default search action
Noor Ul Amin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Imtiaz Ahmad, Muhammad Adnan, Noor Ul Amin, Asif Umer, Adnan Khurshid, Khursheed Aurangzeb, Muhammad Gulistan:
Adaptive and Priority-Based Data Aggregation and Scheduling Model for Wireless Sensor Network. Knowl. Based Syst. 303: 112393 (2024) - 2023
- [j28]Muhammad Yasir Khan, Muhammad Adnan, Jawaid Iqbal, Noor Ul Amin, Byeong-Hee Roh, Jehad Ali:
A Hierarchal Clustered Based Proactive Caching in NDN-Based Vehicular Network. Comput. Syst. Sci. Eng. 47(1): 1185-1208 (2023) - [j27]Zainab Jamroz, Insaf Ullah, Bilal Hassan, Noor Ul Amin, Muhammad Asghar Khan, Pascal Lorenz, Nisreen Innab:
An Optimal Authentication Scheme through Dual Signature for the Internet of Medical Things. Future Internet 15(8): 258 (2023) - [j26]Nizamud Din, Abdul Waheed, Shamsher Ullah, Noor Ul Amin, Gautam Srivastava, Farhan Ullah, Jerry Chun-Wei Lin:
A typology of secure multicast communication over 5 G/6 G networks. Int. J. Inf. Sec. 22(4): 1055-1073 (2023) - 2022
- [j25]Sagheer Ahmed Jan, Noor Ul Amin, Junaid Shuja, Assad Abbas, Mohammed Maray, Mazhar Ali:
SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for IoT Based Vehicular Ad hoc Networks. Sensors 22(11): 4019 (2022) - 2021
- [j24]Sagheer Ahmed Jan, Noor Ul Amin, Mohamed Othman, Mazhar Ali, Arif Iqbal Umar, Abdul Basir:
A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues. IEEE Access 9: 153701-153726 (2021) - [j23]Jawaid Iqbal, Arif Iqbal Umar, Noor Ul Amin, Abdul Waheed, Saleem Abdullah, Mahdi Zareei, Muazzam Ali Khan Khattak:
Efficient network selection using multi fuzzy criteria for confidential data transmission in wireless body sensor networks. J. Intell. Fuzzy Syst. 41(1): 37-55 (2021) - [j22]Insaf Ullah, Noor Ul Amin, Muhammad Asghar Khan, Hizbullah Khattak, Saru Kumari:
An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System. J. Medical Syst. 45(1): 4 (2021) - [j21]Insaf Ullah, Sherali Zeadally, Noor Ul Amin, Muhammad Asghar Khan, Hizbullah Khattak:
Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN). Microprocess. Microsystems 81: 103477 (2021) - [j20]Muhammad Adnan, Jawaid Iqbal, Abdul Waheed, Noor Ul Amin, Mahdi Zareei, Shidrokh Goudarzi, Asif Umer:
On the Design of Efficient Hierarchic Architecture for Software Defined Vehicular Networks. Sensors 21(4): 1400 (2021) - [j19]Muhammad Adnan, Jawaid Iqbal, Abdul Waheed, Noor Ul Amin, Mahdi Zareei, Asif Umer, Ehab Mahmoud Mohamed:
Towards the Design of Efficient and Secure Architecture for Software-Defined Vehicular Networks. Sensors 21(11): 3902 (2021) - [j18]Aliya Fahmi, Noor Ul Amin:
Group decision-making based on bipolar neutrosophic fuzzy prioritized muirhead mean weighted averaging operator. Soft Comput. 25(15): 10019-10036 (2021) - 2020
- [j17]Muhammad Asghar Khan, Insaf Ullah, Shibli Nisar, Fazal Noor, Ijaz Mansoor Qureshi, Fahim Ullah Khanzada, Noor Ul Amin:
An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network. IEEE Access 8: 36807-36828 (2020) - [j16]Syed Sajid Ullah, Insaf Ullah, Hizbullah Khattak, Muhammad Asghar Khan, Muhammad Adnan, Saddam Hussain, Noor Ul Amin, Muazzam Ali Khan Khattak:
A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things. IEEE Access 8: 98910-98928 (2020) - [j15]Abdul Waheed, Arif Iqbal Umar, Mahdi Zareei, Nizamud Din, Noor Ul Amin, Jawaid Iqbal, Yousaf Saeed, Ehab Mahmoud Mohamed:
Cryptanalysis and Improvement of a Proxy Signcryption Scheme in the Standard Computational Model. IEEE Access 8: 131188-131201 (2020) - [j14]Insaf Ullah, Noor Ul Amin, Ahmad Almogren, Muhammad Asghar Khan, Muhammad Irfan Uddin, Qiaozhi Hua:
A Lightweight and Secured Certificate-Based Proxy Signcryption (CB-PS) Scheme for E-Prescription Systems. IEEE Access 8: 199197-199212 (2020) - [j13]Jawaid Iqbal, Abdul Waheed, Mahdi Zareei, Arif Iqbal Umar, Noor Ul Amin, Abdallah Aldosary, Ehab Mahmoud Mohamed:
A Lightweight and Secure Attribute-Based Multi Receiver Generalized Signcryption Scheme for Body Sensor Networks. IEEE Access 8: 200283-200304 (2020) - [j12]Muhammad Shakeel, Muhammad Aslam, Noor Ul Amin, Muhammad Jamil:
Method of MAGDM based on pythagorean trapezoidal uncertain linguistic hesitant fuzzy aggregation operator with Einstein operations. J. Intell. Fuzzy Syst. 38(2): 2211-2230 (2020) - [j11]Noor Ul Amin, Humaira Masood Siddiqi, Yang Kun Lin, Zakir Hussain, Nasir Majeed:
