[go: up one dir, main page]

Follow
Dr. Noor Ul Amin
Dr. Noor Ul Amin
Associate Professor, Hazara University Mansehra
Verified email at hu.edu.pk
Title
Cited by
Cited by
Year
An efficient and provably secure certificateless key-encapsulated signcryption scheme for flying ad-hoc network
MA Khan, I Ullah, S Nisar, F Noor, IM Qureshi, FU Khanzada, NU Amin
IEEe Access 8, 36807-36828, 2020
842020
A survey on privacy-preserving authentication schemes in VANETs: Attacks, challenges and open issues
SA Jan, NU Amin, M Othman, M Ali, AI Umar, A Basir
IEEE Access 9, 153701-153726, 2021
832021
An efficient and provable secure certificate-based combined signature, encryption and signcryption scheme for internet of things (IoT) in mobile health (M-health) system
I Ullah, NU Amin, MA Khan, H Khattak, S Kumari
Journal of Medical Systems 45 (1), 1-14, 2020
612020
A lightweight identity-based signature scheme for mitigation of content poisoning attack in named data networking with internet of things
SS Ullah, I Ullah, H Khattak, MA Khan, M Adnan, S Hussain, NU Amin, ...
IEEE Access 8, 98910-98928, 2020
602020
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
J Iqbal, AI Umar, N Amin, A Waheed
International Journal of Distributed Sensor Networks 15 (9), 1550147719875654, 2019
542019
Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN)
I Ullah, S Zeadally, NU Amin, MA Khan, H Khattak
Microprocessors and Microsystems 81, 103477, 2021
432021
An energy efficient and formally secured certificate-based signcryption for wireless body area networks with the internet of things
I Ullah, A Alomari, N Ul Amin, MA Khan, H Khattak
Electronics 8 (10), 1171, 2019
432019
A lightweight and secured certificate-based proxy signcryption (CB-PS) scheme for E-prescription systems
I Ullah, NU Amin, A Almogren, MA Khan, MI Uddin, Q Hua
IEEE Access 8, 199197-199212, 2020
422020
Content-based image retrieval using texture color shape and region
SH Shirazi, AI Umar, S Naz, I Razzak, B AlHaqbani
Deakin University, 2016
402016
A lightweight and provable secured certificateless signcryption approach for crowdsourced IIoT applications
I Ullah, N Ul Amin, M Zareei, A Zeb, H Khattak, A Khan, S Goudarzi
Symmetry 11 (11), 1386, 2019
392019
Analysis of S-box image encryption based on generalized fuzzy soft expert set
S Abdullah, NU Amin
Nonlinear Dynamics 79 (3), 1679-1692, 2015
372015
A Novel Provable Secured Signcryption Scheme 𝒫𝒮𝒮𝒮: A Hyper-Elliptic Curve-Based Approach
I Ullah, NU Amin, J Khan, M Rehan, M Naeem, H Khattak, SJ Khattak, ...
Mathematics 7 (8), 686, 2019
312019
Threshold-based Steganography: A Novel Technique for Improved Payload and SNR.
Z Khan, M Shah, M Naeem, T Mahmood, S Khan, N Ul Amin, D Shahzad
International Arab Journal of Information Technology (IAJIT) 13 (4), 2016
292016
Preventing black and gray hole attacks in AODV using optimal path routing and hash
H Khattak, F Khurshid, N ul Amin
2013 10th Ieee International Conference On Networking, Sensing And Control …, 2013
272013
Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem
SA Ch, N Amin
8th international conference on high-capacity optical networks and emerging …, 2011
272011
Towards the design of efficient and secure architecture for software-defined vehicular networks
M Adnan, J Iqbal, A Waheed, NU Amin, M Zareei, A Umer, EM Mohamed
Sensors 21 (11), 3902, 2021
262021
An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem
NU Amin, M Asad, SA Chaudhry
Proceedings of 2012 9th IEEE International Conference on Networking, Sensing …, 2012
252012
On the design of efficient hierarchic architecture for software defined vehicular networks
M Adnan, J Iqbal, A Waheed, NU Amin, M Zareei, S Goudarzi, A Umer
Sensors 21 (4), 1400, 2021
222021
A Cost Effective Identity‐Based Authentication Scheme for Internet of Things‐Enabled Agriculture
B Hassan, AA AlSanad, I Ullah, NU Amin, MA Khan, MI Uddin, JMT Wu
Wireless Communications and Mobile Computing 2022 (1), 4275243, 2022
212022
Cryptanalysis and improvement of a proxy signcryption scheme in the standard computational model
A Waheed, AI Umar, M Zareei, N Din, NU Amin, J Iqbal, Y Saeed, ...
IEEE Access 8, 131188-131201, 2020
192020
The system can't perform the operation now. Try again later.
Articles 1–20