Mazhar Ali
Mazhar Ali
PhD
Verified email at ciit.net.pk
Title
Cited by
Cited by
Year
Security in cloud computing: Opportunities and challenges
M Ali, SU Khan, AV Vasilakos
Information sciences 305, 357-383, 2015
6752015
A taxonomy and survey on green data center networks
K Bilal, SUR Malik, O Khalid, A Hameed, E Alvarez, V Wijaysekara, R Irfan, ...
Future Generation Computer Systems 36, 189-208, 2014
1722014
SeDaSC: secure data sharing in clouds
M Ali, R Dhamotharan, E Khan, SU Khan, AV Vasilakos, K Li, AY Zomaya
IEEE Systems Journal 11 (2), 395-404, 2017
1412017
Incremental proxy re-encryption scheme for mobile cloud computing environment
AN Khan, MLM Kiah, SA Madani, M Ali, S Shamshirband
The Journal of Supercomputing 68 (2), 624-651, 2014
782014
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
AN Khan, MLM Kiah, SA Madani, M Ali
The Journal of Supercomputing 66 (3), 1687-1706, 2013
662013
DROPS: Division and replication of data in the cloud for optimal performance and security
M Ali, K Bilal, S Khan, B Veeravalli, K Li, A Zomaya
IEEE Transactions on Cloud computing 6 (2), 303-315, 2018
572018
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
AN Khan, MLM Kiah, M Ali, SA Madani, S Shamshirband
The Journal of Supercomputing 70 (2), 946-976, 2014
542014
A survey on energy-efficient methodologies and architectures of network-on-chip
A Abbas, M Ali, A Fayyaz, A Ghosh, A Kalra, SU Khan, MUS Khan, ...
Computers & Electrical Engineering 40 (8), 333-347, 2014
332014
DaSCE: Data security for cloud environment with semi-trusted third party
M Ali, S Malik, S Khan
IEEE Transactions on Cloud Computing 5 (4), 642-655, 2017
292017
Personalized healthcare cloud services for disease risk assessment and wellness management using social media
A Abbas, M Ali, MUS Khan, SU Khan
Pervasive and Mobile Computing 28, 81-99, 2016
292016
A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach
AN Khan, MLM Kiah, M Ali, S Shamshirband
Journal of Grid Computing 13 (4), 651-675, 2015
292015
3D-RP: A DHT-based routing protocol for MANETs
SA Abid, M Othman, N Shah, M Ali, AR Khan
The Computer Journal 58 (2), 258-279, 2015
262015
Segregating spammers and unsolicited bloggers from genuine experts on Twitter
MUS Khan, M Ali, A Abbas, SU Khan, AY Zomaya
IEEE Transactions on Dependable and Secure Computing 15 (4), 551-560, 2016
202016
On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs)
MUS Khan, A Abbas, M Ali, M Jawad, SU Khan, K Li, AY Zomaya
IEEE Systems Journal 12 (1), 82-91, 2018
172018
A cloud based framework for identification of influential health experts from Twitter
A Abbas, MUS Khan, M Ali, SU Khan, LT Yang
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
162015
Pirax: framework for application piracy control in mobile cloud environment
M Othman, M Ali, AN Khan, SA Madani
The Journal of Supercomputing 68 (2), 753-776, 2014
162014
Stochastic and statistical analysis of utility revenues and weather data analysis for consumer demand estimation in smart grids
SM Ali, CA Mehmood, B Khan, M Jawad, U Farid, JK Jadoon, M Ali, ...
PloS one 11 (6), e0156849, 2016
82016
A fog-based security framework for intelligent traffic light control system
T Khalid, AN Khan, M Ali, A Adeel, J Shuja
Multimedia Tools and Applications 78 (17), 24595-24615, 2019
72019
Mitigation and improving sha-1 standard using collision detection approach
Z Al-Odat, M Ali, SU Khan
2018 International Conference on Frontiers of Information Technology (FIT …, 2018
72018
A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment
AN Khan, M Ali, AR Khan, FG Khan, IA Khan, W Jadoon, S Shamshirband, ...
International Journal of Communication Systems 30 (16), e3308, 2017
72017
The system can't perform the operation now. Try again later.
Articles 1–20