Firdous Kausar
Title
Cited by
Cited by
Year
An efficient key distribution scheme for heterogeneous sensor networks
S Hussain, F Kausar, A Masood
Proceedings of the 2007 international conference on Wireless communications …, 2007
732007
Digital watermarking for images security using discrete slantlet transform
M Mundher, D Muhamad, A Rehman, T Saba, F Kausar
Applied Mathematics & Information Sciences 8 (6), 2823, 2014
712014
Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol
Z Bilal, A Masood, F Kausar
2009 International Conference on Network-Based Information Systems, 260-267, 2009
562009
Scalable and efficient key management for heterogeneous sensor networks
F Kausar, S Hussain, LT Yang, A Masood
The Journal of Supercomputing 45 (1), 44-65, 2008
562008
Secure group communication with self-healing and rekeying in wireless sensor networks
F Kausar, S Hussain, JH Park, A Masood
International Conference on Mobile Ad-Hoc and Sensor Networks, 737-748, 2007
542007
A cluster-based key agreement scheme using keyed hashing for Body Area Networks
A Ali, S Irum, F Kausar, FA Khan
Multimedia tools and applications 66 (2), 201-214, 2013
342013
A secure ECC-based RFID mutual authentication protocol for internet of things
AA Alamr, F Kausar, J Kim, C Seo
The Journal of Supercomputing 74 (9), 4281-4294, 2018
302018
Intelligent home monitoring using RSSI in wireless sensor networks
F Kausar, E Al Eisa, I Bakhsh
International Journal of Computer Networks & Communications 4 (6), 33, 2012
302012
Hybrid client side phishing websites detection approach
F Kausar, B Al-Otaibi, A Al-Qadi, N Al-Dossari
International Journal of Advanced Computer Science and Applications (IJACSA …, 2014
192014
An authenticated key management scheme for hierarchical wireless sensor networks
F Kausar, A Masood, S Hussain
Advances in Communication Systems and Electrical Engineering, 85-98, 2008
172008
Key management and secure routing in heterogeneous sensor networks
F Kausar, MQ Saeed, A Masood
2008 IEEE International Conference on Wireless and Mobile Computing …, 2008
162008
Mobile Ad-Hoc and Sensor Networks: Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings
H Zhang, S Olariu, J Cao, DB Johnson
Springer, 2007
162007
Snapchat analysis to discover digital forensic artifacts on android smartphone
T Alyahya, F Kausar
Procedia Computer Science 109, 1035-1040, 2017
132017
Analysis of download accelerator plus (dap) for forensic artefacts
M Yasin, MA Wahla, F Kausar
2009 Fifth International Conference on IT Security Incident Management and …, 2009
132009
Analysis of Internet Download Manager for collection of digital forensic artefacts
M Yasin, AR Cheema, F Kausar
Digital Investigation 7 (1-2), 90-94, 2010
122010
Comparative Analysis of the Structures of eSTREAM Submitted Stream Ciphers
M Afzal, F Kausar, A Masood
2006 International Conference on Emerging Technologies, 245-250, 2006
82006
A granular approach for user-centric network analysis to identify digital evidence
M Yasin, JA Qureshi, F Kausar, J Kim, J Seo
Peer-to-Peer Networking and Applications 8 (5), 911-924, 2015
72015
A random key distribution scheme for securing wireless sensor network
F Kausar, A Masood
2006 IEEE International Multitopic Conference, 32-36, 2006
72006
New research directions in the area of smart phone forensic analysis
F Kausar
International Journal of Computer Networks & Communications 6 (4), 99, 2014
52014
An efficient multi recipient signcryption scheme offering non repudiation
F Ahmed, A Masood, F Kausar
2010 10th IEEE International Conference on Computer and Information …, 2010
52010
The system can't perform the operation now. Try again later.
Articles 1–20