Zero trust architecture (zta): A comprehensive survey NF Syed, SW Shah, A Shaghaghi, A Anwar, Z Baig, R Doss IEEE access 10, 57143-57179, 2022 | 189 | 2022 |
Data augmentation and dense-LSTM for human activity recognition using WiFi signal J Zhang, F Wu, B Wei, Q Zhang, H Huang, SW Shah, J Cheng IEEE Internet of Things Journal 8 (6), 4628-4641, 2020 | 157 | 2020 |
Recent trends in user authentication–a survey SW Shah, SS Kanhere IEEE access 7, 112505-112519, 2019 | 93 | 2019 |
Traceability in supply chains: A Cyber security analysis NF Syed, SW Shah, R Trujillo-Rasua, R Doss Computers & Security 112, 102536, 2022 | 59 | 2022 |
LCDA: lightweight continuous device-to-device authentication for a zero trust architecture (ZTA) SW Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss Computers & Security 108, 102351, 2021 | 50 | 2021 |
Smart user identification using cardiopulmonary activity SW Shah, SS Kanhere Pervasive and Mobile Computing 58, 101024, 2019 | 19 | 2019 |
Wi-Auth: WiFi based second factor user authentication SW Shah, SS Kanhere Proceedings of the 14th EAI International Conference on Mobile and …, 2017 | 19 | 2017 |
Weak-key analysis for BIKE post-quantum key encapsulation mechanism MR Nosouhi, SW Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, ... IEEE Transactions on Information Forensics and Security 18, 2160-2174, 2023 | 17 | 2023 |
Towards a lightweight continuous authentication protocol for device-to-device communication SWA Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 12 | 2020 |
Wi-sign: Device-free second factor user authentication SW Shah, SS Kanhere Proceedings of the 15th EAI International Conference on Mobile and …, 2018 | 12 | 2018 |
Wi-access: Second factor user authentication leveraging WiFi signals SW Shah, SS Kanhere 2018 IEEE International Conference on Pervasive Computing and Communications …, 2018 | 12 | 2018 |
Bit Flipping Key Encapsulation for the Post-Quantum Era MR Nosouhi, SWA Shah, L Pan, R Doss IEEE Access 11, 56181-56195, 2023 | 8 | 2023 |
Examining usable security features and user perceptions of Physical Authentication Devices A Nanda, JJ Jeong, SWA Shah, M Nosouhi, R Doss Computers & Security 139, 103664, 2024 | 6 | 2024 |
VID: Human identification through vein patterns captured from commodity depth cameras SW Shah, SS Kanhere, J Zhang, L Yao IET Biometrics 10 (2), 142-162, 2021 | 5 | 2021 |
Deep learning trends and future perspectives of web security and vulnerabilities MS Chughtai, I Bibi, S Karim, SWA Shah, AA Laghari, AA Khan Journal of High-Speed Networks, 2023 | 4 | 2023 |
How hackers can use message mirroring apps to see all your SMS texts — and bypass 2FA security RD Syed Wajid Ali Shah, Jongkil Jay Jeong https://theconversation.com/how-hackers-can-use-message-mirroring-apps-to …, 2021 | 4* | 2021 |
A new zero-trust aided smart key authentication scheme in iov Y Song, F Jiang, SWA Shah, R Doss 2022 IEEE International Conference on Pervasive Computing and Communications …, 2022 | 3 | 2022 |
Echo-ID: Smart user identification leveraging inaudible sound signals SWA Shah, A Shaghaghi, SS Kanhere, J Zhang, A Anwar, R Doss IEEE Access 8, 194508-194522, 2020 | 3 | 2020 |
Toward Higher Levels of Assurance in Remote Identity Proofing A Nanda, SWA Shah, JJ Jeong, R Doss, J Webb IEEE Consumer Electronics Magazine 13 (1), 62-71, 2023 | 2 | 2023 |
DU-QS22: A Dataset for analyzing QC-MDPC-based quantum-safe cryptosystems MR Nosouhi, SW Shah, L Pan, R Doss EAI International Conference on Applied Cryptography in Computer and …, 2022 | 2 | 2022 |