Abdul Ghafoor Abbasi
Abdul Ghafoor Abbasi
Verified email at - Homepage
Cited by
Cited by
Towards a secure service provisioning framework in a smart city environment
Z Khan, Z Pervez, AG Abbasi
Future Generation Computer Systems 77, 112-135, 2017
Towards cloud based smart cities data security and privacy management
Z Khan, Z Pervez, A Ghafoor
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014
Cloud based secure and privacy enhanced authentication & authorization protocol
U Khalid, A Ghafoor, M Irum, MA Shibli
Procedia Computer Science 22, 680-688, 2013
VeidBlock: Verifiable identity using blockchain and ledger in a software defined network
AG Abbasi, Z Khan
Companion Proceedings of the10th International Conference on Utility and …, 2017
SAGE: Next generation multi-agent system
AG Abbasi, M Rehman, Z Khan, F Ahmad, A Ali, H Suguri
Assessment criteria for trust models in cloud computing
A Kanwal, R Masood, UE Ghazia, MA Shibli, AG Abbasi
2013 IEEE International Conference on Green Computing and Communications and …, 2013
Analysis of BYOD security frameworks
S Ali, MN Qureshi, AG Abbasi
2015 Conference on Information Assurance and Cyber Security (CIACS), 56-61, 2015
Security analysis of VoIP architecture for identifying SIP vulnerabilities
UU Rehman, AG Abbasi
2014 International Conference on Emerging Technologies (ICET), 87-93, 2014
Security aspects of virtualization in cloud computing
M Kazim, R Masood, MA Shibli, AG Abbasi
IFIP International Conference on Computer Information Systems and Industrial …, 2013
Blockchain and edge computing–based architecture for participatory smart city applications
Z Khan, AG Abbasi, Z Pervez
Concurrency and Computation: Practice and Experience 32 (12), e5566, 2020
Dismi-an intent interface for application-centric transport network services
P Sköldström, S Junique, A Ghafoor, A Marsico, D Siracusa
2017 19th International Conference on Transparent Optical Networks (ICTON), 1-4, 2017
Enhanced adaptive data hiding method using LSB and pixel value differencing
M Hussain, Q Riaz, S Saleem, A Ghafoor, KH Jung
Multimedia Tools and Applications 80 (13), 20381-20401, 2021
CryptoNET: Design and implementation of the secure email system
A Ghafoor, S Muftic, G Schmölzer
2009 Proceedings of the 1st International Workshop on Security and …, 2009
Towards Attribute‐Centric Access Control: an ABAC versus RBAC argument
A Fatima, Y Ghazi, MA Shibli, AG Abassi
Security and Communication Networks 9 (16), 3152-3166, 2016
A secure architecture for inter-cloud virtual machine migration
T Zeb, A Ghafoor, A Shibli, M Yousaf
International Conference on Security and Privacy in Communication Networks …, 2014
CryptoNET: software protection and secure execution environment
A Ghafoor, S Muftic
Int. J. Computer Science and Network Security 10 (2), 19-26, 2010
An interactive intent-based negotiation scheme for application-centric networks
A Marsico, M Santuari, M Savi, D Siracusa, A Ghafoor, S Junique, ...
2017 IEEE Conference on Network Softwarization (NetSoft), 1-2, 2017
Assessment criteria for cloud identity management systems
U Habiba, AG Abassi, R Masood, MA Shibli
2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing …, 2013
Web Contents Protection, Secure Execution and Authorized Distribution
AG Abbasi, S Muftic, I Hotamov
2010 Fifth International Multi-conference on Computing in the Global …, 2010
Smart phone based authentication and authorization protocol for SPACS
FK Bhutta, A Ghafoor, S Sultan
High Capacity Optical Networks and Emerging/Enabling Technologies, 127-131, 2012
The system can't perform the operation now. Try again later.
Articles 1–20