Elliptic curve cryptography based mutual authentication scheme for session initiation protocol R Arshad, N Ikram Multimedia tools and applications 66, 165-178, 2013 | 103 | 2013 |
Contributions to the theory of almost perfect nonlinear functions R Arshad | 5 | 2018 |
A Novel Convertible Authenticated Encryption Scheme based on RSA Assumption R Arshad, N Ikram | 3 | 2010 |
Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring. R Arshad, N Ikram Int. J. Netw. Secur. 14 (2), 117-120, 2012 | 2 | 2012 |
Comment on Nizam Chew, L.C.; Ismail, E.S. S-box Construction Based on Linear Fractional Transformation and Permutation Function. Symmetry 2020, 12, 826 R Arshad, M Jalil Symmetry 15 (5), 1005, 2023 | 1 | 2023 |
Quantum and Post-Quantum Cybersecurity Challenges and Finance Organizations Readiness R Arshad, Q Riaz Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023 | 1 | 2023 |
Cryptanalysis and improvement on remote user mutual authentication scheme with smart cards R Arshad, N Ikram 2009 11th International Conference on Advanced Communication Technology 2 …, 2009 | 1 | 2009 |
Comment to “A projective general linear group-based algorithm for the construction of substitution box for block ciphers” R Arshad, M Jalil Neural Computing and Applications, 1-11, 2023 | | 2023 |
Machines Perceive Emotions: Identifying Affective States from Human Gait Using On-Body Smart Devices HA Imran, Q Riaz, M Zeeshan, M Hussain, R Arshad Applied Sciences 13 (8), 4728, 2023 | | 2023 |
Digital Transformations in Business and FinTech AA Zeerak, R Arshad, NN Abbas, UH Chaudhry Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023 | | 2023 |
Data Leakage in Business and FinTech UH Chaudhry, R Arshad, NN Abbas, AA Zeerak Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023 | | 2023 |