default search action
Azeem Irshad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Azeem Irshad, Mohammed Alreshoodi:
SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks. IEEE Access 12: 49062-49077 (2024) - [j51]Ying Qin, Azeem Irshad:
Research on the evaluation method of English textbook readability based on the TextCNN model and its application in teaching design. PeerJ Comput. Sci. 10: e1895 (2024) - [j50]Tanveer Ahmad, Muhammad Usman, Marryam Murtaza, Ian B. Benitez, Asim Anwar, Vasos Vassiliou, Azeem Irshad, Xue Jun Li, Essam A. Al-Ammar:
A Novel Self-Calibrated UWB-Based Indoor Localization Systems for Context-Aware Applications. IEEE Trans. Consumer Electron. 70(1): 1672-1684 (2024) - [j49]Azeem Irshad, Bander A. Alzahrani, Aiiad Albeshri, Khalid Alsubhi, Anand Nayyar, Shehzad Ashraf Chaudhry:
SPAKE-DC: A Secure PUF Enabled Authenticated Key Exchange for 5G-Based Drone Communications. IEEE Trans. Veh. Technol. 73(4): 5770-5780 (2024) - 2023
- [j48]Sulaiman M. Karim, Adib Habbal, Shehzad Ashraf Chaudhry, Azeem Irshad:
BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment. IEEE Access 11: 36158-36175 (2023) - [j47]Ismail Keshta, Mukesh Soni, Mohammed Wasim Bhatt, Azeem Irshad, Ali Rizwan, Shakir Khan, Renato R. Maaliw, Arsalan Muhammad Soomar, Mohammad Shabaz:
Energy efficient indoor localisation for narrowband internet of things. CAAI Trans. Intell. Technol. 8(4): 1150-1163 (2023) - [j46]Azeem Irshad, Ghulam Ali Mallah, Muhammad Bilal, Shehzad Ashraf Chaudhry, Muhammad Shafiq, Houbing Song:
SUSIC: A Secure User Access Control Mechanism for SDN-Enabled IIoT and Cyber-Physical Systems. IEEE Internet Things J. 10(18): 16504-16515 (2023) - [j45]Ghazala Nasreen, Kashif Haneef, Maria Tamoor, Azeem Irshad:
Review: a comparative study of state-of-the-art skin image segmentation techniques with CNN. Multim. Tools Appl. 82(7): 10921-10942 (2023) - [j44]Shehzad Ashraf Chaudhry, Azeem Irshad, Muhammad Asghar Khan, Sajjad Ahmad Khan, Summera Nosheen, Ahmad Ali AlZubi, Yousaf Bin Zikria:
A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System. IEEE Trans. Intell. Transp. Syst. 24(2): 2401-2410 (2023) - [j43]Muhammad Ayzed Mirza, Junsheng Yu, Salman Raza, Manzoor Ahmed, Muhammad Asif, Azeem Irshad, Neeraj Kumar:
MCLA Task Offloading Framework for 5G-NR-V2X-Based Heterogeneous VECNs. IEEE Trans. Intell. Transp. Syst. 24(12): 14329-14346 (2023) - [j42]Bander A. Alzahrani, Azeem Irshad:
An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics. Wirel. Pers. Commun. 129(1): 399-422 (2023) - 2022
- [j41]Azeem Irshad, Shehzad Ashraf Chaudhry, Anwar Ghani, Ghulam Ali Mallah, Muhammad Bilal, Bander A. Alzahrani:
A low-cost privacy preserving user access in mobile edge computing framework. Comput. Electr. Eng. 98: 107692 (2022) - 2021
- [j40]Azeem Irshad, Shehzad Ashraf Chaudhry, Anwar Ghani, Muhammad Bilal:
A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment. Comput. Networks 195: 108219 (2021) - [j39]Shehzad Ashraf Chaudhry, Jamel Nebhen, Azeem Irshad, Ali Kashif Bashir, Rupak Kharel, Keping Yu, Yousaf Bin Zikria:
