Position based and hybrid routing protocols for mobile ad hoc networks: a survey BA Mahmood, D Manivannan Wireless personal communications 83, 1009-1033, 2015 | 34 | 2015 |
A secure framework for sharing electronic health records over clouds A Ibrahim, B Mahmood, M Singhal 2016 IEEE International Conference on Serious Games and Applications for …, 2016 | 30 | 2016 |
Hybrid on-demand greedy routing protocol with backtracking for mobile ad-hoc networks BA Mahmood, D Manivanann International Journal of Pervasive Computing and Communications 16 (1), 24-52, 2020 | 12 | 2020 |
An extensive analysis of the ad hoc network MM Rashid, M Isawi, BA Mahmood Proceedings of the 6th International Conference on Engineering & MIS 2020, 1-9, 2020 | 7 | 2020 |
A secure framework for medical information exchange (MI-X) between healthcare providers A Ibrahim, B Mahmood, M Singhal 2016 IEEE International Conference on Healthcare Informatics (ICHI), 234-243, 2016 | 7 | 2016 |
Sariadne: A secure source routing protocol to prevent hidden-channel attacks B Mahmood, A Ibrahim, D Manivannan 2016 IEEE 12th International Conference on Wireless and Mobile Computing …, 2016 | 5 | 2016 |
Grb: Greedy routing protocol with backtracking for mobile ad-hoc networks BA Mahmood, D Manivannan 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems …, 2015 | 5 | 2015 |
Secure message transmission scheme in wireless sensor networks KA Ameen, BA Mahmood, YNA Taher Bulletin of Electrical Engineering and Informatics 10 (3), 1514-1523, 2021 | 4 | 2021 |
A secure and energy saving protocol for wireless sensor networks AA Majeed, BA Mahmood, AC Shakir Bulletin of Electrical Engineering and Informatics 10 (6), 3353-3360, 2021 | 2 | 2021 |
An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks BA Mahmood, AA Majeed, AC Shakir Indonesian Journal of Electrical Engineering and Computer Science 21 (2 …, 2021 | 2 | 2021 |
A Review of Assured Data Deletion Security Techniques in Cloud Storage SM Khudaier, BA Mahmood Iraqi Journal of Science, 2492-2511, 2023 | 1 | 2023 |
Assured data deletion in cloud computing: security analysis and requirements KQ Aziz, BA Mahmood Indonesian Journal of Electrical Engineering and Computer Science 28 (2 …, 2022 | 1 | 2022 |
GRB: greedy routing protocol with backtracking for mobile ad hoc network (extended version) BA Mahmood, D Manivannan arXiv preprint arXiv:1804.01133, 2018 | 1 | 2018 |
A Secure Source Routing Protocol for Mobile Ad Hoc Networks. BA Mahmood, D Manivannan International Journal of Next-Generation Computing 11 (3), 2020 | | 2020 |
Routing and Security in Mobile Ad Hoc Networks BA Mahmood | | 2016 |