, G Mehmood, S Khan, M Zareei, RR Biswal
Sensors 22 (1), 336, 2022
272022
ABKS-PBM: Attribute-based keyword search with partial bilinear map
S Khan, S Khan, M Zareei, F Alanazi, N Kama, M Alam, A Anjum
IEEE Access 9, 46313-46324, 2021
72021
Oo-abms: Online/offline-aided attribute-based multi-keyword search
S Khan, M Zareei, S Khan, F Alanazi, M Alam, A Waheed
IEEE Access 9, 114392-114406, 2021
52021
An ultra low power and high throughput fpga implementation of sha-1 hash algorithm
S Khan, SS Paracha
International Journal of Computer Science and Information Security 12 (8), 80, 2014
42014
Verifiable privacy-preserving image retrieval in multi-owner multi-user settings
S Khan, H Abbas, W Iqbal
IEEE Transactions on Emerging Topics in Computational Intelligence 8 (2 …, 2024
32024
An optimized dynamic attribute-based searchable encryption scheme
S Khan, S Khan, A Waheed, G Mehmood, M Zareei, F Alanazi
PloS one 19 (10), e0268803, 2024
12024
Latency aware graph-based microservice placement in the edge-cloud continuum
S Khan, S Khan
Cluster Computing 28 (2), 88, 2025
2025
Secure semantic search using deep learning in a blockchain-assisted multi-user setting
S Khan, H Abbas, M Binsawad
Journal of Cloud Computing 13 (1), 29, 2024
2024
Evaluation of Cryptanalytic Algorithm for A5/2 Stream Cipher
S Khan, SS Peracha, ZUA Tariq
International Journal of Computer Science and Information Security 12 (4), 8, 2014
2014
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–12