A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps S Kumari, X Li, F Wu, AK Das, H Arshad, MK Khan Future Generation Computer Systems 63, 56-75, 2016 | 177 | 2016 |
Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems H Arshad, M Nikooghadam Journal of medical systems 38, 1-12, 2014 | 158 | 2014 |
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme A Ostad-Sharif, H Arshad, M Nikooghadam, D Abbasinezhad-Mood Future Generation Computer Systems 100, 882-892, 2019 | 115 | 2019 |
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC H Arshad, M Nikooghadam Multimedia Tools and Applications 75 (1), 181-197, 2016 | 115 | 2016 |
A lightweight authentication and key agreement protocol preserving user anonymity M Nikooghadam, R Jahantigh, H Arshad Multimedia Tools and Applications 76 (11), 13401-13423, 2017 | 72 | 2017 |
On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems H Arshad, V Teymoori, M Nikooghadam, H Abbassi Journal of medical systems 39, 1-10, 2015 | 62 | 2015 |
Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol H Arshad, M Nikooghadam The Journal of Supercomputing 71 (8), 3163-3180, 2015 | 32 | 2015 |
Design of a secure authentication and key agreement scheme preserving user privacy usable in telecare medicine information systems H Arshad, A Rasoolzadegan Journal of medical systems 40, 1-19, 2016 | 31 | 2016 |
A secure authentication and key agreement scheme for roaming service with user anonymity H Arshad, A Rasoolzadegan International Journal of Communication Systems 30 (18), e3361, 2017 | 26 | 2017 |
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications C Johansen, A Mujaj, H Arshad, J Noll Security and Communication Networks, 2021 | 25* | 2021 |
An improved SIP authentication scheme based on server-oriented biometric verification A Irshad, S Kumari, X Li, F Wu, SA Chaudhry, H Arshad Wireless Personal Communications 97, 2145-2166, 2017 | 12 | 2017 |
Design and FPGA implementation of an efficient security mechanism for mobile pay‐TV systems H Arshad, M Nikooghadam, S Avezverdi, M Nazari International Journal of Communication Systems 30 (15), e3305, 2017 | 9 | 2017 |
Semantic Attribute-Based Access Control: A review on current status and future perspectives H Arshad, C Johansen, O Owe Journal of Systems Architecture: Embedded Software Design (JSA) 129, 1-24, 2022 | 6 | 2022 |
Semantic Attribute-Based Encryption: A Framework for Combining ABE schemes with Semantic Technologies H Arshad, C Johansen, O Owe, P Picazo-Sanchez, G Schneider Information Sciences, 1-33, 2022 | 3 | 2022 |
Attribute-Based Encryption with Enforceable Obligations H Arshad, P Picazo-Sanchez, C Johansen, G Schneider Journal of Cryptographic Engineering, 2023 | 2 | 2023 |
Process Algebra Can Save Lives: Static Analysis of XACML Access Control Policies using mCRL2 H Arshad, R Horne, C Johansen, O Owe, T Willemse Formal Techniques for Distributed Objects, Components, and Systems. FORTE …, 2022 | 2 | 2022 |
XACML2mCRL2: Automatic Transformation of XACML Policies into mCRL2 Specifications H Arshad, R Horne, C Johansen, O Owe, TAC Willemse Science of Computer Programming, 2024 | | 2024 |
Toward Semantic Attribute-Based Access Control: Fine-grained protection of data in e-Health H Arshad University of Oslo, 2022 | | 2022 |
A Survey of Semantic Attribute-Based Access Control Schemes H Arshad Workshop on Programming Theory, 13, 2018 | | 2018 |