Follow
Abdul Nasir Khan
Title
Cited by
Cited by
Year
Towards secure mobile cloud computing: A survey
AN Khan, MLM Kiah, SU Khan, SA Madani
Future Generation Computer Systems 29 (5), 1278-1299, 2013
5082013
Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
S Shamshirband, NB Anuar, MLM Kiah, VA Rohani, D Petković, S Misra, ...
Journal of Network and Computer Applications 42, 102-117, 2014
1162014
Incremental proxy re-encryption scheme for mobile cloud computing environment
AN Khan, MLM Kiah, SA Madani, M Ali, S Shamshirband
The Journal of Supercomputing 68 (2), 624-651, 2014
1142014
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
AN Khan, MLM Kiah, M Ali, SA Madani, S Shamshirband
The Journal of Supercomputing 70 (2), 946-976, 2014
782014
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
AN Khan, ML Mat Kiah, SA Madani, M Ali
The Journal of Supercomputing 66 (3), 1687-1706, 2013
722013
Context-aware mobile cloud computing and its challenges
M Othman, F Xia, AN Khan
IEEE Cloud Computing 2 (3), 42-49, 2015
572015
MobiByte: an application development model for mobile cloud computing
M Othman, AN Khan, SA Abid, SA Madani
Journal of Grid Computing 13 (4), 605-628, 2015
532015
A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach
AN Khan, ML Mat Kiah, M Ali, S Shamshirband
Journal of Grid Computing 13 (4), 651-675, 2015
432015
Computation Offloading Cost Estimation in Mobile Cloud Application Models
M Othman, AN Khan, J Shuja, S Mustafa
Wireless Personal Communications 97 (3), 4897-4920, 2017
302017
A study of incremental cryptography for security schemes in mobile cloud computing environments
AN Khan, MLM Kiah, SU Khan, SA Madani, AR Khan
2013 IEEE Symposium on Wireless Technology & Applications (ISWTA), 62-67, 2013
302013
A survey on privacy and access control schemes in fog computing
T Khalid, MAK Abbasi, M Zuraiz, AN Khan, M Ali, RW Ahmad, ...
International Journal of Communication Systems 34 (2), e4181, 2021
282021
A multi‐attack resilient lightweight IoT authentication scheme
A Adeel, M Ali, AN Khan, T Khalid, F Rehman, Y Jararweh, J Shuja
Transactions on Emerging Telecommunications Technologies, e3676, 2019
272019
Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs
A Khurshid, AN Khan, FG Khan, M Ali, J Shuja, AR Khan
Concurrency and Computation: Practice and Experience, e4729, 2018
272018
A fog-based security framework for intelligent traffic light control system
T Khalid, AN Khan, M Ali, A Adeel, J Shuja
Multimedia Tools and Applications 78 (17), 24595-24615, 2019
242019
Pirax: framework for application piracy control in mobile cloud environment
M Othman, M Ali, AN Khan, SA Madani
The Journal of Supercomputing 68 (2), 753-776, 2014
202014
A lightweight and compromise‐resilient authentication scheme for IoTs
MF Aziz, AN Khan, J Shuja, IA Khan, FG Khan, AR Khan
Transactions on Emerging Telecommunications Technologies, e3813, 2019
172019
Joint wireless power transfer and task offloading in mobile edge computing: a survey
E Mustafa, J Shuja, AI Jehangiri, S Din, F Rehman, S Mustafa, T Maqsood, ...
Cluster Computing, 1-20, 2021
162021
A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment
AN Khan, M Ali, AR Khan, FG Khan, IA Khan, W Jadoon, S Shamshirband, ...
International Journal of Communication Systems 30 (16), e3308, 2017
152017
An intelligent approach of sniffer detection.
AN Khan, K Qureshi, S Khan
Int. Arab J. Inf. Technol. 9 (1), 9-15, 2012
142012
FoNAC-An automated Fog Node Audit and Certification scheme
M Aslam, B Mohsin, A Nasir, S Raza
Computers & Security 93, 101759, 2020
132020
The system can't perform the operation now. Try again later.
Articles 1–20