Bovine Serum Albumin Protein-Based Liquid Crystal Biosensors for Optical Detection of Toxic Heavy Metals in Water. Sensors 20(1): 298 (2020) - [j10]Manazara Rehman, Hizbullah Khattak, Ahmed Saeed Alzahrani, Insaf Ullah, Muhammad Adnan, Syed Sajid Ullah, Noor Ul Amin, Saddam Hussain, Shah Jahan Khattak:
A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking-Enabled Internet of Things. Wirel. Commun. Mob. Comput. 2020: 8857272:1-8857272:20 (2020)
2010 – 2019
- 2019
- [j9]Jawaid Iqbal, Arif Iqbal Umar, Noor Ul Amin, Abdul Waheed:
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain. Int. J. Distributed Sens. Networks 15(9) (2019) - [j8]Muhammad Shakeel, Saleem Abdullah, Muhammad Shahzad, Fazli Amin, Tahir Mahmood, Noor Ul Amin:
Pythagorean trapezoidal fuzzy geometric aggregation operators based on Einstein operations and their application in group decision making. J. Intell. Fuzzy Syst. 36(1): 309-324 (2019) - [j7]Faisal Khan, Saleem Abdullah, Tariq Mahmood, Muhammad Shakeel, Muhammad Rahim, Noor Ul Amin:
Pythagorean cubic fuzzy aggregation information based on confidence levels and its application to multi-criteria decision making process. J. Intell. Fuzzy Syst. 36(6): 5669-5683 (2019) - [j6]Aliya Fahmi, Fazli Amin, Saleem Abdullah, Muhammad Aslam, Noor Ul Amin:
Cubic Fuzzy multi-attribute group decision-making with an application to plant location selected based on a new extended Vikor method. J. Intell. Fuzzy Syst. 37(1): 583-596 (2019) - [j5]Shahzaib Ashraf, Saleem Abdullah, Florentin Smarandache, Noor Ul Amin:
Logarithmic Hybrid Aggregation Operators Based on Single Valued Neutrosophic Sets and Their Applications in Decision Support Systems. Symmetry 11(3): 364 (2019) - [j4]Arshad Ahmad Khan, Saleem Abdullah, Muhammad Shakeel, Faisal Khan, Noor Ul Amin, Jianchao Luo:
A New Ranking Methodology for Pythagorean Trapezoidal Uncertain Linguistic Fuzzy Sets Based on Einstein Operations. Symmetry 11(3): 440 (2019) - [j3]Insaf Ullah, Noor Ul Amin, Mahdi Zareei, Asim Zeb, Hizbullah Khattak, Ajab Khan, Shidrokh Goudarzi:
A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications. Symmetry 11(11): 1386 (2019) - [p2]Sardar Mehboob Hussain, Abdul Wahid, Munam Ali Shah, Adnan Akhunzada, Faheem Khan, Noor Ul Amin, Saba Arshad, Ihsan Ali:
Seven Pillars to Achieve Energy Efficiency in High-Performance Computing Data Centers. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 93-105 - [p1]Sidra Razzaq, Abdul Wahid, Faheem Khan, Noor Ul Amin, Munam Ali Shah, Adnan Akhunzada, Ihsan Ali:
Scheduling Algorithms for High-Performance Computing: An Application Perspective of Fog Computing. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 107-117 - 2018
- [j2]Sahrish Khan Tayyaba, Adnan Akhunzada, Noor Ul Amin, Munam Ali Shah, Faheem Khan, Ihsan Ali:
NPRA: Novel Policy Framework for Resource Allocation in 5G Software Defined Networks. EAI Endorsed Trans. Mob. Commun. Appl. 4(13): e6 (2018) - 2017
- [c5]Noor Ul Amin, Kifayat-Ullah Khan, Batjargal Dolgorsuren, Young-Koo Lee:
Extracting top-K interesting subgraphs with weighted query semantics. BigComp 2017: 366-373 - 2015
- [j1]Yongkoo Han, Kisung Park, Jihye Hong, Noor Ul Amin, Young-Koo Lee:
Distance-Constraint k-Nearest Neighbor Searching in Mobile Sensor Networks. Sensors 15(8): 18209-18228 (2015) - [c4]Noor Ul Amin, Kifayat-Ullah Khan, Young-Koo Lee:
Analyzing Subgraph Isomorphism on Graphs with Diverse Structural Properties. BigDAS 2015: 170-174 - [i1]Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin:
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves. IACR Cryptol. ePrint Arch. 2015: 655 (2015) - 2013
- [c3]Mohib Ullah, Arif Iqbal Umar, Noor Ul Amin, Nizamuddin:
An efficient and secure mobile phone voting system. ICDIM 2013: 332-336 - [c2]Hizbullah Khattak, Nizamuddin, Fahad Khurshid, Noor Ul Amin:
Preventing black and gray hole attacks in AODV using optimal path routing and hash. ICNSC 2013: 645-648 - 2012
- [c1]Noor Ul Amin, Muhammad Asad, Nizamuddin, Shehzad Ashraf Chaudhry:
An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem. ICNSC 2012: 118-121
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint