A systematic threat analysis and defense strategies for the metaverse and extended reality systems S Qamar, Z Anwar, M Afzal Computers & Security 128, 103127, 2023 | 72 | 2023 |
FBASHI: Fuzzy and blockchain-based adaptive security for healthcare IoTs Z Zulkifl, F Khan, S Tahir, M Afzal, W Iqbal, A Rehman, S Saeed, ... IEEE Access 10, 15644-15656, 2022 | 55 | 2022 |
Behavioral based insider threat detection using deep learning R Nasir, M Afzal, R Latif, W Iqbal IEEE Access 9, 143266-143274, 2021 | 52 | 2021 |
Algebraic cryptanalysis of a nlfsr based stream cipher M Afzal, A Masood 2008 3rd International Conference on Information and Communication …, 2008 | 30 | 2008 |
Comparative analysis of S-boxes based on graphical SAC I Hussain, T Shah, H Mahmood, M Afzal International Journal of Computer Applications 2 (5), 5-8, 2010 | 29 | 2010 |
Correlation power analysis of modes of encryption in AES and its countermeasures S Fahd, M Afzal, H Abbas, W Iqbal, S Waheed Future Generation Computer Systems 83, 496-509, 2018 | 22 | 2018 |
On the security of LBlock against the cube attack and side channel cube attack S Islam, M Afzal, A Rashdi Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013 | 18 | 2013 |
Algebraic side channel attack on trivium and grain ciphers AR Kazmi, M Afzal, MF Amjad, H Abbas, X Yang IEEE Access 5, 23958-23968, 2017 | 16 | 2017 |
The comparative resistance of some recent releases of cotton cultivars to the insect-pest complex. MA Wahla, M Tufail, M Afzal, MN Tariq | 16 | 1998 |
A compact S-Box design for SMS4 block cipher I Abbasi, M Afzal IT Convergence and Services: ITCS & IRoA 2011, 641-658, 2011 | 15 | 2011 |
Differential meet-in-the-middle cryptanalysis C Boura, N David, P Derbez, G Leander, M Naya-Plasencia Annual International Cryptology Conference, 240-272, 2023 | 14 | 2023 |
A novel code attestation scheme against Sybil Attack in Wireless Sensor Networks I Makhdoom, M Afzal, I Rashid 2014 National Software Engineering Conference, 1-6, 2014 | 14 | 2014 |
An efficient elliptic curve based signcryption scheme for firewalls W Iqbal, M Afzal, F Ahmad 2013 2nd National Conference on Information Assurance (NCIA), 67-72, 2013 | 14 | 2013 |
Comparative Analysis of the Structures of eSTREAM Submitted Stream Ciphers M Afzal, F Kausar, A Masood 2006 International Conference on Emerging Technologies, 245-250, 2006 | 11 | 2006 |
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages AR Raza, K Mahmood, MF Amjad, H Abbas, M Afzal Future Generation Computer Systems 104, 43-59, 2020 | 10 | 2020 |
Combining algebraic and side channel attacks on stream ciphers AR Kazmi, M Afzal, MF Amjad, A Rashdi 2017 International Conference on Communication Technologies (ComTech), 138-142, 2017 | 9 | 2017 |
Kleptographic attack on elliptic curve based cryptographic protocols A Sajjad, M Afzal, MMW Iqbal, H Abbas, R Latif, RA Raza IEEE Access 8, 139903-139917, 2020 | 8 | 2020 |
Resistance of stream ciphers to algebraic recovery of internal secret states M Afzal, A Masood 2008 Third International Conference on Convergence and Hybrid Information …, 2008 | 8 | 2008 |
Improved results on algebraic cryptanalysis of A5/2 M Afzal, A Masood, N Shehzad Global E-Security: 4th International Conference, ICGeS 2008, London, UK …, 2008 | 8 | 2008 |
A critical review of whitefly (Bemisia tabaci gennadius) cryptic species associated with the cotton leaf curl disease M Afzal, S Saeed, H Riaz, M Ishtiaq, MH Rahman J. Innov. Sci 9, 24-43, 2023 | 7 | 2023 |