Design and analysis of lightweight authentication protocol for securing IoD SU Jan, F Qayum, HU Khan Ieee access 9, 69287-69306, 2021 | 63 | 2021 |
Identity and aggregate signature-based authentication protocol for IoD deployment military drone SU Jan, HU Khan IEEE Access 9, 130247-130263, 2021 | 48 | 2021 |
A key agreement scheme for IoD deployment civilian drone SU Jan, IA Abbasi, F Algarni IEEE Access 9, 149311-149321, 2021 | 45 | 2021 |
Secure patient authentication framework in the healthcare system using wireless medical sensor networks SU Jan, S Ali, IA Abbasi, MAA Mosleh, A Alsanad, H Khattak Journal of Healthcare Engineering 2021 (1), 9954089, 2021 | 43 | 2021 |
Issues and challenges in cloud storage architecture: a survey SU Jan, D Ghani, A A Alshdadi, A Daud Alshdadi, Abdulrahman and Daud, Ali, Issues and Challenges in Cloud Storage …, 2020 | 42 | 2020 |
An evaluation framework for communication and coordination processes in offshore software development outsourcing relationship: Using fuzzy methods RA Khan, MY Idris, SU Khan, M Ilyas, S Ali, AU Din, G Murtaza, AW Khan, ... IEEE Access 7, 112879-112906, 2019 | 34 | 2019 |
A verifiably secure ECC based authentication scheme for securing IoD using FANET SU Jan, IA Abbasi, F Algarni, AS Khan IEEE Access 10, 95321-95343, 2022 | 32 | 2022 |
[Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server N Khan, J Zhang, SU Jan Security and Communication Networks 2022 (1), 1943426, 2022 | 32 | 2022 |
Lmas-shs: A lightweight mutual authentication scheme for smart home surveillance SU Jan, IA Abbasi, MA Alqarni IEEE Access 10, 52791-52803, 2022 | 28 | 2022 |
A Mutual Authentication and Cross Verification Protocol for Securing Internet-of-Drones (IoD) SU Jan, IA Abbasi, F Algarni | 28 | 2022 |
Mitigating the desynchronisation attack in multiserver environment SU Jan, F Qayum IET Communications 14 (13), 2210-2221, 2020 | 27 | 2020 |
An Introduction to Computing (For All BS Degree Program students & Beginners in All Fields) SU Jan Available at SSRN 3351847, 2019 | 25 | 2019 |
Education in the Age of Technology: Contrasting Fortunes SU Jan Science Journal of Education 6 (2), 55-70, 2018 | 25 | 2018 |
An authentication scheme for distributed computing environment SU Jan, F Qayum International Journal of Information and Computer Security 13 (2), 227-248, 2020 | 24 | 2020 |
SIP Issues and Challenges–A Scalable Three Factor Authentication Scheme SU Jan Mehran University Research Journal of Engineering and Technology 39 (2), 287-309, 2020 | 23 | 2020 |
An Improved Forest Fire Alerting System Using Wireless Sensor Network SU Jan, F Khaliq Advances in Networks 6 (1), 21-39, 2018 | 21 | 2018 |
Implementation of smart card for promoting higher education in the developing world R Afzaal, K Adnan, SU Jan, ABA Ali 2022 2nd International Conference on Computing and Information Technology …, 2022 | 20 | 2022 |
A Robust Authentication Scheme for Client-Server Architecture with Provable Security Analysis JSU Qayum F Network and Communication Technologies 3 (1), 6-25, 2018 | 20 | 2018 |
Gender Wise Distribution of Income Using L-Moments Method M Alam, SU Jan, A Zeb, SU Jan Communication, Society and Media 2 (1), 29-40, 2019 | 19 | 2019 |
British Interest in the Subcontinent and the Immediate Transfer of Power M Salim, SU Jan The Athens Journal of History 5 (1), 53-65, 2019 | 19 | 2019 |