Elliptic curve cryptography based mutual authentication scheme for session initiation protocol R Arshad, N Ikram Multimedia tools and applications 66, 165-178, 2013 | 104 | 2013 |
Smart-wearable sensors and cnn-bigru model: A powerful combination for human activity recognition HA Imran, Q Riaz, M Hussain, H Tahir, R Arshad IEEE Sensors Journal, 2023 | 11 | 2023 |
Contributions to the theory of almost perfect nonlinear functions R Arshad | 4 | 2018 |
Machines perceive emotions: Identifying affective states from human gait using on-body smart devices HA Imran, Q Riaz, M Zeeshan, M Hussain, R Arshad Applied Sciences 13 (8), 4728, 2023 | 3 | 2023 |
Quantum and Post-Quantum Cybersecurity Challenges and Finance Organizations Readiness R Arshad, Q Riaz Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023 | 3 | 2023 |
A Novel Convertible Authenticated Encryption Scheme based on RSA Assumption R Arshad, N Ikram | 3 | 2010 |
A novel framework for the construction of cryptographically secure S-boxes R Arshad, M Jalil, M Hussain, A Tounsi Computers and Concrete 34 (1), 79-91, 2024 | 2 | 2024 |
Comment on Nizam Chew, L.C.; Ismail, E.S. S-box Construction Based on Linear Fractional Transformation and Permutation Function. Symmetry 2020, 12, 826 R Arshad, M Jalil Symmetry 15 (5), 1005, 2023 | 2 | 2023 |
Digital Transformations in Business and FinTech AA Zeerak, R Arshad, NN Abbas, UH Chaudhry Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023 | 2 | 2023 |
Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring. R Arshad, N Ikram Int. J. Netw. Secur. 14 (2), 117-120, 2012 | 2 | 2012 |
Comment to “A projective general linear group-based algorithm for the construction of substitution box for block ciphers” R Arshad, M Jalil Neural Computing and Applications 36 (3), 1495-1505, 2024 | 1 | 2024 |
Cryptanalysis and improvement on remote user mutual authentication scheme with smart cards R Arshad, N Ikram 2009 11th International Conference on Advanced Communication Technology 2 …, 2009 | 1 | 2009 |
A Secure and Efficient Multi-Step Multi-Index Image Encryption Scheme Using Hybrid Combination of Substitution, Permutation and Hyperchaotic Structure R Arshad, M Jalil, W Iqbal, UH Chaudhry Arabian Journal for Science and Engineering, 1-24, 2024 | | 2024 |
zk-DASTARK: A quantum-resistant, data authentication and zero-knowledge proof scheme for protecting data feed to smart contracts UH Chaudhry, R Arshad, A Khalid, IG Ray, M Hussain Preprints, 2023 | | 2023 |
Data Leakage in Business and FinTech UH Chaudhry, R Arshad, NN Abbas, AA Zeerak Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023 | | 2023 |