Name
Papers
Collaborators
ASHRAF MASOOD
22
18
Citations 
PageRank 
Referers 
109
10.28
270
Referees 
References 
400
241
Search Limit
100400
Title
Citations
PageRank
Year
Analytical study of hardware-rooted security standards and their implementation techniques in mobile00.342020
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems.30.392016
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.30.372016
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network.90.522015
Load Balanced Routing For Lifetime Maximization In Mobile Wireless Sensor Networks00.342014
Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication.10.362010
Efficient Approximation of Higher Order Boolean function in a Low Order Function.00.342009
Modifications in the Design of Trivium to Increase its Security Level.10.362009
Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol170.742009
An Efficient Collusion Resistant Security Mechanism For Heterogeneous Sensor Networks00.342009
Algebraic analysis of Trivium and Trivium/12800.342008
Key Management and Secure Routing in Heterogeneous Sensor Networks40.532008
Scalable and efficient key management for heterogeneous sensor networks210.892008
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks20.412007
A Key Management Scheme Based on Random Key Distribution for Clustered Wireless Sensor Networks00.342007
An efficient key distribution scheme for heterogeneous sensor networks210.932007
A Review of Cryptanalytic Attacks on E-STREAM Submitted Stream Ciphers00.342007
Attack-resilient random key distribution scheme for distributed sensor networks00.342007
An Analysis of Public Key Cryptography based Techniques in Wireless Sensor Networks00.342007
Secure group communication with self-healing and rekeying in wireless sensor networks230.892007
Algebraic Attack on A5-type Irregularly Clocked Key Stream Generator10.412007
Arcanum: A Secure and Efficient Key Exchange Protocol for the Internet30.412004