Fisher score and Matthews correlation coefficient-based feature subset selection for heart disease diagnosis using support vector machines SM Saqlain, M Sher, FA Shah, I Khan, MU Ashraf, M Awais, A Ghani Knowledge and Information Systems 58, 139-167, 2019 | 139 | 2019 |
Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key A Ghani, K Mansoor, S Mehmood, SA Chaudhry, AU Rahman, ... International Journal of Communication Systems 32 (16), e4139, 2019 | 109 | 2019 |
Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography K Mansoor, A Ghani, SA Chaudhry, S Shamshirband, SAK Ghayyur, ... Sensors 19 (21), 4752, 2019 | 101 | 2019 |
A robust authentication and access control protocol for securing wireless healthcare sensor networks Z Ali, A Ghani, I Khan, SA Chaudhry, SKH Islam, D Giri Journal of Information Security and Applications 52, 102502, 2020 | 95 | 2020 |
A single round-trip sip authentication scheme for voice over internet protocol using smart card A Irshad, M Sher, E Rehman, SA Ch, MU Hassan, A Ghani Multimedia Tools and Applications 74, 3967-3984, 2015 | 80 | 2015 |
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography SA Ch, N Uddin, M Sher, A Ghani, H Naqvi, A Irshad Multimedia Tools and Applications 74, 1711-1723, 2015 | 58 | 2015 |
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme A Irshad, M Sher, MS Faisal, A Ghani, M Ul Hassan, S Ashraf Ch Security and Communication Networks 7 (8), 1210-1218, 2014 | 52 | 2014 |
Issues and challenges in Cloud Storage Architecture: A Survey A Ghani, A Badshah, SU Jan, AA Alshdadi, A Daud Researchpedia Journal of Computing 1 (1), 50-65, 2020 | 47* | 2020 |
Performance-based Service Level Agreement in Cloud Computing to Optimize Penalties and Revenue A Badshah, A Ghani, S Shamshirband, G Aceto, A Pescape IET Communications 14 (7), 1102-1112, 2020 | 45 | 2020 |
Smart Security Framework for Educational Institutions Using Internet of Things (IoT) Afzal Badshah, Anwar Ghani, Muhammad Ahsan Qureshi, Shahaboddin Shamshirband Computers, Materials & Continua 61 (1), 81-101, 2019 | 45 | 2019 |
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks S Ali, A Humaria, MS Ramzan, I Khan, SM Saqlain, A Ghani, J Zakia, ... International journal of distributed sensor networks 16 (6), 1550147720925772, 2020 | 43 | 2020 |
IPS: Incentive and Punishment Scheme for Omitting Selfishness in the Internet of Vehicles (IoV) Ghani-ur-Rehman, G Anwar, Z Muhammad, N Hasnain, S Dhananjay, ... IEEE Access 7 (1), 109026-109037, 2019 | 43 | 2019 |
Authentication and Secure Key Management in E-Health Services: A Robust and Efficient Protocol using Biometrics Z Mehmood, A Ghani, G Chen, AS Alghamdi IEEE Access 7, 113385-113397, 2019 | 36 | 2019 |
Detection of cardiovascular disease based on PPG signals using machine learning with cloud computing T Sadad, SAC Bukhari, A Munir, A Ghani, AM El-Sherbeeny, HT Rauf Computational Intelligence and Neuroscience 2022 (1), 1672677, 2022 | 35 | 2022 |
PSDS–Proficient Security over Distributed Storage: A Method for Data Transmission in Cloud F Shahid, H Ashraf, A Ghani, G Khan, Shahbaz Ahmed, S Shamshirband, ... IEEE Access 8, 118285-118298, 2020 | 34 | 2020 |
A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment A Irshad, SA Chaudhry, A Ghani, M Bilal Computer Networks 195, 108219, 2021 | 26 | 2021 |
Selfishness in vehicular delay-tolerant networks: a review GU Rehman, A Ghani, S Muhammad, M Singh, D Singh Sensors 20 (10), 3000, 2020 | 26 | 2020 |
Optimising infrastructure as a service provider revenue through customer satisfaction and efficient resource provisioning in cloud computing B Afzal, G Anwar, S Shahboddin, Anthony, T, Chronopoulos IET Communications 13 (18), 2913-2922, 2019 | 26* | 2019 |
A provable and secure mobile user authentication scheme for mobile cloud computing services A Irshad, SA Chaudhry, M Shafiq, M Usman, M Asif, A Ghani International Journal of Communication Systems 32 (14), e3980, 2019 | 23 | 2019 |
An efficient key agreement with rekeying for secured body sensor networks Z Mehmood, SA Ch, W Nasar, A Ghani 2012 Second International Conference on Digital Information Processing and …, 2012 | 21 | 2012 |