Mazhar Ali
Mazhar Ali
Verified email at
Cited by
Cited by
Security in cloud computing: Opportunities and challenges
M Ali, SU Khan, AV Vasilakos
Information sciences 305, 357-383, 2015
A taxonomy and survey on green data center networks
K Bilal, SUR Malik, O Khalid, A Hameed, E Alvarez, V Wijaysekara, R Irfan, ...
Future Generation Computer Systems 36, 189-208, 2014
SeDaSC: secure data sharing in clouds
M Ali, R Dhamotharan, E Khan, SU Khan, AV Vasilakos, K Li, AY Zomaya
IEEE Systems Journal 11 (2), 395-404, 2017
Incremental proxy re-encryption scheme for mobile cloud computing environment
AN Khan, MLM Kiah, SA Madani, M Ali, S Shamshirband
The Journal of Supercomputing 68 (2), 624-651, 2014
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
AN Khan, MLM Kiah, SA Madani, M Ali
The Journal of Supercomputing 66 (3), 1687-1706, 2013
DROPS: Division and replication of data in the cloud for optimal performance and security
M Ali, K Bilal, S Khan, B Veeravalli, K Li, A Zomaya
IEEE Transactions on Cloud computing 6 (2), 303-315, 2018
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
AN Khan, MLM Kiah, M Ali, SA Madani, S Shamshirband
The Journal of Supercomputing 70 (2), 946-976, 2014
Personalized healthcare cloud services for disease risk assessment and wellness management using social media
A Abbas, M Ali, MUS Khan, SU Khan
Pervasive and Mobile Computing 28, 81-99, 2016
A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach
AN Khan, MLM Kiah, M Ali, S Shamshirband
Journal of Grid Computing 13 (4), 651-675, 2015
A survey on energy-efficient methodologies and architectures of network-on-chip
A Abbas, M Ali, A Fayyaz, A Ghosh, A Kalra, SU Khan, MUS Khan, ...
Computers & Electrical Engineering 40 (8), 333-347, 2014
DaSCE: Data security for cloud environment with semi-trusted third party
M Ali, S Malik, S Khan
IEEE Transactions on Cloud Computing 5 (4), 642-655, 2017
3D-RP: A DHT-based routing protocol for MANETs
SA Abid, M Othman, N Shah, M Ali, AR Khan
The Computer Journal 58 (2), 258-279, 2015
On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs)
MUS Khan, A Abbas, M Ali, M Jawad, SU Khan, K Li, AY Zomaya
IEEE Systems Journal 12 (1), 82-91, 2018
Segregating spammers and unsolicited bloggers from genuine experts on Twitter
MUS Khan, M Ali, A Abbas, SU Khan, AY Zomaya
IEEE Transactions on Dependable and Secure Computing 15 (4), 551-560, 2016
A cloud based framework for identification of influential health experts from Twitter
A Abbas, MUS Khan, M Ali, SU Khan, LT Yang
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
Pirax: framework for application piracy control in mobile cloud environment
M Othman, M Ali, AN Khan, SA Madani
The Journal of Supercomputing 68 (2), 753-776, 2014
Towards a fog enabled efficient car parking architecture
KS Awaisi, A Abbas, M Zareei, HA Khattak, MUS Khan, M Ali, IU Din, ...
IEEE Access 7, 159100-159111, 2019
A fog-based security framework for intelligent traffic light control system
T Khalid, AN Khan, M Ali, A Adeel, J Shuja
Multimedia Tools and Applications 78 (17), 24595-24615, 2019
A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment
AN Khan, M Ali, AR Khan, FG Khan, IA Khan, W Jadoon, S Shamshirband, ...
International Journal of Communication Systems 30 (16), e3308, 2017
Bot detection using a single post on social media
S Mohammad, MUS Khan, M Ali, L Liu, M Shardlow, R Nawaz
2019 Third World Conference on Smart Trends in Systems Security and …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20