A secure ECC-based RFID mutual authentication protocol for internet of things AA Alamr, F Kausar, J Kim, C Seo The Journal of supercomputing 74, 4281-4294, 2018 | 99 | 2018 |
Digital watermarking for images security using discrete slantlet transform M Mundher, D Muhamad, A Rehman, T Saba, F Kausar Applied Mathematics & Information Sciences 8 (6), 2823, 2014 | 85 | 2014 |
An efficient key distribution scheme for heterogeneous sensor networks S Hussain, F Kausar, A Masood Proceedings of the 2007 international conference on Wireless communications …, 2007 | 78 | 2007 |
Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol Z Bilal, A Masood, F Kausar 2009 international conference on network-based information systems, 260-267, 2009 | 77 | 2009 |
Secure group communication with self-healing and rekeying in wireless sensor networks F Kausar, S Hussain, JH Park, A Masood Mobile Ad-Hoc and Sensor Networks: Third International Conference, MSN 2007 …, 2007 | 68 | 2007 |
Scalable and efficient key management for heterogeneous sensor networks F Kausar, S Hussain, LT Yang, A Masood The Journal of Supercomputing 45, 44-65, 2008 | 66 | 2008 |
Snapchat analysis to discover digital forensic artifacts on android smartphone T Alyahya, F Kausar Procedia Computer Science 109, 1035-1040, 2017 | 53 | 2017 |
Intelligent home monitoring using RSSI in wireless sensor networks F Kausar, E Al Eisa, I Bakhsh International Journal of Computer Networks & Communications 4 (6), 33, 2012 | 42 | 2012 |
A cluster-based key agreement scheme using keyed hashing for body area networks A Ali, S Irum, F Kausar, FA Khan Multimedia tools and applications 66, 201-214, 2013 | 39 | 2013 |
Iris based cancelable biometric cryptosystem for secure healthcare smart card F Kausar Egyptian Informatics Journal 22 (4), 447-453, 2021 | 35 | 2021 |
Hybrid client side phishing websites detection approach F Kausar, B Al-Otaibi, A Al-Qadi, N Al-Dossari International Journal of Advanced Computer Science and Applications (IJACSA …, 2014 | 33 | 2014 |
DHCP attacking tools: an analysis M Aldaoud, D Al-Abri, A Al Maashri, F Kausar Journal of Computer Virology and Hacking Techniques 17, 119-129, 2021 | 25 | 2021 |
Analysis of Internet Download Manager for collection of digital forensic artefacts M Yasin, AR Cheema, F Kausar Digital Investigation 7 (1-2), 90-94, 2010 | 24 | 2010 |
6G technology and taxonomy of attacks on blockchain technology F Kausar, FM Senan, HM Asif, K Raahemifar Alexandria Engineering Journal 61 (6), 4295-4306, 2022 | 20 | 2022 |
Traffic analysis attack for identifying users’ online activities F Kausar, S Aljumah, S Alzaydi, R Alroba IT Professional 21 (2), 50-57, 2019 | 18 | 2019 |
Security attacks and countermeasures on cloud assisted IoT applications A Alsaidi, F Kausar 2018 IEEE International Conference on Smart Cloud (SmartCloud), 213-217, 2018 | 18 | 2018 |
Leveraging ICN and SDN for future internet architecture: a survey M Aldaoud, D Al-Abri, M Awadalla, F Kausar Electronics 12 (7), 1723, 2023 | 17 | 2023 |
Key management and secure routing in heterogeneous sensor networks F Kausar, MQ Saeed, A Masood 2008 IEEE International Conference on Wireless and Mobile Computing …, 2008 | 16 | 2008 |
Analysis of download accelerator plus (dap) for forensic artefacts M Yasin, MA Wahla, F Kausar 2009 Fifth International Conference on IT Security Incident Management and …, 2009 | 15 | 2009 |
An authenticated key management scheme for hierarchical wireless sensor networks F Kausar, A Masood, S Hussain Advances in Communication Systems and Electrical Engineering, 85-98, 2008 | 15 | 2008 |