Follow
Mazhar Ali
Mazhar Ali
Associate Professor, Computer Science Department, COMSATS University Islamabad, Abbottabad campus
Verified email at cuiatd.edu.pk
Title
Cited by
Cited by
Year
Security in cloud computing: Opportunities and challenges
M Ali, SU Khan, AV Vasilakos
Information sciences 305, 357-383, 2015
10652015
SeDaSC: secure data sharing in clouds
M Ali, R Dhamotharan, E Khan, SU Khan, AV Vasilakos, K Li, AY Zomaya
IEEE Systems Journal 11 (2), 395-404, 2017
2562017
A taxonomy and survey on green data center networks
K Bilal, SUR Malik, O Khalid, A Hameed, E Alvarez, V Wijaysekara, R Irfan, ...
Future Generation Computer Systems 36, 189-208, 2014
2502014
Incremental proxy re-encryption scheme for mobile cloud computing environment
AN Khan, MLM Kiah, SA Madani, M Ali, AR Khan, S Shamshirband
The Journal of Supercomputing 68, 624-651, 2014
1282014
DROPS: Division and replication of data in the cloud for optimal performance and security
M Ali, K Bilal, S Khan, B Veeravalli, K Li, A Zomaya
IEEE Transactions on Cloud computing 6 (2), 303-315, 2018
992018
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
AN Khan, MLM Kiah, M Ali, SA Madani, AUR Khan, S Shamshirband
The journal of supercomputing 70, 946-976, 2014
882014
Towards a fog enabled efficient car parking architecture
KS Awaisi, A Abbas, M Zareei, HA Khattak, MUS Khan, M Ali, IU Din, ...
IEEE Access 7, 159100-159111, 2019
842019
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
AN Khan, ML Mat Kiah, SA Madani, AR Khan, M Ali
The Journal of Supercomputing 66, 1687-1706, 2013
742013
DaSCE: Data security for cloud environment with semi-trusted third party
M Ali, S Malik, S Khan
IEEE Transactions on Cloud Computing 5 (4), 642-655, 2017
672017
A survey on energy-efficient methodologies and architectures of network-on-chip
A Abbas, M Ali, A Fayyaz, A Ghosh, A Kalra, SU Khan, MUS Khan, ...
Computers & Electrical Engineering 40 (8), 333-347, 2014
552014
A survey on privacy and access control schemes in fog computing
T Khalid, MAK Abbasi, M Zuraiz, AN Khan, M Ali, RW Ahmad, ...
International Journal of Communication Systems 34 (2), e4181, 2021
482021
Personalized healthcare cloud services for disease risk assessment and wellness management using social media
A Abbas, M Ali, MUS Khan, SU Khan
Pervasive and Mobile Computing 28, 81-99, 2016
472016
A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach
AN Khan, ML Mat Kiah, M Ali, S Shamshirband, AR Khan
Journal of Grid Computing 13, 651-675, 2015
472015
A multi‐attack resilient lightweight IoT authentication scheme
A Adeel, M Ali, AN Khan, T Khalid, F Rehman, Y Jararweh, J Shuja
Transactions on Emerging Telecommunications Technologies 33 (3), e3676, 2022
452022
Segregating spammers and unsolicited bloggers from genuine experts on twitter
MUS Khan, M Ali, A Abbas, SU Khan, AY Zomaya
IEEE Transactions on Dependable and Secure Computing 15 (4), 551-560, 2016
442016
3D-RP: A DHT-based routing protocol for MANETs
SA Abid, M Othman, N Shah, M Ali, AR Khan
The Computer Journal 58 (2), 258-279, 2015
402015
A fog-based security framework for intelligent traffic light control system
T Khalid, AN Khan, M Ali, A Adeel, A ur Rehman Khan, J Shuja
Multimedia Tools and Applications 78, 24595-24615, 2019
362019
Bot detection using a single post on social media
S Mohammad, MUS Khan, M Ali, L Liu, M Shardlow, R Nawaz
2019 third world conference on smart trends in systems security and …, 2019
342019
Secure‐CamFlow: a device‐oriented security model to assist information flow control systems in cloud environments for IoTs
A Khurshid, AN Khan, FG Khan, M Ali, J Shuja, AR Khan
Concurrency and Computation: Practice and Experience 31 (8), e4729, 2019
342019
On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs)
MUS Khan, A Abbas, M Ali, M Jawad, SU Khan, K Li, AY Zomaya
IEEE Systems Journal 12 (1), 82-91, 2018
332018
The system can't perform the operation now. Try again later.
Articles 1–20