Skip Ribbon Commands
Skip to main content
 
Student Research Papers

Research Papers Published In Journals

  • M.Junaid Hussain, Umar Ilysa Vulnerabilities of IEEE 802, 11i Wireless LAN CCMP Protocol ENFORMATIKA 975-00803-0-0) 11 06 (24th -26th Feb 06)
  • Maj Monis Akhlaq Integrated Mechanism for Routing & Key Exchange WSEAS Transaction on Communication 1109-2742 6 08 Apr 2007
  • Firdous Kusar Sajjad Hussin Tai-hoom Kim Ashraf Masood Attack Resilient Random key Distribution Scheme for Distributed Sensor Networks Lecture Notes in Computer Science 0302-9743 (Print) 1611-3349 (On line) 4809/ 2007 11 17-20 Dec 07
  • Firdous Kusar Sajjad Hussin Jong Hyuk Park Ashraf Masood Secure Group Communication with Self- healing and Rekeying in Wireless Sensor Networks Lecture Notes in Computer Science 0302-9743 (Print) 1611-3349 (On line) 4864/ 2007 737-748 12-14 Dec 07
  • Firdous Kusar Sajjad Hussin Jong Hyuk Park Ashraf Masood A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks  Lecture Notes in Computer Science 0302-9743 (Print) 1611-3349 (On line) 4809/ 2007 745/757 17-20 Dec 07
  • Uzma Aslam Khan Sqn Ldr Fuzia Idrees A Generic technique for voice over IP VoIP Traffic Detection Intl Journal of Cptr Science and Network Security 2008 1738-7906 8/2 351 28 Feb 08
  • Firdous Kausar Sajid Hussain L. T. Yang Ashraf Masood Scalable and efficient key management scheme for Heterogeneous sensor network  The Journal of Supercomputing  0920-8542 15/1 44-65 Feb 08
  • Ruma Tahir M Younis Javed Attiq Ahmad Raja Iqbal SCUR: Secure Communication in Wireless Sensor Networks using Rabbit Intl Association of Engineers 978-988-98671-9-5 1 523-527 2-4 Jul 08
  • Firdous Kausar Sajid Hussain Jong Hyun Park Ashraf Masood An efficient collision Resistant Security Mechanism for Heterogeneous Sensor Network Research 1066-2243 14/2 204 2008
  • Rabia Sirhindi Mehreen Afzal Saeed Murtaza An improved data inding technique for inding shores in extended secret sharing schemes  Lecture Note in Cptr Science 978-3-540 88624-2 53083 376-386 16 Oct 08
  • Firdous Kausar Sajid Hussain Jong Hyun Park Ashraf Masood Sacable and Efficient Key Management for Heterogeneous Sensor Networks The Journal of Supercomputing 0920-8542 (print) 1673-0484 (On line) 45 44-65 Jul 2008
  • Firdous Kausar Ashraf Masood Sajid Hussain An authenticated Key Management schewe for Hirarchical wireless sensor networks Recent advances in communication system and electrical Evginery  1876-1100 IV 85-98 Feb 08
  • Rabia Sirhandi Dr Saeed Murtaza Mehreen Afzal  An extended Secret Sharing Scheme for Color Images with Fixed Pixed Expansion Intl Journal of Electronic Security and Digital forensics  1751-9128 In Press Inder science 2008
  • Rabia Iqbal Ayesha Naureen Attiya Akram A unified security framework with three key management schemes for wireless sensor networks Cptr comm. Journal special Issue on Multi-mode systems and their applications for pervasive  computing 2008 Seoul, Korea 01403664 In Press Elsevier Science Bv 2009
  • L.A. Khan M.S. Baig  Amr M. Youssef  Speaker recognition from encrypted VoIP communications Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada - Volume 7 Pages 65-73  2010
  • L. A. Khan, Farkhund Iqbal & M. S. Baig Speaker Verification from Partially Encrypted Compressed Speech Computer Security Laboratory, Faculty of Engineering and Computer Science, EV7.628 Concordia University, 1455 de Maisonneuve Blvd. West, Montreal, Quebec, Canada H3G 1M8 1742-2876 Volume 7 Pages 74-80 2010
  • Farkhund Iqbal, L. A. Khan, B. Fung, M. Debabi Email Authorship Verification for Forensic Investigation Proceedings of the 2010 ACM Symposium on Applied Computing,  Siere Switzerland - - pp 1591-1598 2010
  • L. A. Khan,  M. S. Baig  Ali Hassan Cryptanalysis of Stream Enciphered Speech Communication in a Keystream Reuse Situation Mehran University Research Journal of Engineering & Technology - Vol 29 (1)  pp 61-78 2010
  •  Research Papers Presented In Conferences

  • M.Umar llyas, Muid Mufti Effects of Fragmentation on IEEE 802.11b WLANs International Conference on Communication and Computer Networks 8TH-10TH November 2004 USA
  • M.Umar llyas Operational Bounds of IEEE 802.11b Networks Dependable System and Networks 29th _ 1st July 2004 Ltaly
  • M.Junaid Hussain, M. Umar llyas Imperfect Counter Mode Utilization –IEEE 802.11i WLAN”, IASTED International Conference on Networks and Communication Systems 29th – 31th March 2006 Thailand
  • M.Umar Ilyas INDICT – Irltrusion Detection, Identification, containment & Termination International Conference on Computing & Informatics – ICOCI-2006 6th-8th June 2006 Malaysia
  • Maj Baber Aslam 802.11 Disassociation DoS attack and solutions: A Survey International Conference (MCWC2006)” To be held 17 to 20 Sep 06 Jardon
  • Maj Baber Aslam Psedo randomized sequence number based solution to 802.11 disassociation dental of service attack Mobile Computing and Wireless comm. Intl conf (MCWC 2006) To be held on 17 to 20 Sep 2006 Jardon
  • Maj Babar Sarwar Kawish Reducing the Overheads in Fixed & Low Mobility AODV Based MANETs” 1st  International Conf on Computer Science and Information Tech (FIMCSIT) To be held on 6-10 Nov 2006 Wisla (Poland)
  • Maj Babar Sarwar Kawish Reduction of Overheads with Dynamic Caching in Fixed AODV based MANETs 6th International Enformatika Conf To be held on 24 – 26 Nov 06 Venice (Italy)
  • Maj Monis Akhlaq Addressing Security Concerns of Data Exch in AODV Protocol   XVI Intl Enformatika Conf 24-26 Nov 06 Venice (Italy)
  • Maj Kaleem Ullah Khan Authentication in Multi Hop Wireless Mesh Networks 3rd Intl Conf on IT 24-26 Nov 06 Venice (Italy)
  • Mehreen Afzal, Firdous Kausar,  Ashraf Masood Comparative Analysis of the Structures of eSTREAM Submitted Stream Ciphers IEEE International Conference on Emerging Technologies ICET 2006 13-14 Nov 2006 Peshawar, Pakistan
  • Mehreen Afzal, Ashraf Masood An Analysis of the Construction of Cryptographic Boolean Functions for Stream Ciphers IADIS International Conference Applied Computing 2007 17-20 February 2007 Salamanca, Spain
  • Mehreen Afzal, Ashraf Masood Algebraic Attack on A5-type Irregularly Clocked Key Stream Generator IAENG International Multi-Conference of Engineers and Computer Scientists 07 21-23 March 2007 Hong Kong
  • Mehreen Afzal, Ashraf Masood A Review of Cryptanalytic Attacks on e-STREAM Submitted Stream Ciphers  IAENG International Multi-Conference of Engineers and Computer Scientists 07 21-23 March 2007 Hong Kong
  • Firdous Kausar Ashraf Masood A Random Key Distribution Scheme for Securing Wireless Sensor Networks 10th IEEE International Multitopic Conference 2006 (INMIC 2006) 23-24 December 2006 Islamabad, Pakistan
  • Firdous Kausar Ashraf Masood An Analysis of Public Key Cryptography in Wireless Sensor Networks IAENG International Multi-Conference of Engineers and Computer Scientists 07 21-23 March 2007 Hong Kong
  • Firdous Kausar Ashraf Masood A Key Management Scheme based on Random Key Distribution for Clustered Wireless Sensor Networks IAENG International Multi-Conference of Engineers and Computer Scientists 07 21-23 March 2007 Hong Kong
  • Maj Monis Akhlaq Data Security Key Establishment in AODV XIX Intl Conf on cptr and Information Science and Engrs (CISE 2007) 29-31 Jan 07 Bangkok (Thailand)
  • Omer Nawaz, Waqas Nasir, Zia Nawaz Bhadiar & Maj Imtiaz Ahmad Khokhar Analysis of User Secific Interleavers for lterative Multi-User Detection System Intl association of  Engineers (IAENG)  2-4 Jul 2007 London UK
  • Lt Cdr Imran, Maj Imtiaz Ahmed Khokhar, Raja Iqbal, Dr Shoaib “OFDMA as the technology for next generation mobile wireless and Mobile wirless internet”  IEEE conference of 3rd international Conference on Wireless and Mobile communication (ICMWC – 2007)  3-9 Mar 07 French Caribbean.
  • Lt Cdr Imran, maj Imtiaz Ahmed Khokhar, Raja Iqbal, Dr Shoaib “Comparative analysis of OFDMA and MCIDMA multiple access techniques for mobile wireless applications”  ACM of Euro American conference on Telematics and information Systems – 2007. 14-17 May 07 Portugal
  • Omer Nawaz, Maj Imtiaz Ahmad Khokhar, Zia Nawaz, Waqas Nasir and Adnan “ A novel approach 4G communication system: Multi – Carrier Interleave Division Multiple Access”  7th IASTED international Conf WOC 2007  30 May to 2 Jun 07 Montreal, Quebec, Canada
  • Liaqat Ali Khan, M. Shamim Baig & M. Ashraf Exploiting Silence for Cipher text only Cryptanalysis of Stream Ciphered Digitized Voice Intl Conf on Security & Management (SAM ’07) – 2007  25-28 Jun 2007 Las Vegas (USA)
  • Liaqat Ali Khan “Reconstructing a Class of Cipher Systems Used in wireless Digital Communication Intl Conf on Electrical Engineering (ICEE) – 2007 11 – 12 Apr 07 UET Lahore
  • Maj Zaffar Iqbal Qureshi A Solution to Spoofed PS-Roll Based Denial of Service Attacks in 802.11 WLANs” 11th WSEAS Intl Conf on Comm 07 Session 26-28 Jul 2007 Crete Island, Greece
  • Maj Baber Aslam IEEE 802.11 Wireless Network simulator using Verilog 11th WSEAS Intl Conf on Comm 07 Session 26-28 Jun 2007 Crete Island, Greece
  • Sqn Ldr Liaqat Ali Khan & AVC ® Dr. M Shamim Baig Cryptanalysis of Key Reuse in Stream Ciphered Digitized Speech using HMM based ASR Techniques. Intl Association of Engrs (IAENG) 24-26 Oct 2007 San Francsico, USA
  • Firdous Kusar Sajid Hussain Ashraf Masood An Efficient Key Distribution Scheme for Heterogeneous Sensor Networks IWCMC-2007  12-16 Aug 2007 Turtle Bay Resrot  Honolulu, Hawaii, USA
  • Ahmad Raza Cheema, Asma Basharat & Rabia Sirhindi 1. A Novel Solution for IP Spoofing Attacks Depth –in- defense against DDoS WESEAS-2007 14-16 Dec 07 Tenerif Spain
  • Attiya Akram Ayesha Naureen Ki-Hyung Kin Evaluation of Hybrid Security system with cluster based key management for wireless sensor networks Intl conf on intelligent and advanced System) ICIAS  25-28 Nov 07 KL convention centre Kuala Lumpur Malaysia
  • Ayesha Naureen Attiya AKram Ki-Hyung Kin An End-to-End Security Architecture for sensor network Infl conf on info systems (ICIS 2007) 8-12 Dec 07 Montreal, Quebec (Canada)
  • Mehreen Afzal Dr Ashraf Masood Algebraic Cryptanalysis of a NLFSR Based Stream Cipher 3rd IEEE Intl Conf on Info & Comm Tech From Theory to application ICTTA-08, 7-11 Apr 08 Omsyysf Palace Damascus, Syria
  • Sqn Ldr Mansoor A Khan Dr Aamir Hasan  Pesdo Random Number Based Authentication to Counter Denial of Service Attacks  on 802.11” 5th Intl conf on Wireless and Optical Comm Networks 05-07 May 08 East Java (Indonesia)
  • Ayesha Naureen NC Attia Akram Dr Tariq Maqsood Rabia Iqbal Performance and Security Assessment of PKC Based Key Management Scheme for Hierachical Sensor Networks Intl Conf on Vehicular Technology Conf VTC 2008 (IEEE– 67 VTC 2008 ) 11-14 May 08. Marina Bay, Singapore
  • NC Ruma Tahir Dr Younis Javed Lec Ahmad Raza Cheema   Rabbit – MAC Lightweight Authenticated Encryption for Wireless Sensor Network IEEE Intl Conf on Info and Automation  20-23 Jun 08 ZhangJiaJie City Hunan, China
  • NC Rabia Sirhandi Dr Saeed Murtaza Mehreen Afzal  An extended Secret Sharing Scheme for Color Images with Fixed Pixed Expansion 4th Intl Conf on Global E-Security ICGES-08 23-25 Jun 08 University of East London Docklands Campus , London
  • NC Ayesha Iltaf Dr M. Younis Lt Col Attiq AHmad Security Enhancements for privacy and Key Management Protocol in IEEE-802.16e-2005 3rd Intl conf on Internet Monitoring and Protection (ICIMP-2008) 29 Jun to 05 Jul 08 Bucharest, Romania
  • Miss Mehreen Afzal Dr Muhammad Ashraf Experimental Results on Algebraic Analysis of Trivium and Tweaked Trivium 4th Intl Conf on Global E-Security ICGES’2008 23-25 Jun 08 University of East London Docklands Campus , London
  • Miss Mehreen Afzal Dr M. Ashraf Improved Results on Algebraic Cryptanalysis of A5/2 4th Intl Conf on Global E-Security ICGES’2008 23-25 Jun 08 University of East London Docklands Campus , London
  • Mehreen Afzal Brig Dr. Ashraf Masood Higher Order Non-linearity of Cryptographically Significant Boolean Functions and its Importance Intl Cryptology workshop and conf 2008 9-12 Jun 08 Putra world trade centre Kuala Lumpur Malaysia
  • NC Rabia Sirhandi Dr Saeed Murtaza An Extended Secret sharing scheme for visual Authentication Intl Cryptology Conf & Wksp – 08 9-12 Jul 08 PWTC Kuala Lumpur
  • Sheraz Naser Brig Dr M. Younis Lt Col Attiq Ahmad Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks : A Survey SNPD 2008 6-8 Aug 08 Phuket, Thailand
  • Lt Cdr Muzammil Ahmad Khan Lt Col Attiq Ahmad Lec Ahmad Raza Cheema Vulnerabilities of  UMTS Access domain security Architecture” SNPD 2008 6-8 Aug 08 Phuket, Thailand
  • Sqn Ldr Mansoor Ahmad Raza Cheema Dr Aamir Hasan Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction SNPD 2008 6-8 Aug 08 Phuket, Thailand
  • NC Rakhshanda Shaukat Ahmad Raza Chema Mobile IP Based Interoperability Between GSM and WiMAX 4th Intl Conf on Wireless & Mob Comm 27 Jul to 01 Aug 08 Athens, Greece
  • NC Asma Bashrat Asst Prof Imtiaz Ahmad Kokhar Asst Prof Dr Saeed Murtaza Security Analysis of Interleave Div Multiple Access: Next Generation Competitor Analysis of Interleave Div Multiple Acces 4th Intl Conf on Wireless & Mob Comm 27 Jul to 01 Aug 08 Athens, Greece
  • Rakhshanda Shaukat Shoaib Ahmad Khan Attiq Ahmad Threats Identification and Their Solution in Inter-Basestation Dynamic Resource Sharing IEEE-802.22 ICHIT-2008 28-29 Aug 08 Daejeon, Korea
  • Ayesha Altaf Rabia Sirhindi Attiq Ahmed A Novel Approach against DoS attacks in WiMAX Authentication using Visual Cryptography 2nd Intl Conf on Emerging Security Information Systems and Technologies SECURWARE-2008 25 to 31 Aug 08 Cap Esterel, France
  • Ruma Tahir M Younis Javed Attiq Ahmad SCUR: Secure Communication in Wireless Sensor Networks using Rabbit World Congress of Engineering 02-04 Jul 08 London UK,
  • Rakhshanda Shaukat Shoaib Ahmad Khan Attiq Ahmad Augmented Security in IEEE 802.22 MAC Layer Protocol WiCOM 2008 12-14 Oct 08 Dalian China
  • Rakhshnda Shaukat Shoab Ahmed Khan Fuzzy Expert System for Malicious Node Detection in Multiphop Wireless Network ICADIWT 2008 4-6 Aug 08 VSB-Technical University of Ostrava, Czech Republic
  • Liaqat Ali Khan AVM (R) Dr. M. Shamim Baig A Server based ASR Approach to Automated Cryptanalysis of Two Time Pads in case of Speech Intl conf on Info Security & Assurance (IAS08) 8-10 Sep 08 Naples, Italy
  • Firdous Kausar M. Qasim Saeed Brig Dr  Ashraf Masood Key Management and Secure Routing in Heterogeneous Sensor \s 4th IEEE Intl Conf on Wireless & Mob computing 12-14 Oct 08 Avigon, France
  • Rabia Sirhindi Dr Saeed Murtaza Miss Mehreen Afzal Improved Data Hiring Technique for Share in Extended Visual Secret Sharing Schemes 10th  Intl Conf on Information and Communications Security ICICS-2008 20 to 22 Oct 2008 Hyat Regency, Birmingham, UK
  • M. Zeshan Dr Shoab A Khan Ahmad Raza Cheema Lt Col Attiq Ahmad Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks Intl Seminar on Future Info Tech & Magt Engrs (FITME) 08 20 Nov 08 Leicestershire, UK
  • NC Asma Bashrat Maj Imtiaz Ahmad Khokhar Dr. Saeed Murtaza CDMA versus IDMA for subscriber cell density Innovation 08 16-18 Dec 08 UAE
  • M. Tariq AVM M. S Baig M. Tariq Saeed Associating the Authentication & Connection-Establishment Phase in Passive Authorization Techniques Intl Conf of Info Security & Internet Engrs 2-4 Jul 08 London UK.
  • Samin Jan Khan Dr Saeed Murtaza A Technique to Discourage the Relay Attack on CAPTCHA Intl Conf  on Web Intelligent System 8-10 Jan 09 Chennai, India
  • Ayesha Naureen Attia Akram A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks 3rd Intl Conf on Info Security & Assurance (IAWSN 09) 25-27 Jun 09 Seoul Korea
  • Firdous Kausar Ayesha Naureen A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment 3rd Intl Conf on Info Security & Assurance (IAWSN 09) 25-27 Jun 09 Seoul Korea
  • NC Rabia Latif Brig Dr. Mukhtar Ahmad Hardware-Based Random Number Generation in Wireless Sensor Networks (WNSs) 3rd Intl Conf on Info Security & Assurance (IAWSN 09) 25-27 Jun 09 Seoul Korea
  • NC Usama Ahmed Dr. M. Arif Wahla Fault Tolerant Secure Routing in Cluster based Mobile Sensor Network 3rd Intl Conf on Info Security & Assurance (IAWSN 09) 25-27 Jun 09 Seoul Korea
  • NC Asma Khalid Dr Mukhtar Hussain A Secure Group Reckeying Scheme with Compromised Node Revocation in Wireless Sensor Networks 3rd Intl Conf on Info Security & Assurance (IAWSN 09) 25-27 Jun 09 Seoul Korea
  • Maj Shakil  Ahmad Dr M. Arif Firdous Kausar Authenticated Encryption in WSNs using eSTREAM ciphers 3rd Intl Conf on Info Security & Assurance (IAWSN 09) 25-27 Jun 09 Seoul Korea
  • Sqn Ldr Zeeshan Bilal Dr Ashraf Masood Firdous Kausar Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol 12th Intl Conf on Network-Based Information Systems (NBiS-09) 19-21 Aug 09 Indianapolis, USA
