Follow
Muhammad Nasir Mumtaz Bhutta
Muhammad Nasir Mumtaz Bhutta
Verified email at adu.ac.ae - Homepage
Title
Cited by
Cited by
Year
A survey on blockchain technology: Evolution, architecture and security
MNM Bhutta, AA Khwaja, A Nadeem, HF Ahmad, MK Khan, MA Hanif, ...
Ieee Access 9, 61048-61073, 2021
5052021
Smart city big data analytics: An advanced review
K Soomro, MNM Bhutta, Z Khan, MA Tahir
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 9 (5 …, 2019
1392019
Secure identification, traceability and real-time tracking of agricultural food supply during transportation using internet of things
MNM Bhutta, M Ahmad
IEEE Access 9, 65660-65675, 2021
1062021
Multilayer IPSec (ML-IPSec) Protocol Design for improved security performance over satellites
HS Cruickshank, N Bhutta, J Ashworth, M Moseley
81*
Security in vehicular ad hoc networks: challenges and countermeasures
J Mahmood, Z Duan, Y Yang, Q Wang, J Nebhen, MNM Bhutta
Security and Communication Networks 2021 (1), 9997771, 2021
532021
Security analysis for delay/disruption tolerant satellite and sensor networks
N Bhutta, G Ansa, E Johnson, N Ahmad, M Alsiyabi, H Cruickshank
2009 International Workshop on Satellite and Space Communications, 385-389, 2009
382009
Enabling bidirectional traffic mobility for ITS simulation in smart city environments
T Wang, A Hussain, MNM Bhutta, Y Cao
Future Generation Computer Systems 92, 342-356, 2019
222019
Wormhole attack detection in routing protocol for low power lossy networks
MS Ahsan, MNM Bhutta, M Maqsood
Information and Communication Technologies (ICICT), 2017 International …, 2018
192018
[Retracted] Deformation Adjustment with Single Real Signature Image for Biometric Verification Using CNN
R Kumar, M Saraswat, D Ather, MN Mumtaz Bhutta, S Basheer, ...
Computational Intelligence and Neuroscience 2022 (1), 4406101, 2022
162022
An Efficient, Scalable Key Transport Scheme (ESKTS) for Delay/Disruption Tolerant Networks
MNMB Zhili Sun, Haitham S. Cruickshank
Wireless Networks 20 (6), 1597-1609, 2014
162014
Towards Secure IoT‐Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)
MNM Bhutta, S Bhattia, MA Alojail, K Nisar, Y Cao, SA Chaudhry, Z Sun
Wireless Communications and Mobile Computing 2022 (1), 9942270, 2022
152022
Public‐key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks
MNM Bhutta, H Cruickshank, Z Sun
IET Information Security 11 (1), 16-22, 2017
152017
CMAP-IoT: Chaotic map-based authentication protocol for crowdsourcing Internet of Things
M Tanveer, MNM Bhutta, BA Alzahrani, A Albeshri, K Alsubhi, ...
Arabian Journal for Science and Engineering 49 (3), 3453-3466, 2024
142024
Detection and mitigation of Denial of Service (DoS) attacks using performance aware Software Defined Networking (SDN)
W Navid, MNM Bhutta
Information and Communication Technologies (ICICT), 2017 International …, 2018
72018
A key transport protocol for advance metering infrastructure (AMI) based on public key cryptography
H Naseer, MNM Bhutta, MA Alojail
2020 international conference on cyber warfare and security (ICCWS), 1-5, 2020
62020
An Expert System for Calculating Zakat in Islam
AK Aljabr, AM Almousa, MNM Bhutta, MW Alesmael, QM Ilyas
2018 3rd International Conference on Emerging Trends in Engineering …, 2018
62018
Data security in the Industrial Internet of Things (IIoT) through a triple-image encryption framework leveraging 3-D NEAT, 1DCJ, and 4DHCFO techniques
A Mehmood, A Shafique, N Kumar, MN Bhutta
Computers and Electrical Engineering 118, 109354, 2024
32024
TFPPASV: A Three‐Factor Privacy Preserving Authentication Scheme for VANETs
Z Duan, J Mahmood, Y Yang, MA Berwo, AKA Yassin, MN Mumtaz Bhutta, ...
Security and Communication Networks 2022 (1), 8259927, 2022
32022
Integration of TESLA and FLUTE over satellite networks
M Liang, L. CCSR, Univ. of Surrey, Guildford, UK Bhutta, H Cruickshank, ...
Satellite and Space Communications, 2009. IWSSC 2009, 135 - 139, 2009
3*2009
An efficient and compromise-resilient image encryption scheme for resource-constrained environments
AN Khan, A Mehmood, MNM Bhutta, IA Khan, AR Khan
Plos one 19 (4), e0297534, 2024
22024
The system can't perform the operation now. Try again later.
Articles 1–20