Seguir
Mazhar Ali
Mazhar Ali
Associate Professor, Computer Science Department, COMSATS University Islamabad, Abbottabad campus
Dirección de correo verificada de cuiatd.edu.pk
Título
Citado por
Citado por
Año
Security in cloud computing: Opportunities and challenges
M Ali, SU Khan, AV Vasilakos
Information sciences 305, 357-383, 2015
10872015
SeDaSC: secure data sharing in clouds
M Ali, R Dhamotharan, E Khan, SU Khan, AV Vasilakos, K Li, AY Zomaya
IEEE Systems Journal 11 (2), 395-404, 2017
2612017
A taxonomy and survey on green data center networks
K Bilal, SUR Malik, O Khalid, A Hameed, E Alvarez, V Wijaysekara, R Irfan, ...
Future Generation Computer Systems 36, 189-208, 2014
2542014
Incremental proxy re-encryption scheme for mobile cloud computing environment
AN Khan, MLM Kiah, SA Madani, M Ali, AR Khan, S Shamshirband
The Journal of Supercomputing 68, 624-651, 2014
1312014
DROPS: Division and replication of data in the cloud for optimal performance and security
M Ali, K Bilal, S Khan, B Veeravalli, K Li, A Zomaya
IEEE Transactions on Cloud computing 6 (2), 303-315, 2018
1032018
Towards a fog enabled efficient car parking architecture
KS Awaisi, A Abbas, M Zareei, HA Khattak, MUS Khan, M Ali, IU Din, ...
IEEE Access 7, 159100-159111, 2019
952019
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
AN Khan, MLM Kiah, M Ali, SA Madani, AUR Khan, S Shamshirband
The Journal of Supercomputing 70, 946-976, 2014
852014
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
AN Khan, ML Mat Kiah, SA Madani, AR Khan, M Ali
The Journal of Supercomputing 66, 1687-1706, 2013
742013
DaSCE: Data security for cloud environment with semi-trusted third party
M Ali, S Malik, S Khan
IEEE Transactions on Cloud Computing 5 (4), 642-655, 2017
682017
A survey on energy-efficient methodologies and architectures of network-on-chip
A Abbas, M Ali, A Fayyaz, A Ghosh, A Kalra, SU Khan, MUS Khan, ...
Computers & Electrical Engineering 40 (8), 333-347, 2014
562014
A survey on privacy and access control schemes in fog computing
T Khalid, MAK Abbasi, M Zuraiz, AN Khan, M Ali, RW Ahmad, ...
International Journal of Communication Systems 34 (2), e4181, 2021
512021
A multi‐attack resilient lightweight IoT authentication scheme
A Adeel, M Ali, AN Khan, T Khalid, F Rehman, Y Jararweh, J Shuja
Transactions on Emerging Telecommunications Technologies 33 (3), e3676, 2022
492022
Personalized healthcare cloud services for disease risk assessment and wellness management using social media
A Abbas, M Ali, MUS Khan, SU Khan
Pervasive and Mobile Computing 28, 81-99, 2016
492016
Segregating spammers and unsolicited bloggers from genuine experts on twitter
MUS Khan, M Ali, A Abbas, SU Khan, AY Zomaya
IEEE Transactions on Dependable and Secure Computing 15 (4), 551-560, 2016
462016
A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach
AN Khan, ML Mat Kiah, M Ali, S Shamshirband, AR Khan
Journal of Grid Computing 13, 651-675, 2015
462015
A survey on privacy-preserving authentication schemes in VANETs: Attacks, challenges and open issues
SA Jan, NU Amin, M Othman, M Ali, AI Umar, A Basir
IEEE Access 9, 153701-153726, 2021
412021
A fog-based security framework for intelligent traffic light control system
T Khalid, AN Khan, M Ali, A Adeel, A ur Rehman Khan, J Shuja
Multimedia Tools and Applications 78, 24595-24615, 2019
402019
Bot detection using a single post on social media
S Mohammad, MUS Khan, M Ali, L Liu, M Shardlow, R Nawaz
2019 third world conference on smart trends in systems security and …, 2019
392019
3D-RP: A DHT-based routing protocol for MANETs
SA Abid, M Othman, N Shah, M Ali, AR Khan
The Computer Journal 58 (2), 258-279, 2015
392015
On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs)
MUS Khan, A Abbas, M Ali, M Jawad, SU Khan, K Li, AY Zomaya
IEEE Systems Journal 12 (1), 82-91, 2018
372018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20