Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key A Ghani, K Mansoor, S Mehmood, SA Chaudhry, AU Rahman, ... International Journal of Communication Systems 32 (16), e4139, 2019 | 120 | 2019 |
Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography K Mansoor, A Ghani, SA Chaudhry, S Shamshirband, SAK Ghayyur, ... Sensors 19 (21), 4752, 2019 | 110 | 2019 |
Forensic analysis of social networking applications on an android smartphone A Menahil, W Iqbal, M Iftikhar, WB Shahid, K Mansoor, S Rubab Wireless Communications and Mobile Computing 2021 (1), 5567592, 2021 | 32 | 2021 |
An improved three-factor anonymous authentication protocol for WSN s based iot system using symmetric cryptography K Jawad, K Mansoor, AF Baig, A Ghani, A Naseem 2019 International Conference on Communication Technologies (ComTech), 53-59, 2019 | 21 | 2019 |
A robust anonymous authentication scheme using biometrics for digital rights management system MA Khan, A Ghani, MS Obaidat, P Vijayakumar, K Mansoor, SA Chaudhry 2021 International Conference on Communications, Computing, Cybersecurity …, 2021 | 10 | 2021 |
Enhanced lightweight cloud-assisted mutual authentication scheme for wearable devices M Hassan, K Mansoor, S Tahir, W Iqbal 2019 International Conference on Applied and Engineering Mathematics (ICAEM …, 2019 | 10 | 2019 |
PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems K Mansoor, M Afzal, W Iqbal, Y Abbas, S Mussiraliyeva, A Chehri Internet of Things 27, 101228, 2024 | 9 | 2024 |
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks AF Baig, KM Hassan, A Ghani, SA Chaudhry, I Khan, MU Ashraf PloS one 13 (4), e0196061, 2018 | 9 | 2018 |
Symmetric-key multi-factor biometric authentication scheme J Iftikhar, S Hussain, K Mansoor, Z Ali, SA Chaudhry 2019 2nd International conference on communication, computing and digital …, 2019 | 8 | 2019 |
An improved authentication protocol for global mobility network (glomonet) MM Sohail, M Hassan, K Mansoor, A Ghani, K Jawad 2020 17th International Bhurban Conference on Applied Sciences and …, 2020 | 6 | 2020 |
An enhanced biometric based rfid authentication scheme defending against illegitimate access U Ayaz, TA Haq, S Taimour, K Mansoor, S Mahmood 2018 14th International Conference on Emerging Technologies (ICET), 1-6, 2018 | 6 | 2018 |
A Lightweight and Secure Authentication Scheme for Remote Monitoring of Patients in IoMT Z Ali, S Mahmood, K Mansoor, A Daud, R Alharbey, A Bukhari IEEE Access, 2024 | 5 | 2024 |
Congestion avoidance adaptive routing protocol for manets using network coding TA Haq, K Mansoor, S Mahmood 2019 International Conference on Communication Technologies (ComTech), 47-52, 2019 | 4 | 2019 |
Edge Computing-Based Scheme for Post-Quantum IoT Security for e-Health NN Minhas, K Mansoor IEEE Internet of Things Journal, 2024 | 3 | 2024 |
Securing IoT enabled RFID based object tracking systems: a symmetric cryptography based authentication protocol for efficient smart object tracking A Sultan, M Hassan, K Mansoor, SS Ahmed 2021 International Conference on Communication Technologies (ComTech), 7-12, 2021 | 3 | 2021 |
Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices K Mansoor, M Afzal, W Iqbal, Y Abbas Cluster Computing 28 (2), 93, 2025 | 1 | 2025 |
An Enhanced SIP Authentication Protocol for Preserving User Privacy S Naveed, A Sultan, K Mansoor 2020 International Conference on Cyber Warfare and Security (ICCWS), 1-6, 2020 | 1 | 2020 |
Lightweight secure authentication protocol for automatic dependent surveillance broadcast system B Sher, M Ahmad, K Mansoor, YA Bangash, W Iqbal, S Mussiraliyeva Cluster Computing, 1-16, 2024 | | 2024 |
Two Level Authentication Scheme for Securing Session Passwords K Mansoor, A Ghani, AF Baig, H Naqvi, I Khan, M Saqlain International Journal of Computer Science and Information Security 14 (11), 374, 2016 | | 2016 |