• Data Obfuscation for Privacy and Confidentiality in Cloud Computing 

      Khan, Khaled M.; Shaheen, Mahboob ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
    • Design and Analysis of Lightweight Authentication Protocol for Securing IoD 

      Jan, Saeed Ullah; Qayum, Fawad; Khan, Habib Ullah ( IEEE , 2021 , Article)
      The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. ...
    • Leveraging utilization as performance metric for CDN enabled energy efficient internet of things 

      Ul Islam S.; Khattak H.A.; Pierson J.-M.; Din I.U.; Almogren A.; ... more authors ( Elsevier B.V. , 2019 , Article)
      The exponential increase in the Internet of Things (IoT) has drastically augmented the need for computing and storage resources. IoT devices generate massive data that requires to be efficiently stored and disseminated for ...
    • A Lightweight Privacy-Aware IoT-Based Metering Scheme for Smart Industrial Ecosystems 

      Ali, Wajahat; Din, Ikram Ud; Almogren, Ahmad; Guizani, Mohsen; Zuair, Mansour ( IEEE Computer Society , 2021 , Article)
      The smart grid emerges as a new era of the electronic power grid. It integrates advanced sensing technologies, communications, and controlling methods that tell how electricity travels from different generation points to ...
    • Performance analysis of secure AF relay networks using cooperative jamming under outdated CSI 

      Mabrouk, Asma; Tourki, Kamel; Hasna, Mazen O.; Hamdi, Noureddine ( Institution of Engineering and Technology , 2017 , Article)
      This paper studies cooperative transmission for securing a two-hop network where the eavesdropper can wiretap the relay channels. With outdated channel state information (CSI), we propose an opportunistic relaying with ...
    • PriviPK: Certificate-less and secure email communication 

      AlSabah, Mashael; Tomescu, Alin; Lebedev, Ilia; Serpanos, Dimitrios; Devadas, Srini ( Elsevier Ltd , 2017 , Article)
      We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ...
    • Secure cloud services: Matrix multiplication revisited 

      Khan, Khaled M.; Shaheen, Mahboob ( IEEE , 2013 , Conference Paper)
      This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
    • Using block cipher for confidentiality of images in cloud-based systems 

      Rihan, Rana Adnan; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...