Follow
Dr. Shish Ahmad
Title
Cited by
Cited by
Year
Energy Saving Secure Framework for Sensor Network using Elliptic Curve Cryptography
S Ahmad, MR Beg, QamarAbbas
IJCA Special Issue of Mobile Ad-hoc Networks, 167-172, 2012
63*2012
An Exhaustive Review on Security Issues in Cloud Computing.
S Fatima, S Ahmad
KSII Transactions on Internet & Information Systems 13 (6), 2019
272019
Comparative study between stream cipher and block cipher using RC4 and Hill Cipher
S Ahmad, MR Beg, Q Abbas, J Ahmad, S Atif
International Journal of Computer Applications 1 (25), 0975-8887, 2010
142010
A Comparative Study of Trends in Security in Cloud Computing
AM Khan, S Ahmad, M Haroon
Communication Systems and Network Technologies (CSNT), 2015 Fifth …, 2015
122015
Dr. Shish Ahmad, Mohd. Haroon,“A Comparative Study of Trends in Security in Cloud Computing”
AM Khan
2015 Fifth International Conference on Communication Systems and Network …, 2015
12*2015
Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing
S Fatima, S Ahmad
International Journal of e-Collaboration (IJeC) 16 (1), 1-15, 2020
112020
Energy efficient sensor network security using Stream cipher mode of operation
S Ahmad, MR Beg, Q Abbas
IEEE Computer and Communication Technology (ICCCT), 2010 International …, 2010
112010
Quantum Key Distribution Approach for Secure Authentication of Cloud Servers
S Fatima, S Ahmad
International Journal of Cloud Applications and Computing (IJCAC) 11 (3), 19-32, 2021
102021
Security Issues in Vehicular Ad Hoc Network: A Critical Survey
M Arif, S Ahmad
Intelligent Communication, Control and Devices, 527-536, 2018
82018
Meet In The Middle Attack: A Cryptanalysis Approach
S Ahmad, MR Beg, J Ahmad, N Barua
International Journal of Computer Applications 1 (25), 1-7, 2010
8*2010
Energy Saving Secure Framework for Sensor Network Using Elliptic Curve Cryptography
S Ahmad, BM Rizwan, Q Abbas
IJCA Special Issue on “Mobile Ad-Hoc Networks, 167-172, 2010
72010
Certificate Based Security Services in Adhoc Sensor Network
S Fatima, S Ahmad, PM Khan
BIJIT - BVICAM’s International Journal of Information Technology 6 (2), 2014
62014
SECURITY ISSUES IN CLOUD COMPUTING: A SURVEY
S Fatima, S Ahmad, S Siddiqui
International Journal of Advanced Research in Computer Science 9 (Special …, 2018
52018
Energy Efficient Image Compression Techniques in WSN
N Bano, M Alam, S Ahmad
Intelligent Communication, Control and Devices, 1079-1088, 2018
52018
X. 509 and PGP Public Key Infrastructure methods: A critical
S Fatima, MS Ahmad, S Siddiqui
IJRIT International Journal of Research in Information Technology 2 (5), 68-74, 2014
5*2014
Fault tolerance management for cloud environment: a critical review
AA Shaikh, S Ahmad
International Journal of Advanced Research in Computer Science 9, 34, 2018
42018
Evaluation of security risk associated with different network layers
A Ali, MR Beg, S Ahmad, A Ali
International Journal of Scientific & Engineering Research 3 (8), 2012
32012
Bio-Computing Based Algorithms for Cloud Security: A Critical Review
A Srivastava, S Ahmad
2022 IEEE World Conference on Applied Intelligence and Computing (AIC), 894-900, 2022
22022
Energy Optimization in Cloud Computing: A Review
AK Pandey, S Ahmad
International Journal of Computer Sciences and Engineering 7, 249-256, 2019
22019
A comprehensive study on evolution, present scenario and future prospects of retailing
A Pandey, DA Kaur
International Journal of Current Research in Life Sciences 7 (02), 1158-1162, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20