K
v
ire
.com
←
Back
Night
Docs
Library
Review
…
Author
Muhammad Khurram Khan
also known as Amjad Ali Khan ,Mohd Ilyas Surque, Colicchio, Dr. Muhammad Khan
Prince Sultan University · King Saud University · University of Warwick · University of New Brunswick
About this author
Works
774
Cited by
28,364
h-index
91
i10
416
ORCID ↗
Top papers
A survey on privacy protection in blockchain system
Qi Feng, Debiao He, Sherali Zeadally, et al.
·
2018
·
Journal of Network and Computer Applications
↗ 795
A Survey on Blockchain Technology: Evolution, Architecture and Security
Muhammad Nasir Mumtaz Bhutta, Amir A. Khwaja, Adnan Nadeem, et al.
·
2021
·
IEEE Access
↗ 495
OA
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey
Shuyun Shi, Debiao He, Li Li, et al.
·
2020
·
Computers & Security
↗ 405
OA
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
Muhammad Khurram Khan, Khaled Alghathbar
·
2010
·
Sensors
↗ 402
OA
A robust and anonymous patient monitoring system using wireless medical sensor networks
Ruhul Amin, SK Hafizul Islam, Gautam Biswas, et al.
·
2016
·
Future Generation Computer Systems
↗ 316
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
Ruhul Amin, SK Hafizul Islam, G. P. Biswas, et al.
·
2016
·
Computer Networks
↗ 307
Edge-computing-driven Internet of Things: A Survey
Linghe Kong, Jinlin Tan, Junqin Huang, et al.
·
2022
·
ACM Computing Surveys
↗ 305
Blockchain-based identity management systems: A review
Yang Liu, Debiao He, Mohammad S. Obaidat, et al.
·
2020
·
Journal of Network and Computer Applications
↗ 303
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET
Shi‐Jinn Horng, Shiang‐Feng Tzeng, Yi Pan, et al.
·
2013
·
IEEE Transactions on Information Forensics and Security
↗ 266
Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges
Linghe Kong, Muhammad Khurram Khan, Fan Wu, et al.
·
2017
·
IEEE Communications Magazine
↗ 260
An enhanced smart card based remote user password authentication scheme
Xiong Li, Jianwei Niu, Muhammad Khurram Khan, et al.
·
2013
·
Journal of Network and Computer Applications
↗ 258
Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs
Shiang‐Feng Tzeng, Shi‐Jinn Horng, Tianrui Li, et al.
·
2015
·
IEEE Transactions on Vehicular Technology
↗ 254
Books
Research, Innovation and Entrepreneurship in Saudi Arabia
2020
·
Taylor & Francis Group
Big Data and Security
2020
·
Springer Singapore Pte. Limited
Advanced Multimedia and Ubiquitous Engineering
2015
·
Springer Singapore Pte. Limited
Waqf in Islamic Economics and Finance
2024
·
Routledge, Chapman & Hall, Incorporated
Security Technology, Disaster Recovery and Business Continuity
2011
·
Springer
Advanced Communication and Networking
2010
·
Springer London, Limited
Cost-Effective Cybersecurity
2026
·
Springer
Security Technology
2011
·
Springer London, Limited