A Physical Capture Resistant Authentication Scheme for the Internet of Drones. IEEE Commun. Stand. Mag. 5(4): 62-67 (2021) - [j38]Azeem Irshad, Shehzad Ashraf Chaudhry:
Comment on 'ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications'. IET Networks 10(5): 244-245 (2021) - [j37]Afzal Badshah, Anwar Ghani, Azeem Irshad, Husnain Naqvi, Saru Kumari:
Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost. Int. J. Commun. Syst. 34(3) (2021) - [j36]Azeem Irshad, Shehzad Ashraf Chaudhry, Osama Ahmad Alomari, Khalid Yahya, Neeraj Kumar:
A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework. IEEE Syst. J. 15(3): 3664-3672 (2021) - [j35]Shehzad Ashraf Chaudhry, Azeem Irshad, Khalid Yahya, Neeraj Kumar, Mamoun Alazab, Yousaf Bin Zikria:
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment. ACM Trans. Internet Techn. 21(3): 78:1-78:19 (2021) - [j34]Azeem Irshad, Muhammad Usman, Shehzad Ashraf Chaudhry, Ali Kashif Bashir, Alireza Jolfaei, Gautam Srivastava:
Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server. IEEE Trans. Reliab. 70(3): 1014-1025 (2021) - [j33]Bander A. Alzahrani, Azeem Irshad, Aiiad Albeshri, Khalid Alsubhi:
A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks. Wirel. Pers. Commun. 117(1): 47-69 (2021) - 2020
- [j32]Bander A. Alzahrani, Azeem Irshad, Aiiad Albeshri, Khalid Alsubhi, Muhammad Shafiq:
An Improved Lightweight Authentication Protocol for Wireless Body Area Networks. IEEE Access 8: 190855-190872 (2020) - [j31]Bander A. Alzahrani, Azeem Irshad, Khalid Alsubhi, Aiiad Albeshri:
A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT. Int. J. Commun. Syst. 33(11) (2020) - [j30]Mahmood Ul Hassan, Shehzad Ashraf Chaudhry, Azeem Irshad:
An Improved SIP Authenticated Key Agreement Based on Dongqing et al. Wirel. Pers. Commun. 110(4): 2087-2107 (2020)
2010 – 2019
- 2019
- [j29]Fiaz Majeed, Muhammad Shafiq, Amjad Ali, Muhammad Awais Hassan, Syed Ali Abbas, Mohammad Eid Alzahrani, Muhammad Qaiser Saleem, Hannan Bin Liaqat, Akber Gardezi, Azeem Irshad:
Self-Citation Analysis on Google Scholar Dataset for H-Index Corrections. IEEE Access 7: 126025-126036 (2019) - [j28]Ali Mohammad Khodadoust, Javad Khodadoust, Azeem Irshad, Shehzad Ashraf Chaudhry:
Performance analysis of secure communications over correlated slow-fading additive white Gaussian noise channels. Int. J. Commun. Syst. 32(12) (2019) - [j27]Azeem Irshad, Shehzad Ashraf Chaudhry, Muhammad Shafiq, Muhammad Usman, Muhammad Asif, Anwar Ghani:
A provable and secure mobile user authentication scheme for mobile cloud computing services. Int. J. Commun. Syst. 32(14) (2019) - [j26]Azeem Irshad, Shehzad Ashraf Chaudhry, Muhammad Shafiq, Muhammad Usman, Muhammad Asif, Saru Kumari:
An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol. Inf. Technol. Control. 48(2): 211-224 (2019) - [j25]Muhammad Shafiq, Maqbool Ahmad, Muhammad Khalil Afzal, Amjad Ali, Azeem Irshad, Jin-Ghoo Choi:
Handshake Sense Multiple Access Control for Cognitive Radio-Based IoT Networks. Sensors 19(2): 241 (2019) - [j24]Muhammad Shafiq, Pankaj Singh, Imran Ashraf, Maqbool Ahmad, Amjad Ali, Azeem Irshad, Muhammad Khalil Afzal, Jin-Ghoo Choi:
