default search action
Haseeb Ahmad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Yang Zhang, Yu Tang, Chaoyang Li, Hua Zhang, Haseeb Ahmad:
Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks. Sensors 24(13): 4188 (2024) - 2023
- [j29]Huijun Zhu, Haseeb Ahmad, Qingji Xue, Tianfeng Li, Ziyu Liu, Ao Liu:
New Constructions of Equality Test Scheme Without Random Oracles. IEEE Access 11: 49519-49529 (2023) - [j28]Salman Raza, Manzoor Ahmed, Haseeb Ahmad, Muhammad Ayzed Mirza, Muhammad Asif Habib, Shangguang Wang:
Task offloading in mmWave based 5G vehicular cloud computing. J. Ambient Intell. Humaniz. Comput. 14(9): 12595-12607 (2023) - [j27]Manzoor Ahmed, Muhammad Ayzed Mirza, Salman Raza, Haseeb Ahmad, Fang Xu, Wali Ullah Khan, Qing Lin, Zhu Han:
Vehicular Communication Network Enabled CAV Data Offloading: A Review. IEEE Trans. Intell. Transp. Syst. 24(8): 7869-7897 (2023) - 2022
- [j26]Farah Maheen, Muhammad Asif, Haseeb Ahmad, Shahbaz Ahmad, Fahad Alturise, Othman Asiry, Yazeed Yasin Ghadi:
Automatic computer science domain multiple-choice questions generation based on informative sentences. PeerJ Comput. Sci. 8: e1010 (2022) - 2021
- [j25]Huijun Zhu, Licheng Wang, Haseeb Ahmad, Dong Xie:
Pairing-Free for Public Key Encryption With Equality Test Scheme. IEEE Access 9: 77239-77249 (2021) - [j24]Haseeb Ahmad, Muhammad Usama Sardar, Wajahat Hussain, Muhammad Latif Anjum:
A sketch is worth a thousand navigational instructions. Auton. Robots 45(2): 313-333 (2021) - 2020
- [j23]Kaleem Razzaq Malik, Mughees Ahmad, Shehzad Khalid, Haseeb Ahmad, Fadi Al-Turjman, Sohail Jabbar:
Image and command hybrid model for vehicle control using Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 31(5) (2020) - [j22]Muhammad Asif, Atiab Ishtiaq, Haseeb Ahmad, Hanan Aljuaid, Jalal Shah:
Sentiment analysis of extremism in social media from textual information. Telematics Informatics 48: 101345 (2020)
2010 – 2019
- 2019
- [j21]Jianhua Yan, Licheng Wang, Muzi Li, Haseeb Ahmad, Jun Yue, Wenbin Yao:
Attribute-Based Signcryption From Lattices in the Standard Model. IEEE Access 7: 56039-56050 (2019) - [j20]Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang:
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type. Comput. J. 62(12): 1840-1848 (2019) - [j19]Shuming Qiu, Guosheng Xu, Haseeb Ahmad, Guoai Xu, Xinping Qiu, Hong Xu:
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography. KSII Trans. Internet Inf. Syst. 13(2): 978-1002 (2019) - [c4]Abid Jamil, Chaudhry Muhammad Nadeem Faisal, Muhammad Asif Habib, Sohail Jabbar, Haseeb Ahmad:
The Experimental Investigation of the Influence of Gender in Enjoyment, Ease of use, Satisfaction, and Usefulness during Interaction in Gaming Environment. Interacción 2019: 50:1-50:4 - 2018
- [j18]Shuming Qiu, Guoai Xu, Haseeb Ahmad, Licheng Wang:
A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems. IEEE Access 6: 7452-7463 (2018) - [j17]Haseeb Ahmad, Ali Daud, Licheng Wang, Ibrar Ahmad, Muhammad Hafeez, Yixian Yang:
Quantifying team precedence in the game of cricket. Clust. Comput. 21(1): 523-537 (2018) - [j16]Ibrar Ahmad, Xiaojie Wang, Yuzhao Mao, Guang Liu, Haseeb Ahmad, Rahat Ullah:
Ligature based Urdu Nastaleeq sentence recognition using gated bidirectional long short term memory. Clust. Comput. 21(1): 703-714 (2018) - [j15]Haseeb Ahmad, Licheng Wang, Haibo Hong, Jing Li, Hassan Dawood, Manzoor Ahmed, Yixian Yang:
