Blockchain-enabled Secure Communication Framework for Enhancing Trust and Access Control in the Internet of Vehicles (IoV)
March 18, 2025
IEEE Access - Accepted
Unveiling the Dynamic Landscape of Digital Forensics: The Endless Pursuit
December 11, 2024
Computers - Volume 13(12), Article Number 333
AdamW+: Machine Learning Framework to Detect Domain Generation Algorithms for Malware
June 11, 2024
IEEE Access - Volume 12, Pages 79138-79150
Advancing Snort IPS to Achieve Line Rate Traffic Processing for Effective Network Security Monitoring
May 07, 2024
IEEE Access - Volume 12, Pages 61848-61859
Privacy Preserving Inference for Deep Neural Networks: Optimizing Homomorphic Encryption for Efficient and Secure Classification
January 22, 2024
IEEE Access - Volume:12, Page:15684-15695
Privacy Preserving and Serverless Homomorphic-based Searchable Encryption as a Service (SEaaS)
October 23, 2023
IEEE Access - Volume 11, Pages 115204-115218
A homomorphic approach for security and privacy preservation of Smart Airports
April 01, 2023
Future Generation Computer Systems - Volume 141, Pages 500-513
A Novel Image-Based Homomorphic Approach for Preserving the Privacy of Autonomous Vehicles Connected to the Cloud
February 01, 2023
IEEE Transactions on Intelligent Transportation Systems - Volume 24, Issue 2, Pages 1936-1948
A Novel Approach to Reduce Breaches of Aircraft Communication Data
December 30, 2022
Electronics - Volume 12, Issue 1, Article Number 172
Security and Privacy Guidelines for IT Operations Under Pandemics and Epidemics
November 07, 2022
Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications - Chapter 7, Pages 130-145
Privacy-Preserving Computing via Homomorphic Encryption: Performance, Security, and Application Analysis
November 07, 2022
Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications - Chapter 15, Pages 288-313
Cloud Ecosystem-Prevalent Threats and Countermeasures
November 07, 2022
Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications - Chapter 8, Pages 146-173
A portable hardware security module and cryptographic key generator
November 01, 2022
Journal of Information Security and Applications - Volume 70, Article Number 103332
A novel searchable encryption scheme to reduce the access pattern leakage
August 01, 2022
Future Generation Computer Systems - Volume 133, Pages 338-350
ENCVIDC: an innovative approach for encoded video content classification
June 21, 2022
Neural Computing and Applications - Pages 1-18
A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine
June 11, 2022
Sensors - Volume 22(12), Article Number 4432
HLSBD2: a quantum secure hybrid level source based data deduplication for the cloud
May 17, 2022
Journal of Ambient Intelligence and Humanized Computing - Pages 1-14
Water Is a Viable Data Storage Medium: A Security and Privacy Viewpoint
March 05, 2022
Electronics - Volume 11(5), Article Number 818
FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs
February 11, 2022
IEEE Access - Volume 10, Pages 15644-15656
A novel ICMetric public key framework for secure communication
December 01, 2021
Journal of Networks and Computer Applications - Volume 195, Article Number 103235
Privacy-preserving COVID-19 Contact Tracing using Blockchain
October 01, 2021
Journal of Communications and Networks - -
A novel trust management model for edge computing
September 14, 2021
Complex & Intelligent Systems - Pages 1-17
PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS
July 15, 2021
Electronics - Volume 10(14), Article Number 1691
Granular Data Access Control with a Patient-Centric Policy Update for Healthcare
May 20, 2021
Sensors - Volume 21(10), Article Number 3556
A new secure authentication based distance bounding protocol
May 06, 2021
PeerJ Computer Science - Volume 7, Article Number e517
Malicious Insider Attack Detection in IoTs Using Data Analytics
January 17, 2020
IEEE Access - Volume 8, Pages 11743 - 11753
Key-Based Cookie-Less Session Management Framework for Application Layer Security
September 11, 2019
IEEE Access - Volume 7, Pages 128544-128554
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment
January 01, 2019
Computer Communications - Volume 133, Pages 102-114
A parallelized disjunctive query based searchable encryption scheme for big data
June 02, 2018
Future Generation Computer Systems - -
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data
August 09, 2017
IEEE Transactions on Emerging Topics in Computing - -
ICMetric-Based Secure Communication
February 01, 2016
Book on Innovative Solutions for Access Control Management - Chapter 10, Pages 263-293