Follow
Athar Mahboob
Title
Cited by
Cited by
Year
A SURVEY ON AUTO-CONFIGURATION MECHANISMS FOR MOBILE AD-HOC NETWORKS (MANETS)
S Khalid, A Mahboob
Journal of Engineering & Applied Sciences, 2013
83*2013
Efficient hardware implementations and hardware performance evaluation of SHA-3 finalists
K Latif, MM Rao, A Aziz, A Mahboob
The Third SHA-3 Candidate Conference, 2012
402012
Classification of attacks on wireless sensor networks: A survey
MN Riaz, A Buriro, A Mahboob
International Journal of Wireless and Microwave Technologies 8 (6), 15-39, 2018
332018
SnapAuth: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme
A Buriro, B Crispo, M Eskandri, S Gupta, A Mahboob, R Van Acker
Emerging Technologies for Authorization and Authentication: First …, 2018
282018
Airsign: A gesture-based smartwatch user authentication
A Buriro, R Van Acker, B Crispo, A Mahboob
2018 International Carnahan Conference on Security Technology (ICCST), 1-5, 2018
262018
Intrusion avoidance for SCADA security in industrial plants
A Mahboob, J Zubairi
2010 International Symposium on Collaborative Technologies and Systems, 447-452, 2010
192010
Single-equipment with multiple-application for an automated robot-car control system
S Ullah, Z Mumtaz, S Liu, M Abubaqr, A Mahboob, HA Madni
Sensors 19 (3), 662, 2019
172019
Implementation and comparison of text-based image retrieval schemes
SAJ Zaidi, A Buriro, M Riaz, A Mahboob, MN Riaz
International Journal of Advanced Computer Science and Applications 10 (1 …, 2019
162019
Optimal utilization of available reconfigurable hardware resources
K Latif, A Aziz, A Mahboob
Computers & Electrical Engineering 37 (6), 1043-1057, 2011
152011
A novel EM concentrator with open-concentrator region based on multi-folded transformation optics
HA Madni, K Hussain, WX Jiang, S Liu, A Aziz, S Iqbal, A Mahboob, ...
Scientific reports 8 (1), 9641, 2018
142018
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Information Science Reference, 2011
13*2011
Novel arithmetic architecture for high performance implementation of SHA-3 finalist KECCAK on FPGA platforms
K Latif, MM Rao, A Mahboob, A Aziz
Reconfigurable Computing: Architectures, Tools and Applications: 8th …, 2012
122012
Lookup table based multiplication technique for GF (2m) with cryptographic significance
A Mahboob, N Ikram
IEE Proceedings-Communications 152 (6), 965-974, 2005
112005
Securing SCADA Systems with Open Source Software
A Mahboob, JA Zubairi
High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 2013 …, 2013
102013
Transport Layer Security (TLS)–A Network Security Protocol for E-commerce
A Mahboob, N Ikram
Technocrat PNEC Research Journal, 2004
102004
High throughput hardware implementation of secure hash algorithm (sha-3) finalist: Blake
K Latif, A Mahboob, A Aziz
2011 Frontiers of Information Technology, 189-194, 2011
92011
Application of Cyber Security in Emerging C4ISR Systems
AA Malik, A Mahboob, A Khan, J Zubairi
Crisis Management: Concepts, Methodologies, Tools, and Applications, 1705-1738, 2011
82011
An automated robot-car control system with hand-gestures and mobile application using arduino
S Ullah, Z Mumtaz, S Liu, M Abubaqr, A Mahboob, HA Madni
preprints, 2019
72019
Social success factors affecting implementation of agile software development methodologies in software industry of pakistan: an empirical study
MN Riaz, A Mahboob, A Buriro
International Journal of Advanced Computer Science and Applications 9 (7), 2018
72018
Idhocnet-a novel protocol stack and architecture for ad hoc networks
S Khalid, A Mahboob, F Azim, A Rehman
International Journal of Communication Networks and Information Security 7 …, 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20