Energy Saving Secure Framework for Sensor Network using Elliptic Curve Cryptography S Ahmad, MR Beg, QamarAbbas IJCA Special Issue of Mobile Ad-hoc Networks, 167-172, 2012 | 64* | 2012 |
An Exhaustive Review on Security Issues in Cloud Computing. S Fatima, S Ahmad KSII Transactions on Internet & Information Systems 13 (6), 2019 | 27 | 2019 |
Comparative study between stream cipher and block cipher using RC4 and Hill Cipher S Ahmad, MR Beg, Q Abbas, J Ahmad, S Atif International Journal of Computer Applications 1 (25), 0975-8887, 2010 | 13 | 2010 |
A Comparative Study of Trends in Security in Cloud Computing AM Khan, S Ahmad, M Haroon Communication Systems and Network Technologies (CSNT), 2015 Fifth …, 2015 | 11 | 2015 |
Energy efficient sensor network security using Stream cipher mode of operation S Ahmad, MR Beg, Q Abbas IEEE Computer and Communication Technology (ICCCT), 2010 International …, 2010 | 11 | 2010 |
Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing S Fatima, S Ahmad International Journal of e-Collaboration (IJeC) 16 (1), 1-15, 2020 | 10 | 2020 |
Quantum Key Distribution Approach for Secure Authentication of Cloud Servers S Fatima, S Ahmad International Journal of Cloud Applications and Computing (IJCAC) 11 (3), 19-32, 2021 | 9 | 2021 |
Security Issues in Vehicular Ad Hoc Network: A Critical Survey M Arif, S Ahmad Intelligent Communication, Control and Devices, 527-536, 2018 | 8 | 2018 |
Meet In The Middle Attack: A Cryptanalysis Approach S Ahmad, MR Beg, J Ahmad, N Barua International Journal of Computer Applications 1 (25), 1-7, 2010 | 8* | 2010 |
Energy Saving Secure Framework for Sensor Network Using Elliptic Curve Cryptography S Ahmad, BM Rizwan, Q Abbas IJCA Special Issue on “Mobile Ad-Hoc Networks, 167-172, 2010 | 7 | 2010 |
Certificate Based Security Services in Adhoc Sensor Network S Fatima, S Ahmad, PM Khan BIJIT - BVICAM’s International Journal of Information Technology 6 (2), 2014 | 6 | 2014 |
SECURITY ISSUES IN CLOUD COMPUTING: A SURVEY S Fatima, S Ahmad, S Siddiqui International Journal of Advanced Research in Computer Science 9 (Special …, 2018 | 5 | 2018 |
Energy Efficient Image Compression Techniques in WSN N Bano, M Alam, S Ahmad Intelligent Communication, Control and Devices, 1079-1088, 2018 | 5 | 2018 |
X. 509 and PGP Public Key Infrastructure methods: A critical S Fatima, MS Ahmad, S Siddiqui IJRIT International Journal of Research in Information Technology 2 (5), 68-74, 2014 | 5* | 2014 |
Fault tolerance management for cloud environment: a critical review AA Shaikh, S Ahmad International Journal of Advanced Research in Computer Science 9, 34, 2018 | 4 | 2018 |
Evaluation of security risk associated with different network layers A Ali, MR Beg, S Ahmad, A Ali International Journal of Scientific & Engineering Research 3 (8), 2012 | 3 | 2012 |
Bio-Computing Based Algorithms for Cloud Security: A Critical Review A Srivastava, S Ahmad 2022 IEEE World Conference on Applied Intelligence and Computing (AIC), 894-900, 2022 | 2 | 2022 |
Energy Optimization in Cloud Computing: A Review AK Pandey, S Ahmad International Journal of Computer Sciences and Engineering 7, 249-256, 2019 | 2 | 2019 |
A comprehensive study on evolution, present scenario and future prospects of retailing A Pandey, DA Kaur International Journal of Current Research in Life Sciences 7 (02), 1158-1162, 2018 | 2 | 2018 |
Anomaly Detection in Wireless Sensor Networks-Critical Survey MS Yadav, S Ahamad | 2 | 2018 |