Abdul Ghafoor Abbasi
Abdul Ghafoor Abbasi
Verified email at ri.se - Homepage
Cited by
Cited by
Cloud based secure and privacy enhanced authentication & authorization protocol
U Khalid, A Ghafoor, M Irum, MA Shibli
Procedia Computer Science 22, 680-688, 2013
Towards a secure service provisioning framework in a smart city environment
Z Khan, Z Pervez, AG Abbasi
Future Generation Computer Systems 77, 112-135, 2017
Towards cloud based smart cities data security and privacy management
Z Khan, Z Pervez, A Ghafoor
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014
SAGE: Next generation multi-agent system
A Ghafoor, M ur Rehman, ZA Khan, HF Ahmad, A Ali
PDPTA 4, 139-145, 2004
Security analysis of VoIP architecture for identifying SIP vulnerabilities
UU Rehman, AG Abbasi
2014 International Conference on Emerging Technologies (ICET), 87-93, 2014
Assessment criteria for trust models in cloud computing
A Kanwal, R Masood, UE Ghazia, MA Shibli, AG Abbasi
2013 IEEE International Conference on Green Computing and Communications and …, 2013
Security aspects of virtualization in cloud computing
M Kazim, R Masood, MA Shibli, AG Abbasi
IFIP International Conference on Computer Information Systems and Industrial …, 2013
Analysis of BYOD security frameworks
S Ali, MN Qureshi, AG Abbasi
2015 Conference on Information Assurance and Cyber Security (CIACS), 56-61, 2015
Veidblock: Verifiable identity using blockchain and ledger in a software defined network
AG Abbasi, Z Khan
Companion Proceedings of the10th International Conference on Utility and …, 2017
CryptoNET: software protection and secure execution environment
A Ghafoor, S Muftic
Int. J. Computer Science and Network Security 10 (2), 19-26, 2010
CryptoNET: Design and implementation of the secure email system
A Ghafoor, S Muftic, G Schmölzer
2009 Proceedings of the 1st International Workshop on Security and …, 2009
Improved line-of-sight/non-line-of-sight classification methods for pulsed ultrawideband localisation
A Abbasi, H Liu
IET Communications 8 (5), 680-688, 2014
Towards Attribute‐Centric Access Control: an ABAC versus RBAC argument
A Fatima, Y Ghazi, MA Shibli, AG Abassi
Security and Communication Networks 9 (16), 3152-3166, 2016
A secure architecture for inter-cloud virtual machine migration
T Zeb, A Ghafoor, A Shibli, M Yousaf
International Conference on Security and Privacy in Communication Networks …, 2014
DISMI-an intent interface for application-centric transport network services
P Sköldström, S Junique, A Ghafoor, A Marsico, D Siracusa
2017 19th International Conference on Transparent Optical Networks (ICTON), 1-4, 2017
Assessment criteria for cloud identity management systems
U Habiba, AG Abassi, R Masood, MA Shibli
2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing …, 2013
Web Contents Protection, Secure Execution and Authorized Distribution
AG Abbasi, S Muftic, I Hotamov
2010 Fifth International Multi-conference on Computing in the Global …, 2010
Adaptive transport protocols in multi agent system
A Mehmood, A Ghafoor, HF Ahmed, Z Iqbal
Fifth International Conference on Information Technology: New Generations …, 2008
Smart phone based authentication and authorization protocol for SPACS
FK Bhutta, A Ghafoor, S Sultan
High Capacity Optical Networks and Emerging/Enabling Technologies, 127-131, 2012
CryptoNET: Generic Security Framework for Cloud Computing Environments
AG Abbasi
KTH Royal Institute of Technology, 2011
The system can't perform the operation now. Try again later.
Articles 1–20