Ranked Sense Multiple Access Control Protocol for Multichannel Cognitive Radio-Based IoT Networks. Sensors 19(7): 1703 (2019) - [j23]Azeem Irshad, Shehzad Ashraf Chaudhry, Muhammad Sher, Bander A. Alzahrani, Saru Kumari, Xiong Li, Fan Wu:
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre. IEEE Syst. J. 13(1): 436-446 (2019) - 2018
- [j22]Khalid Mahmood, Husnain Naqvi, Bander A. Alzahrani, Zahid Mehmood, Azeem Irshad, Shehzad Ashraf Chaudhry:
An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment. Int. J. Commun. Syst. 31(18) (2018) - [j21]Azeem Irshad, Husnain Naqvi, Shehzad Ashraf Chaudhry, Muhammad Usman, Muhammad Shafiq, Omid Mir, Ambrina Kanwal:
Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme. Inf. Technol. Control. 47(3): 431-446 (2018) - [j20]Azeem Irshad, Muhammad Sher, Bander A. Alzahrani, Aiiad Albeshri, Shehzad Ashraf Chaudhry, Saru Kumari:
Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al. KSII Trans. Internet Inf. Syst. 12(1): 523-549 (2018) - [j19]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Qi Xie, Saru Kumari, Fan Wu:
An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multim. Tools Appl. 77(1): 1167-1204 (2018) - [j18]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Saru Kumari, Arun Kumar Sangaiah, Xiong Li, Fan Wu:
A secure mutual authenticated key agreement of user with multiple servers for critical systems. Multim. Tools Appl. 77(9): 11067-11099 (2018) - [j17]Muhammad Shafiq, Maqbool Ahmad, Azeem Irshad, Moneeb Gohar, Muhammad Usman, Muhammad Khalil Afzal, Jin-Ghoo Choi, Heejung Yu:
Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks. Sensors 18(7): 2043 (2018) - [j16]Maqbool Ahmad, Muhammad Shafiq, Azeem Irshad, Muhammad Khalil Afzal, Dae Wan Kim, Jin-Ghoo Choi:
Adaptive and Economically-Robust Group Selling of Spectrum Slots for Cognitive Radio-Based Networks. Sensors 18(8): 2490 (2018) - [j15]Azeem Irshad, Husnain Naqvi, Shehzad Ashraf Chaudhry, Shouket Raheem, Saru Kumari, Ambrina Kanwal, Muhammad Usman:
An efficient and secure design of multi-server authenticated key agreement protocol. J. Supercomput. 74(9): 4771-4797 (2018) - 2017
- [j14]Azeem Irshad, Shehzad Ashraf Chaudhry, Saru Kumari, Muhammad Usman, Khalid Mahmood, Ch. Muhammad Shahzad Faisal:
An improved lightweight multiserver authentication scheme. Int. J. Commun. Syst. 30(17) (2017) - [j13]Azeem Irshad, Muhammad Sher, Omer Nawaz, Shehzad Ashraf Chaudhry, Imran Khan, Saru Kumari:
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme. Multim. Tools Appl. 76(15): 16463-16489 (2017) - [j12]Azeem Irshad, Shehzad Ashraf Chaudhry:
Comments on "A privacy preserving three-factor authentication protocol for e-health clouds". J. Supercomput. 73(4): 1504-1508 (2017) - [j11]Azeem Irshad, Muhammad Sher, Muhammad Usman Ashraf, Bander A. Alzahrani, Fan Wu, Qi Xie, Saru Kumari:
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme. Wirel. Pers. Commun. 95(3): 3185-3208 (2017) - [j10]Azeem Irshad, Saru Kumari, Xiong Li, Fan Wu, Shehzad Ashraf Chaudhry, Hamed Arshad:
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification. Wirel. Pers. Commun. 97(2): 2145-2166 (2017) - 2016
- [j9]Azeem Irshad, Muhammad Salman, Sajid Bashir, Mohammad Bilal Malik:
