Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment Z Ullah, B Raza, H Shah, S Khan, A Waheed IEEE access 10, 36978-36994, 2022 | 55 | 2022 |
Security challenges of location privacy in VANETs and state-of-the-art solutions: A survey S Khan, I Sharma, M Aslam, MZ Khan, S Khan Future Internet 13 (4), 96, 2021 | 47 | 2021 |
An efficient and secure revocation-enabled attribute-based access control for eHealth in smart society S Khan, W Iqbal, A Waheed, G Mehmood, S Khan, M Zareei, RR Biswal Sensors 22 (1), 336, 2022 | 19 | 2022 |
An efficient qos-based multi-path routing scheme for smart healthcare monitoring in wireless body area networks G Mehmood, MZ Khan, AK Bashir, YD Al-Otaibi, S Khan Computers and Electrical Engineering 109, 108517, 2023 | 18 | 2023 |
ABKS-PBM: Attribute-based keyword search with partial bilinear map S Khan, S Khan, M Zareei, F Alanazi, N Kama, M Alam, A Anjum IEEE Access 9, 46313-46324, 2021 | 5 | 2021 |
Oo-abms: Online/offline-aided attribute-based multi-keyword search S Khan, M Zareei, S Khan, F Alanazi, M Alam, A Waheed IEEE Access 9, 114392-114406, 2021 | 4 | 2021 |
An ultra low power and high throughput fpga implementation of sha-1 hash algorithm S Khan, SS Paracha International Journal of Computer Science and Information Security 12 (8), 80, 2014 | 4 | 2014 |
Secure semantic search using deep learning in a blockchain-assisted multi-user setting S Khan, H Abbas, M Binsawad Journal of Cloud Computing 13 (1), 29, 2024 | | 2024 |
Verifiable Privacy-Preserving Image Retrieval in Multi-Owner Multi-User Settings S Khan, H Abbas, W Iqbal IEEE Transactions on Emerging Topics in Computational Intelligence, 2024 | | 2024 |
Evaluation of Cryptanalytic Algorithm for A5/2 Stream Cipher S Khan, SS Peracha, ZUA Tariq International Journal of Computer Science and Information Security 12 (4), 8, 2014 | | 2014 |