Follow
Dr. Razi Arshad
Title
Cited by
Cited by
Year
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
R Arshad, N Ikram
Multimedia tools and applications 66, 165-178, 2013
1032013
Contributions to the theory of almost perfect nonlinear functions
R Arshad
52018
A Novel Convertible Authenticated Encryption Scheme based on RSA Assumption
R Arshad, N Ikram
32010
Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring.
R Arshad, N Ikram
Int. J. Netw. Secur. 14 (2), 117-120, 2012
22012
Comment on Nizam Chew, L.C.; Ismail, E.S. S-box Construction Based on Linear Fractional Transformation and Permutation Function. Symmetry 2020, 12, 826
R Arshad, M Jalil
Symmetry 15 (5), 1005, 2023
12023
Quantum and Post-Quantum Cybersecurity Challenges and Finance Organizations Readiness
R Arshad, Q Riaz
Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023
12023
Cryptanalysis and improvement on remote user mutual authentication scheme with smart cards
R Arshad, N Ikram
2009 11th International Conference on Advanced Communication Technology 2 …, 2009
12009
Comment to “A projective general linear group-based algorithm for the construction of substitution box for block ciphers”
R Arshad, M Jalil
Neural Computing and Applications, 1-11, 2023
2023
Machines Perceive Emotions: Identifying Affective States from Human Gait Using On-Body Smart Devices
HA Imran, Q Riaz, M Zeeshan, M Hussain, R Arshad
Applied Sciences 13 (8), 4728, 2023
2023
Digital Transformations in Business and FinTech
AA Zeerak, R Arshad, NN Abbas, UH Chaudhry
Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023
2023
Data Leakage in Business and FinTech
UH Chaudhry, R Arshad, NN Abbas, AA Zeerak
Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–11