On security and privacy issues of fog computing supported Internet of Things environment K Lee, D Kim, D Ha, U Rajput, H Oh 2015 6th International Conference on the Network of the Future (NOF), 1-3, 2015 | 203 | 2015 |
A hierarchical privacy preserving pseudonymous authentication protocol for VANET U Rajput, F Abbas, H Oh Ieee Access 4, 7770-7784, 2016 | 98 | 2016 |
A hybrid approach for efficient privacy-preserving authentication in VANET U Rajput, F Abbas, H Eun, H Oh IEEE Access 5, 12014-12030, 2017 | 92 | 2017 |
Cacppa: A cloud-assisted conditional privacy preserving authentication protocol for vanet U Rajput, F Abbas, J Wang, H Eun, H Oh 2016 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2016 | 28 | 2016 |
A two level privacy preserving pseudonymous authentication protocol for VANET U Rajput, F Abbas, H Eun, R Hussain, H Oh 2015 IEEE 11th International Conference on Wireless and Mobile Computing …, 2015 | 26 | 2015 |
A simple yet efficient approach to combat transaction malleability in bitcoin U Rajput, F Abbas, R Hussain, H Eun, H Oh Information Security Applications: 15th International Workshop, WISA 2014 …, 2015 | 22 | 2015 |
A solution towards eliminating transaction malleability in bitcoin U Rajput, F Abbas, H Oh Journal of Information Processing Systems 14 (4), 837-850, 2018 | 19 | 2018 |
PRISM: PRivacy-aware interest sharing and matching in mobile social networks F Abbas, U Rajput, H Oh IEEE Access 4, 2594-2603, 2016 | 15 | 2016 |
5G future technology: Research challenges for an emerging wireless networks MA Panhwar, M SullemanMemon, S Saddar, U Rajput Int. J. Comput. Sci. Netw. Secur 17 (12), 201-206, 2017 | 14 | 2017 |
Self-healing in Operating Systems A Manzoor, U Rajput, N Phulpoto, F Abbas, M Rajput IJCSNS International Journal of Computer Science and Network Security 18 (5 …, 2018 | 10 | 2018 |
A trustless broker based protocol to discover friends in proximity-based mobile social networks F Abbas, U Rajput, R Hussain, H Eun, H Oh Information Security Applications: 15th International Workshop, WISA 2014 …, 2015 | 6 | 2015 |
An efficient Sindhi spelling checker for Microsoft Word IA Dahar, F Abbas, U Rajput, A Hussain, F Azhar Int. J. Comput. Sci. Netw. Secur, 144-150, 2018 | 5 | 2018 |
Security threats and countermeasures in software defined networks A Ahmed, A Manzoor, IA Halepoto, F Abbas, U Rajput International Journal Of Computer Science And Network Security 18 (4), 69-74, 2018 | 4 | 2018 |
Energy Harvesting Relaying Network with Hardware Impairments in eta-mu Fading Environment A Hussain, Z Ahmed, U Rajput, F Abbas, I Ali International Journal of Computer Science and Network Security 18 (4), 63-68, 2018 | 3 | 2018 |
Non‐linear energy harvesting dual‐hop DF relaying system over η− μ fading channels A Hussain, NH Phulpoto, U Rajput, F Abbas, ZA Baloch Int. J. Adv. Comput. Sci. Appl. 9 (6), 423-426, 2018 | 2 | 2018 |
On the use of Multipath Transmission using SCTP IA Halepoto, MS Memon, NH Phulpoto, U Rajput, MY Junejo International Journal of Computer Science and Network Security (IJCSNS) 18 …, 2018 | 2 | 2018 |
Say hello again: Privacy preserving matchmaking using cloud in encounter based mobile social networks F Abbas, U Rajput, J Wang, H Eun, H Oh 2016 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2016 | 2 | 2016 |
Enhancing Security of Urdu Language Websites through Urdu CAPTCHA IA Dahar, FA Alvi, U Rajput International Journal of Computer Science and Network Security 20 (11), 142-151, 2020 | 1 | 2020 |
Privacy Preserving Location-Based Services Through K-Anonymized Vehicu-lar Social Network U Rajput, A Ansari, S Zai, A Narwani Quaid-E-Awam University Research Journal of Engineering, Science …, 2020 | 1 | 2020 |
An Efficient approach for Firearms Detection using Machine Learning A Rahoo, FA Alvi, U Rajput, IA Halepoto VFAST Transactions on Software Engineering 11 (2), 94-99, 2023 | | 2023 |