Extended state space recursive least squares. Digit. Signal Process. 49: 95-103 (2016) - [j8]Azeem Irshad, Muhammad Sher, Hafiz Farooq Ahmad, Bander A. Alzahrani, Shehzad Ashraf Chaudhry, Rahul Kumar:
An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services. KSII Trans. Internet Inf. Syst. 10(12): 5529-5552 (2016) - [j7]Azeem Irshad, Hafiz Farooq Ahmad, Bander A. Alzahrani, Muhammad Sher, Shehzad Ashraf Chaudhry:
An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture. KSII Trans. Internet Inf. Syst. 10(12): 5572-5595 (2016) - [j6]Shehzad Ashraf Chaudhry, Imran Khan, Azeem Irshad, Muhammad Usman Ashraf, Muhammad Khurram Khan, Hafiz Farooq Ahmad:
A provably secure anonymous authentication scheme for Session Initiation Protocol. Secur. Commun. Networks 9(18): 5016-5027 (2016) - [j5]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Husnain Naqvi, Mohammad Sabzinejad Farash:
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre. J. Supercomput. 72(4): 1623-1644 (2016) - 2015
- [j4]Muhammad Shahzad Asif, Muhammad Shafiq, Jin-Ghoo Choi, Muddesar Iqbal, Azeem Irshad:
Flexible and efficient aggregation framework for antifragile wireless mesh networks. J. Reliab. Intell. Environ. 1(2-4): 159-171 (2015) - [j3]Shehzad Ashraf Chaudhry, Nizamuddin, Muhammad Sher, Anwar Ghani, Husnain Naqvi, Azeem Irshad:
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multim. Tools Appl. 74(5): 1711-1723 (2015) - [j2]Azeem Irshad, Muhammad Sher, Eid Rehman, Shehzad Ashraf Chaudhry, Mahmood Ul Hassan, Anwar Ghani:
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card. Multim. Tools Appl. 74(11): 3967-3984 (2015) - [i1]Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Ch. Muhammad Shahzad Faisal, Mahmood Ul Hassan:
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment. IACR Cryptol. ePrint Arch. 2015: 686 (2015) - 2014
- [j1]Azeem Irshad, Muhammad Sher, Ch. Muhammad Shahzad Faisal, Anwer Ghani, Mahmood Ul Hassan, Shehzad Ashraf Chaudhry:
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Secur. Commun. Networks 7(8): 1210-1218 (2014) - [c5]Muhammad Shafiq, Jin-Ghoo Choi, Muddesar Iqbal, Muhammad Faheem, Maqbool Ahmad, Imran Ashraf, Azeem Irshad:
Skill Specific Spoken Dialogues Based Personalized ATM Design to Maximize Effective Interaction for Visually Impaired Persona. HCI (11) 2014: 446-457 - 2011
- [c4]Azeem Irshad, Muddesar Iqbal, Amjad Ali, Muhammad Shafiq:
An Algorithm for Prediction of Overhead Messages in Client-Server Based Wireless Networks. ICCSA (4) 2011: 412-423 - 2010
- [c3]Azeem Irshad, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram, Ehtsham Irshad, Muhammad Usman:
Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers. SUComS 2010: 86-95 - [c2]Ehtsham Irshad, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram, Azeem Irshad, Muhammad Usman:
Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks. SUComS 2010: 96-103
2000 – 2009
- 2009
- [c1]Muhammad Usman, Surraya Khanum, Wajahat Noshairwan, Ehtsham Irshad, Azeem Irshad:
Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN. HPCA (China) 2009: 384-389
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint