Date


School

Research Areas

People

Download Available

18 results

An authentication protocol based on chaos and zero knowledge proof

Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020)
An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authentica...

DNA Sequence Based Medical Image Encryption Scheme

Conference Proceeding
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018)
DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2018.8674221
Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdropper...

Intertwining and NCA Maps Based New Image Encryption Scheme

Conference Proceeding
Khan, F. A., Ahmed, J., Ahmad, J., Khan, J. S., & Stankovic, V. (2018)
Intertwining and NCA Maps Based New Image Encryption Scheme. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE)https://doi.org/10.1109/iccecome.2018.8658919
In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common no...

Detection and prevention of Black Hole Attacks in IOT & WSN

Conference Proceeding
Ali, S., Khan, M. A., Ahmad, J., Malik, A. W., & ur Rehman, A. (2018)
Detection and prevention of Black Hole Attacks in IOT & WSN. In 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC)https://doi.org/10.1109/fmec.2018.8364068
Wireless Sensor Network is the combination of small devices called sensor nodes, gateways and software. These nodes use wireless medium for transmission and are capable to sen...

A new technique for designing 8 × 8 substitution box for image encryption applications

Conference Proceeding
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017)
A new technique for designing 8 × 8 substitution box for image encryption applications. In 2017 9th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2017.8101591
To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secur...

A novel substitution box for encryption based on Lorenz equations

Conference Proceeding
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017)
A novel substitution box for encryption based on Lorenz equations. In 2017 International Conference on Circuits, System and Simulation (ICCSS)https://doi.org/10.1109/cirsyssim.2017.8023176
Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms...

Energy demand prediction through novel random neural network predictor for large non-domestic buildings

Conference Proceeding
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., Javed, A., & Phillipson, M. (2017)
Energy demand prediction through novel random neural network predictor for large non-domestic buildings. In 2017 Annual IEEE International Systems Conference (SysCon)https://doi.org/10.1109/syscon.2017.7934803
Buildings are among the largest consumers of energy in the world. In developed countries, buildings currently consumes 40% of the total energy and 51% of total electricity con...

Secure speech communication algorithm via DCT and TD-ERCS chaotic map

Conference Proceeding
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017)
Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE)https://doi.org/10.1109/iceee2.2017.7935827
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have ...

An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box

Journal Article
Khan, M. A., Ahmad, J., Javaid, Q., & Saqib, N. A. (2017)
An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 64(5), 531-540. https://doi.org/10.1080/09500340.2016.1246680
Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to...

TD-ERCS map-based confusion and diffusion of autocorrelated data

Journal Article
Khan, J. S., Ahmad, J., & Khan, M. A. (2017)
TD-ERCS map-based confusion and diffusion of autocorrelated data. Nonlinear Dynamics, 87(1), 93-107. https://doi.org/10.1007/s11071-016-3028-2
In this article, we proposed a new scheme to encrypt highly autocorrelated image pixel data. In existing literature, single substitution was used to break autocorrelation in i...