Abdul Ghafoor Abbasi
Abdul Ghafoor Abbasi
Verified email at - Homepage
Cited by
Cited by
Towards a secure service provisioning framework in a smart city environment
Z Khan, Z Pervez, AG Abbasi
Future Generation Computer Systems 77, 112-135, 2017
Towards cloud based smart cities data security and privacy management
Z Khan, Z Pervez, A Ghafoor
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014
Cloud based secure and privacy enhanced authentication & authorization protocol
U Khalid, A Ghafoor, M Irum, MA Shibli
Procedia Computer Science 22, 680-688, 2013
Veidblock: Verifiable identity using blockchain and ledger in a software defined network
AG Abbasi, Z Khan
Companion Proceedings of the10th International Conference on Utility and …, 2017
Security aspects of virtualization in cloud computing
M Kazim, R Masood, MA Shibli, AG Abbasi
Computer Information Systems and Industrial Management: 12th IFIP TC8 …, 2013
SAGE: Next generation multi-agent system
AG Abbasi, M Rehman, Z Khan, F Ahmad, A Ali, H Suguri
Assessment criteria for trust models in cloud computing
A Kanwal, R Masood, UE Ghazia, MA Shibli, AG Abbasi
2013 IEEE International Conference on Green Computing and Communications and …, 2013
Security analysis of VoIP architecture for identifying SIP vulnerabilities
UU Rehman, AG Abbasi
2014 International Conference on Emerging Technologies (ICET), 87-93, 2014
Analysis of BYOD security frameworks
S Ali, MN Qureshi, AG Abbasi
2015 Conference on Information Assurance and Cyber Security (CIACS), 56-61, 2015
Blockchain and edge computing–based architecture for participatory smart city applications
Z Khan, AG Abbasi, Z Pervez
Concurrency and Computation: Practice and Experience 32 (12), e5566, 2020
Enhanced adaptive data hiding method using LSB and pixel value differencing
M Hussain, Q Riaz, S Saleem, A Ghafoor, KH Jung
Multimedia Tools and Applications 80, 20381-20401, 2021
Dismi-an intent interface for application-centric transport network services
P Sköldström, S Junique, A Ghafoor, A Marsico, D Siracusa
2017 19th International Conference on Transparent Optical Networks (ICTON), 1-4, 2017
CryptoNET: Design and implementation of the secure email system
A Ghafoor, S Muftic, G Schmölzer
2009 Proceedings of the 1st International Workshop on Security and …, 2009
Towards Attribute‐Centric Access Control: an ABAC versus RBAC argument
A Fatima, Y Ghazi, MA Shibli, AG Abassi
Security and Communication Networks 9 (16), 3152-3166, 2016
A secure architecture for inter-cloud virtual machine migration
T Zeb, A Ghafoor, A Shibli, M Yousaf
International Conference on Security and Privacy in Communication Networks …, 2015
CryptoNET: software protection and secure execution environment
A Ghafoor, S Muftic
Int. J. Computer Science and Network Security 10 (2), 19-26, 2010
Web Contents Protection, Secure Execution and Authorized Distribution
AG Abbasi, S Muftic, I Hotamov
2010 Fifth International Multi-conference on Computing in the Global …, 2010
An interactive intent-based negotiation scheme for application-centric networks
A Marsico, M Santuari, M Savi, D Siracusa, A Ghafoor, S Junique, ...
2017 IEEE Conference on Network Softwarization (NetSoft), 1-2, 2017
Assessment criteria for cloud identity management systems
U Habiba, AG Abassi, R Masood, MA Shibli
2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing …, 2013
Smart phone based authentication and authorization protocol for SPACS
FK Bhutta, A Ghafoor, S Sultan
High Capacity Optical Networks and Emerging/Enabling Technologies, 127-131, 2012
The system can't perform the operation now. Try again later.
Articles 1–20