Secure and practical access control mechanism for WSN with node privacy U Iqbal, AH Mir Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 34 | 2022 |
Implementation of node authentication for WSN using hash chains AH Moon, U Iqbal, GM Bhat Procedia Computer Science 89, 90-98, 2016 | 23 | 2016 |
Mutual entity authentication protocol based on ECDSA for WSN AH Moon, U Iqbal, GM Bhat Procedia Computer Science 89, 187-192, 2016 | 23 | 2016 |
Secure and scalable access control protocol for IoT environment U Iqbal, AH Mir Internet of Things 12, 100291, 2020 | 22 | 2020 |
A provable and secure key exchange protocol based on the elliptical curve diffe–hellman for wsn U Iqbal, S Shafi Advances in Big Data and Cloud Computing: Proceedings of ICBDCC18, 363-372, 2019 | 22 | 2019 |
Efficient and dynamic access control mechanism for secure data acquisition in IoT environment U Iqbal, AH Mir International Journal of Computing and Digital Systems 10 (1), 9-28, 2021 | 20 | 2021 |
Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices SN Bukhari, MA Dar, U Iqbal 2018 fourth international conference on advances in electrical, electronics …, 2018 | 20 | 2018 |
A novel secure authentication protocol for IoT and cloud servers U Iqbal, A Tandon, S Gupta, AR Yadav, R Neware, FW Gelana Wireless Communications and Mobile Computing 2022, 2022 | 14 | 2022 |
Secured data acquisition system for smart water applications using WSN AH Moon, U Iqbal, GM Bhat Indian Journal of Science and Technology, 2016 | 14 | 2016 |
Light weight authentication framework for WSN AH Moon, U Iqbal, GM Bhat 2016 International Conference on Electrical, Electronics, and Optimization …, 2016 | 14 | 2016 |
Intelligent Hospitals based on IOT U Iqbal, MA Dar, SN Bukhari 2018 Fourth International Conference on Advances in Electrical, Electronics …, 2018 | 13 | 2018 |
Security in wireless sensor networks using ECC N Saqib, U Iqbal 2016 IEEE International Conference on Advances in Computer Applications …, 2016 | 13 | 2016 |
Authentication protocols for WSN using ECC and hidden generator AH Moon, K Ummer International Journal of Computer Applications 133 (13), 42-47, 2016 | 11 | 2016 |
Simulating and analysing security attacks in wireless sensor networks using QualNet AH Moon, NA Shah, U Iqbal, A Ayub 2013 International Conference on Machine Intelligence and Research …, 2013 | 11 | 2013 |
Evaluation of Security and Privacy of Smartphone Users MA Dar, SN Bukhari, UI Khan 2018 Fourth International Conference on Advances in Electrical, Electronics …, 2018 | 8 | 2018 |
Simulating and analyzing RREQ flooding attack in Wireless Sensor Networks AH Moon, U Iqbal, GM Bhat, Z Iqbal 2016 International Conference on Electrical, Electronics, and Optimization …, 2016 | 8 | 2016 |
Authenticated key exchange protocol for wireless sensor networks AH Moon, U Iqbal, GM Bhat International Journal of Applied Engineering Research 11 (6), 4280-4287, 2016 | 8 | 2016 |
Formally validated authentication protocols for WSN U Iqbal, S Shafi Advances in Big Data and Cloud Computing: Proceedings of ICBDCC18, 423-432, 2019 | 7 | 2019 |
Dynamic access control in wireless sensor networks U Iqbal 2017 4th International Conference on Advanced Computing and Communication …, 2017 | 5 | 2017 |
Re-keying mechanism for TinySec using ECC and Hash chains U Iqbal, S Intikhab 2017 4th International Conference on Advanced Computing and Communication …, 2017 | 4 | 2017 |