Dr Wilayat Khan
Dr Wilayat Khan
COMSATS University Islamabad-Wah Campus
Подтвержден адрес электронной почты в домене kth.se
Density independent hydrodynamics model for crowd coherency detection
H Ullah, M Uzair, M Ullah, A Khan, A Ahmad, W Khan
Neurocomputing 242, 28-39, 2017
Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography
W Khan, H Ullah
International Journal of Computer Science Issues (IJCSI) 7 (3), 10, 2010
Scientific Reasoning: A Solution to the Problem of Induction
W Khan, H Ullah
International Journal of Basic & Applied Sciences 10 (3), 58-62, 2010
CookiExt: patching the browser against session hijacking attacks
WK M. Bugliesi, S. Calzavara, R. Focardi
Journal of Computer Security, 2015
Automatic and robust client-side protection for cookie-based sessions
M Bugliesi, S Calzavara, R Focardi, W Khan
International Symposium on Engineering Secure Software and Systems, 161-178, 2014
Provably Sound Browser-Based Enforcement of Web Session Integrity
Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro ...
2014 IEEE 27th Computer Security Foundations Symposium, 366-380, 2014
Energy-Efficient Mutual Authentication Protocol for Handhled Devices Based on Public Key Cryptography
W Khan, H Ullah, R Hussain
International Journal of Computer Theory and Engineering 5 (5), 754, 2013
Learning Outcomes and Assessment Methodology: Case study of an Undergraduate Engineering Project
N Syed, Rameez, A Tallha, H Sajjad, Ali, K Wilayat, K Muhammad, ...
International Journal of Electrical Engineering Education, 2018
CrashSafe: a formal model for proving crash-safety of Android applications
W Khan, H Ullah, A Ahmad, K Sultan, AJ Alzahrani, SD Khan, M Alhumaid, ...
Human-centric Computing and Information Sciences 8 (1), 21, 2018
Client side web session integrity as a non-interference property
W Khan, S Calzavara, M Bugliesi, W De Groef, F Piessens
International Conference on Information Systems Security, 89-108, 2014
Adaptive Security for Self-Protection of Mobile Computing Devices
A Aakash, M Asad, Waqar, A Abdulrahman, K Wilayat, S Maryam
Mobile Networks and Applications, 1-20, 2019
Formal Verification of Digital Circuits Using Simulator with Mathematical Foundation
K Wilayat, A Basim, S Noman, K Abdul, Moeed, S Ahtisham
Applied Mechanics and Materials 892, 134-142, 2019
Formal analysis of language-based android security using theorem proving approach
W Khan, M Kamran, A Ahmad, FA Khan, A Derhab
IEEE Access 7, 16550-16560, 2019
Precision Modeling: Application of Metaheuristics on Current–Voltage Curves of Superconducting Films
SR Naqvi, T Akram, SA Haider, M Kamran, A Shahzad, W Khan, T Iqbal, ...
Electronics 7 (8), 138, 2018
On embedding a hardware description language in Isabelle/HOL
W Khan, D Sanan, Z Hou, L Yang
Design Automation for Embedded Systems 23 (3-4), 123-151, 2019
A Non-Destructive Depth Detection Approach for Substation Grounding Grids Based onMagnetostatics
Q Amir, K Wilayat, N Syed, O Farooq, Alam
Electronics Letters, 0, 2019
Design of hardware mixing model for ICA algorithms using wireless MIMO system
Z Uddin, F Alam, M Altaf, M Uzair, W Khan
Transylvanian Review 1 (8), 2017
Web session security: formal verification, client-side enforcement and experimental analysis
W Khan
Università Ca'Foscari Venezia, 2015
Client side web session integrity as a non-interference property: Extended version with proofs
W Khan, S Calzavara, M Bugliesi, W De Groef, F Piessens
CW Reports, 2014
Formal Verification of Hardware Components in Critical Systems
W Khan, K Muhammad, N Syed, Rameez, K Farrukh, Aslam, SA Ahmed, ...
Wireless Communications and Mobile Computing 2020, 2020
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20