A survey on crypto currencies S Ahamad, M Nair, B Varghese 4th International Conference on Advances in Computer Science, AETACS, 42-48, 2013 | 128 | 2013 |
A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic SS Ahamad, AS Khan Pathan Connection Science 33 (3), 532-554, 2021 | 47 | 2021 |
Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification SS Ahamad, ASK Pathan Complex Adaptive Systems Modeling 7, 1-18, 2019 | 28 | 2019 |
Review of mobile security problems and defensive methods PMD Nagarjun, SS Ahamad International Journal of Applied Engineering Research 13 (12), 10256-10259, 2018 | 24 | 2018 |
A secure NFC mobile payment protocol based on biometrics with formal verification SS Ahamad, I Al-Shourbaji, S Al-Janabi International Journal of Internet Technology and Secured Transactions …, 2016 | 24 | 2016 |
Secure mobile payment framework based on UICC with formal verification SS Ahamad, VN Sastry, SK Udgata International Journal of Computational Science and Engineering 9 (4), 355-370, 2014 | 24 | 2014 |
A new mobile payment system with formal verification SS Ahamad, SK Udgata, VN Sastry International Journal of Internet Technology and Secured Transactions 4 (1 …, 2012 | 21 | 2012 |
A biometric based secure mobile payment framework SS Ahamad, VN Sastry, M Nair 2013 4th International Conference on Computer and Communication Technology …, 2013 | 20 | 2013 |
A novel NFC-based secure protocol for merchant transactions SS Ahamad IEEE Access 10, 1905-1920, 2021 | 19 | 2021 |
Ensemble Methods to Detect XSS Attacks SSA PMD Nagarjun International Journal of Advanced Computer Science and Applications (IJACSA …, 2020 | 18* | 2020 |
A secure lightweight and scalable mobile payment framework SS Ahamad, SK Udgata, M Nair Proceedings of the International Conference on Frontiers of Intelligent …, 2014 | 17 | 2014 |
Cross-site Scripting Research: A Review PMDNSS Ahamad International Journal of Advanced Computer Science and Applications (IJACSA …, 2020 | 10* | 2020 |
Key management schemes of wireless sensor networks a survey R Shaik, SS Ahamad Fronteiras: Journal of Social, Technological and Environmental Science 6 (2), 2017 | 9 | 2017 |
A novel chaotic hash-based attribute-based encryption and decryption on cloud computing LND Tamma, SS Ahamad International Journal of Electronic Security and Digital Forensics 10 (1), 1-19, 2018 | 7 | 2018 |
A secure and resilient scheme for telecare medical information systems with threat modeling and formal verification SS Ahamad, M Al-Shehri, I Keshta IEEE Access 10, 120227-120244, 2022 | 6 | 2022 |
A secure and optimized proximity mobile payment framework with formal verification. VNSSKU Shaik Shakeel Ahamad Mobile Commerce: Concepts, Methodologies, Tools, and Applications 1, 161-189, 2017 | 6* | 2017 |
A secure and lightweight protocol for mobile DRM based on DRM community cloud (DCC) HM Alsaghier, S Shakeel Ahamad, SK Udgata, LSS Reddy Proceedings of the 5th International Conference on Frontiers in Intelligent …, 2017 | 6 | 2017 |
Security attacks and challenges of wireless sensor network is a review R Shaik, SS Ahamad International Journal of Engineering and Technology (U.A.E.) 7 (2.32), 136-138, 2018 | 5 | 2018 |
Enhanced mobile SET protocol with formal verification SS Ahamad, NN Sastry, SK Udgata 2012 Third International Conference on Computer and Communication Technology …, 2012 | 5 | 2012 |
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting attacks PMD Nagarjun, SA Shaik International Journal of Electrical and Computer Engineering 9 (2), 1393, 2019 | 3 | 2019 |