Primitives towards verifiable computation: a survey. Frontiers Comput. Sci. 12(3): 451-478 (2018) - [j14]Guosheng Xu, Shuming Qiu, Haseeb Ahmad, Guoai Xu, Yanhui Guo, Miao Zhang, Hong Xu:
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography. Sensors 18(7): 2394 (2018) - [j13]Jing Li, Xiong Li, Licheng Wang, Debiao He, Haseeb Ahmad, Xinxin Niu:
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput. 22(3): 707-714 (2018) - [j12]Liaoliang Jiang, Tong Li, Xuan Li, Mohammed Atiquzzaman, Haseeb Ahmad, Xianmin Wang:
Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT. Wirel. Commun. Mob. Comput. 2018: 6809796:1-6809796:8 (2018) - [c3]Sohail Jabbar, Muhammad Farhan, Jin Li, Haseeb Ahmad, Awais Ahmad:
IoT based smart interaction framework for elearning. SAC 2018: 664-669 - 2017
- [j11]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jun Shao, Yixian Yang:
Minimal logarithmic signatures for one type of classical groups. Appl. Algebra Eng. Commun. Comput. 28(2): 177-192 (2017) - [j10]Haseeb Ahmad, Ali Daud, Licheng Wang, Haibo Hong, Hussain Dawood, Yixian Yang:
Prediction of Rising Stars in the Game of Cricket. IEEE Access 5: 4104-4124 (2017) - [j9]Huijun Zhu, Licheng Wang, Haseeb Ahmad, Xinxin Niu:
Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing. IEEE Access 5: 20428-20439 (2017) - [j8]Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang, Zhiguo Qu:
Minimum length key in MST cryptosystems. Sci. China Inf. Sci. 60(5): 052106:1-052106:11 (2017) - [j7]Huijun Zhu, Licheng Wang, Haseeb Ahmad, Xinxin Niu:
Pairing-free equality test over short ciphertexts. Int. J. Distributed Sens. Networks 13(6) (2017) - [j6]Muhammad Azam Zia, Zhongbao Zhang, Guangda Li, Haseeb Ahmad, Sen Su:
Prediction of Rising Venues in Citation Networks. J. Adv. Comput. Intell. Intell. Informatics 21(4): 650-658 (2017) - [j5]Muhammad Azam Zia, Zhongbao Zhang, Liutong Chen, Haseeb Ahmad, Sen Su:
Identifying Influential People Based on Interaction Strength. J. Inf. Process. Syst. 13(4): 987-999 (2017) - 2016
- [j4]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang, Changzhong Wu:
Construction of DNA codes by using algebraic number theory. Finite Fields Their Appl. 37: 328-343 (2016) - [j3]Licheng Wang, Jing Li, Haseeb Ahmad:
Challenges of Fully Homomorphic Encryptions for the Internet of Things. IEICE Trans. Inf. Syst. 99-D(8): 1982-1990 (2016) - [j2]Rashid Mehmood, Guangzhi Zhang, Rongfang Bie, Hassan Dawood, Haseeb Ahmad:
Clustering by fast search and find of density peaks via heat diffusion. Neurocomputing 208: 210-217 (2016) - [i3]Haibo Hong, Jun Shao, Licheng Wang, Haseeb Ahmad, Yixian Yang:
Public Key Encryption in Non-Abelian Groups. CoRR abs/1605.06608 (2016) - 2015
- [c2]Rashid Mehmood, Rongfang Bie, Hussain Dawood, Haseeb Ahmad:
Fuzzy Clustering by Fast Search and Find of Density Peaks. IIKI 2015: 258-261 - [c1]Licheng Wang, Yun Pan, Minzheng Jia, Haseeb Ahmad:
A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs. WASA 2015: 539-549 - [i2]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang:
Minimal Logarithmic Signatures for Sporadic Groups. CoRR abs/1507.01162 (2015) - [i1]Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang:
Minimal Logarithmic Signatures for one type of Classical Groups. CoRR abs/1507.01163 (2015) - 2014
- [j1]Haibo Hong, Licheng Wang, Yixian Yang, Haseeb Ahmad:
All exceptional groups of lie type have minimal logarithmic signatures. Appl. Algebra Eng. Commun. Comput. 25(4): 287-296 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint