Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system B Jasra, AH Moon Expert Systems with Applications 206, 117861, 2022 | 110 | 2022 |
A lightweight three factor authentication framework for IoT based critical applications M Saqib, B Jasra, AH Moon Journal of King Saud University-Computer and Information Sciences 34 (9 …, 2022 | 78 | 2022 |
A systematic security assessment and review of internet of things in the context of authentication M Saqib, AH Moon Computers & Security 125, 103053, 2023 | 37 | 2023 |
Implementation of node authentication for WSN using hash chains AH Moon, U Iqbal, GM Bhat Procedia Computer Science 89, 90-98, 2016 | 23 | 2016 |
Mutual entity authentication protocol based on ECDSA for WSN AH Moon, U Iqbal, GM Bhat Procedia Computer Science 89, 187-192, 2016 | 23 | 2016 |
Image encryption techniques: A review B Jasra, AH Moon 2020 10th International Conference on Cloud Computing, Data Science …, 2020 | 18 | 2020 |
Light weight authentication framework for WSN AH Moon, U Iqbal, GM Bhat 2016 International Conference on Electrical, Electronics, and Optimization …, 2016 | 15 | 2016 |
Secured data acquisition system for smart water applications using WSN AH Moon, U Iqbal, GM Bhat Indian Journal of Science and Technology 9 (10), 1-11, 2016 | 15 | 2016 |
A Non-contact Method for Rod Straightness Measurement Based on Quadrant Laser Sensor NK Rana, RR Sawant, AH Moon 2006 IEEE International Conference on Industrial Technology, 2292-2297, 2006 | 15 | 2006 |
Wideband asymmetric coplanar strip fed antennas with pattern diversity for mmWave 5G base stations MI Magray, GS Karthikeya, K Muzaffar, SK Koul, AH Moon IEEE Access 8, 77482-77489, 2020 | 14 | 2020 |
A systematized security and communication protocols stack review for Internet of Things M Saqib, B Jasra, AH Moon 2020 IEEE International Conference for Innovation in Technology (INOCON), 1-9, 2020 | 12 | 2020 |
Authentication protocols for WSN using ECC and hidden generator AH Moon, K Ummer International Journal of Computer Applications 133 (13), 42-47, 2016 | 11 | 2016 |
Simulating and analysing security attacks in wireless sensor networks using QualNet AH Moon, NA Shah, U Iqbal, A Ayub 2013 International Conference on Machine Intelligence and Research …, 2013 | 11 | 2013 |
Mobile Banking adoption: A systematic review and direction for further research C JARIDE, A Taqi Journal of Theoretical and Applied Information Technology 99 (16), 2021 | 10 | 2021 |
Simulating and analyzing RREQ flooding attack in Wireless Sensor Networks AH Moon, U Iqbal, GM Bhat, Z Iqbal 2016 International Conference on Electrical, Electronics, and Optimization …, 2016 | 9 | 2016 |
Authenticated key exchange protocol for wireless sensor networks AH Moon, U Iqbal, GM Bhat International Journal of Applied Engineering Research 11 (6), 4280-4287, 2016 | 9 | 2016 |
Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication J Bhat, M Saqib, AH Moon International Journal of System Assurance Engineering and Management 13 (2 …, 2022 | 8 | 2022 |
Image encryption using logistic-cosine-sine chaos map and elliptic curve cryptography B Jasra, M Saqib, AH Moon Journal of theoretical and applied information technology 99 (16), 2021 | 7 | 2021 |
Mutual authentication protocol for green Internet of Things in content centric network M Saqib, B Jasra, AH Moon J. Green Eng 10, 4896-4909, 2020 | 6 | 2020 |
Extremely close integration of dual band sub-6 GHz 4G antenna with unidirectional mm-wave 5G antenna SA Malik, K Muzaffar, AH Mir, AH Moon Progress in Electromagnetics Research Letters 96, 73-80, 2021 | 5 | 2021 |