Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment Z Ullah, B Raza, H Shah, S Khan, A Waheed IEEE access 10, 36978-36994, 2022 | 96 | 2022 |
Security challenges of location privacy in VANETs and state-of-the-art solutions: A survey S Khan, I Sharma, M Aslam, MZ Khan, S Khan Future Internet 13 (4), 96, 2021 | 65 | 2021 |
An efficient QoS-based multi-path routing scheme for smart healthcare monitoring in wireless body area networks G Mehmood, MZ Khan, AK Bashir, YD Al-Otaibi, S Khan Computers and Electrical Engineering 109, 108517, 2023 | 55 | 2023 |
An efficient and secure revocation-enabled attribute-based access control for eHealth in smart society S Khan, W Iqbal, A Waheed, G Mehmood, S Khan, M Zareei, RR Biswal Sensors 22 (1), 336, 2022 | 27 | 2022 |
ABKS-PBM: Attribute-based keyword search with partial bilinear map S Khan, S Khan, M Zareei, F Alanazi, N Kama, M Alam, A Anjum IEEE Access 9, 46313-46324, 2021 | 7 | 2021 |
Oo-abms: Online/offline-aided attribute-based multi-keyword search S Khan, M Zareei, S Khan, F Alanazi, M Alam, A Waheed IEEE Access 9, 114392-114406, 2021 | 5 | 2021 |
An ultra low power and high throughput fpga implementation of sha-1 hash algorithm S Khan, SS Paracha International Journal of Computer Science and Information Security 12 (8), 80, 2014 | 4 | 2014 |
Verifiable privacy-preserving image retrieval in multi-owner multi-user settings S Khan, H Abbas, W Iqbal IEEE Transactions on Emerging Topics in Computational Intelligence 8 (2 …, 2024 | 3 | 2024 |
An optimized dynamic attribute-based searchable encryption scheme S Khan, S Khan, A Waheed, G Mehmood, M Zareei, F Alanazi PloS one 19 (10), e0268803, 2024 | 1 | 2024 |
Latency aware graph-based microservice placement in the edge-cloud continuum S Khan, S Khan Cluster Computing 28 (2), 88, 2025 | | 2025 |
Secure semantic search using deep learning in a blockchain-assisted multi-user setting S Khan, H Abbas, M Binsawad Journal of Cloud Computing 13 (1), 29, 2024 | | 2024 |
Evaluation of Cryptanalytic Algorithm for A5/2 Stream Cipher S Khan, SS Peracha, ZUA Tariq International Journal of Computer Science and Information Security 12 (4), 8, 2014 | | 2014 |