  • NC M. Kamran Ahmad Brig Dr Mukhtar Hussain Asad Raza An Automated User Transparent Approach to log Web URLs for Forensic Analysis  5th International Conference on IT Security Incident Management and IT Forensics (IMF-2009) 15-17 Sep 2009. Stuttgarty, Germany
  • NC M.Yasin Dr M.ARif Wahla Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts” 5th International Conference on IT Security Incident Management and IT Forensics (IMF-2009) 15-17 Sep 2009. Stuttgarty, Germany
  • Asad Raza Haider Abbas Security characterization for Evaluation of Software Architectures using ATAM 3rd International Conference on Info and Comm Technologies (ICICT-2009 15-16 Aug  09 IBA Karachi, Pakistan
  • Muhammad Yasin, Dr Muhammad Arif Analysis of  Free Download Manager (FDM) for Forensic Artifacts 1st International Conference on Digital Forensics and Cyber Crime September 30 September to 2nd October, 2009 Albany, NY, USA
  • Muhammad Yasin, Dr Muhammad Arif Analysis of Internet Download Manager (IDM) for Foren sic Artefacts Annual Computer Security Applications Conference: ACSAC2009 December 7-11, 2009 Honolulu, Hawaji, USA
  • M. Qasim Saeed Dr. Ashraf Masood Dr. Firdous Kausar Securing ePassport system: A proposed Anti-Cloning and Anti-Skimming Protocol 17th International Conference on Software, Telecommunications & Computer Networks, 2009. SoftCOM 2009.  24-26 Sep 2009 Hvar, Croatia
  • NC Fahad Ahmed Dr. Asif Masood Dr. Faisal Bashir A Publicly verifiable low cost signcryption scheme ensuting confidentiality 2nd Intl Conference on Network Security, Wirless Communications and Trusted Computing (NSWCTS 2010) 24-25 April 2010 Wuhan China
  • Numan Abdullah Shah Dr. Muhammad Arif Secure Architecture for RFID Enabled Supply Chain Hierarchy  PST2010 Eighth Annual Conference on Privacy, Security and Trust 17-19 August 2010 Ottawa, Ontario, Canada
  • Sqn Ldr Mujahid Mohsin Dr.Muhammad Arif Dr. Mehreen Afzal Think Before Your LFSRs Jump 2010 10th IEEE International Conference on Computer and Information Technology June 29-July 01 , 2010 Bradford, West Yorkshire, UK
  • Waqas Aman Faisal Bashir Firdous Kausar Instituting Secure Trust Relationship in WPANs Using Bluetooth “3rd International Conference on Computational Intelligence and Industrial Applications PACIIA (2010) 04-05 December, 2010, Wuhan, China
  • Muddassar Mushtaq, Mehreen Afzal and Muhammad Arif Wahla A New and Efficient Distance Bounding Protocol “3rd International Conference on Computational Intelligence and Industrial Applications PACIIA  04-05 December, 2010, Wuhan, China
  • F. Ahmad, A. Masood, F. Kausar “An efficient multi recipient signcryption scheme offering non repudiation” 10th IEEE International Conference on Computer and Information Technology 2010 West Yorkshire, UK
  • U. Ahmed, A. Masood “Host based Intrusion Detection using RBF neural networks” 5th IEEE International Conference on Emerging Technologies,  2009 Islamabad, Pakistan
  • Mian Muhammad Waseem Iqbal, Firdous Kausar and Muhammad Arif Wahla "Attacks on Bluetooth Security Architecture and Its Countermeasures ",  Communications in Computer and Information Science,  2010 USA