What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Muhammad Khurram Khan
Google Scholar
ORCID:
0000-0001-6636-0533
13
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Comments on "VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning".
Zhuoqun Yan
Wenfang Zhang
Xiaomin Wang
Muhammad Khurram Khan
2025
journals/compsec
NDIF: A distributed framework for efficient in-network neural network inference.
Shengrui Lin
Shaowei Xu
Binjie He
Hongyan Liu
Dezhang Kong
Xiang Chen
Dong Zhang
Chunming Wu
Ming Li
Xuan Liu
Yuqin Wu
Muhammad Khurram Khan
2024
journals/compsec
A comprehensive examination of email spoofing: Issues and prospects for email security.
Sibi Chakkaravarthy Sethuraman
Devi Priya V. S
Tarun Reddi
Mulka Sai Tharun Reddy
Muhammad Khurram Khan
2024
journals/tifs
rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN.
Dezhang Kong
Xiang Chen
Chunming Wu
Yi Shen
Zhengyan Zhou
Qiumei Cheng
Xuan Liu
Mingliang Yang
Yubing Qiu
Dong Zhang
Muhammad Khurram Khan
2023
journals/compsec
Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing.
Wenfang Zhang
Heng Jiao
Zhuoqun Yan
Xiaomin Wang
Muhammad Khurram Khan
2023
journals/compsec
Container security: Precaution levels, mitigation strategies, and research perspectives.
Devi Priya V. S
Sibi Chakkaravarthy Sethuraman
Muhammad Khurram Khan
2023
journals/tifs
Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches.
Xiang Chen
Hongyan Liu
Qun Huang
Dong Zhang
Haifeng Zhou
Chunming Wu
Xuan Liu
Muhammad Khurram Khan
2022
journals/istr
A blockchain-based conditional privacy-preserving authentication scheme for edge computing services.
Yifan Wang
Xiaoying Jia
Yongbo Xia
Muhammad Khurram Khan
Debiao He
2021
journals/compsec
Ransomware: Recent advances, analysis, challenges and future research directions.
Craig Beaman
Ashley Barkworth
Toluwalope David Akande
Saqib Hakak
Muhammad Khurram Khan
2020
journals/compsec
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey.
Shuyun Shi
Debiao He
Li Li
Neeraj Kumar
Muhammad Khurram Khan
Kim-Kwang Raymond Choo
2020
journals/compsec
Proof of X-repute blockchain consensus protocol for IoT systems.
Eric Ke Wang
RuiPei Sun
Chien-Ming Chen
Zuodong Liang
Saru Kumari
Muhammad Khurram Khan
2020
journals/tifs
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
Chao Lin
Debiao He
Xinyi Huang
Muhammad Khurram Khan
Kim-Kwang Raymond Choo
2013
journals/tifs
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET.
Shi-Jinn Horng
Shiang-Feng Tzeng
Yi Pan
Pingzhi Fan
Xian Wang
Tianrui Li
Muhammad Khurram Khan
Coauthors
Ashley Barkworth
(1)
Binjie He
(1)
Chao Lin
(1)
Chien-Ming Chen
(1)
Chunming Wu
(3)
Craig Beaman
(1)
Debiao He
(3)
Devi Priya V. S
(2)
Dezhang Kong
(2)
Dong Zhang
(3)
Eric Ke Wang
(1)
Haifeng Zhou
(1)
Heng Jiao
(1)
Hongyan Liu
(2)
Kim-Kwang Raymond Choo
(2)
Li Li
(1)
Ming Li
(1)
Mingliang Yang
(1)
Muhammad Khurram Khan
(13)
Mulka Sai Tharun Reddy
(1)
Neeraj Kumar
(1)
Pingzhi Fan
(1)
Qiumei Cheng
(1)
Qun Huang
(1)
RuiPei Sun
(1)
Saqib Hakak
(1)
Saru Kumari
(1)
Shaowei Xu
(1)
Shengrui Lin
(1)
Shi-Jinn Horng
(1)
Shiang-Feng Tzeng
(1)
Shuyun Shi
(1)
Sibi Chakkaravarthy Sethuraman
(2)
Tarun Reddi
(1)
Tianrui Li
(1)
Toluwalope David Akande
(1)
Wenfang Zhang
(2)
Xian Wang
(1)
Xiang Chen
(3)
Xiaomin Wang
(2)
Xiaoying Jia
(1)
Xinyi Huang
(1)
Xuan Liu
(3)
Yi Pan
(1)
Yi Shen
(1)
Yifan Wang
(1)
Yongbo Xia
(1)
Yubing Qiu
(1)
Yuqin Wu
(1)
Zhengyan Zhou
(1)
Zhuoqun Yan
(2)
Zuodong Liang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to