Follow
Husnain Naqvi
Title
Cited by
Cited by
Year
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
K Mahmood, SA Chaudhry, H Naqvi, S Kumari, X Li, AK Sangaiah
Future Generation Computer Systems 81, 557-565, 2018
2222018
A lightweight message authentication scheme for smart grid communications in power sector
K Mahmood, SA Chaudhry, H Naqvi, T Shon, HF Ahmad
Computers & Electrical Engineering 52, 114-124, 2016
1812016
An improved and provably secure privacy preserving authentication protocol for SIP
SA Chaudhry, H Naqvi, M Sher, MS Farash, MU Hassan
Peer-to-Peer Networking and Applications 10 (1), 1-15, 2017
1202017
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
SA Chaudhry, MS Farash, H Naqvi, M Sher
Electronic Commerce Research 16 (1), 113-139, 2016
1162016
An enhanced privacy preserving remote user authentication scheme with provable security
SA Chaudhry, MS Farash, H Naqvi, S Kumari, MK Khan
Security and Communication Networks 8 (18), 3782-3795, 2015
902015
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure
K Mahmood, X Li, SA Chaudhry, H Naqvi, S Kumari, AK Sangaiah, ...
Future Generation Computer Systems 88, 491-500, 2018
762018
Effect of Rayleigh fading on non-coherent sequence synchronization for multi-user chaos based DS-CDMA
R Vali, SM Berber, SK Nguang
Signal Processing 90 (6), 1924-1939, 2010
702010
An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography
SA Chaudhry, K Mahmood, H Naqvi, MK Khan
Journal of Medical Systems 39 (11), 1-12, 2015
692015
A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework
A Irshad, M Usman, SA Chaudhry, H Naqvi, M Shafiq
IEEE Transactions on Industry Applications 56 (4), 4425-4435, 2020
622020
An improved remote user authentication scheme using elliptic curve cryptography
SA Chaudhry, H Naqvi, K Mahmood, HF Ahmad, MK Khan
Wireless Personal Communications 96 (4), 5355-5373, 2017
562017
An enhanced lightweight anonymous biometric based authentication scheme for TMIS
SA Chaudhry, H Naqvi, MK Khan
Multimedia Tools and Applications 77 (5), 5503-5524, 2018
552018
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
SA Ch, M Sher, A Ghani, H Naqvi, A Irshad
Multimedia Tools and Applications 74 (5), 1711-1723, 2015
532015
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
SA Chaudhry, H Naqvi, MS Farash, T Shon, M Sher
The Journal of Supercomputing 74 (8), 3504-3520, 2018
522018
A robust and efficient privacy aware handover authentication scheme for wireless networks
SA Chaudhry, MS Farash, H Naqvi, SKH Islam, T Shon
Wireless Personal Communications 93 (2), 311-335, 2017
51*2017
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
A Irshad, M Sher, SA Chaudhary, H Naqvi, MS Farash
The Journal of Supercomputing 72 (4), 1623-1644, 2016
482016
Architectural decay during continuous software evolution and impact of ‘design for change’on software architecture
M Riaz, M Sulayman, H Naqvi
International Conference on Advanced Software Engineering and Its …, 2009
392009
Ips: Incentive and punishment scheme for omitting selfishness in the internet of vehicles (iov)
GU Rehman, A Ghani, M Zubair, SHA Naqvi, D Singh, S Muhammad
IEEE Access 7, 109026-109037, 2019
252019
Developing adaptive e-learning environment using cognitive and noncognitive parameters
A Siddique, QS Durrani, HA Naqvi
Journal of Educational Computing Research 57 (4), 811-845, 2019
182019
Energy efficient collaborative communication with imperfect phase synchronization and Rayleigh fading in wireless sensor networks
H Naqvi, S Berber, Z Salcic
Physical Communication 3 (2), 119-128, 2010
152010
Conversion of legal text to a logical rules set from medical law using the medical relational model and the world rule model for a medical decision support system
I Khan, M Sher, JI Khan, SM Saqlain, A Ghani, HA Naqvi, MU Ashraf
Informatics 3 (1), 2, 2016
142016
The system can't perform the operation now. Try again later.
Articles 1–20