Wilayat Khan
Wilayat Khan
Nanyang Technological University (NTU), Singapore
Email verificata su kth.se
TitoloCitata daAnno
Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography
W Khan, H Ullah
International Journal of Computer Science Issues (IJCSI) 7 (3), 10, 2010
Density independent hydrodynamics model for crowd coherency detection
H Ullah, M Uzair, M Ullah, A Khan, A Ahmad, W Khan
Neurocomputing 242, 28-39, 2017
Provably Sound Browser-Based Enforcement of Web Session Integrity
Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro ...
2014 IEEE 27th Computer Security Foundations Symposium, 366-380, 2014
Scientific Reasoning: A Solution to the Problem of Induction
W Khan, H Ullah
International Journal of Basic & Applied Sciences 10 (3), 58-62, 2010
Automatic and robust client-side protection for cookie-based sessions
M Bugliesi, S Calzavara, R Focardi, W Khan
International Symposium on Engineering Secure Software and Systems, 161-178, 2014
CookiExt: patching the browser against session hijacking attacks
WK M. Bugliesi, S. Calzavara, R. Focardi
Journal of Computer Security, 2015
Energy-Efficient Mutual Authentication Protocol for Handhled Devices Based on Public Key Cryptography
W Khan, H Ullah, R Hussain
International Journal of Computer Theory and Engineering 5 (5), 754, 2013
Client side web session integrity as a non-interference property
W Khan, S Calzavara, M Bugliesi, W De Groef, F Piessens
International Conference on Information Systems Security, 89-108, 2014
CrashSafe: a formal model for proving crash-safety of Android applications
W Khan, H Ullah, A Ahmad, K Sultan, AJ Alzahrani, SD Khan, M Alhumaid, ...
Human-centric Computing and Information Sciences 8 (1), 21, 2018
Precision Modeling: Application of Metaheuristics on Current–Voltage Curves of Superconducting Films
S Naqvi, T Akram, S Haider, M Kamran, A Shahzad, W Khan, T Iqbal, ...
Electronics 7 (8), 138, 2018
Client side web session integrity as a non-interference property: Extended version with proofs
W Khan, S Calzavara, M Bugliesi, W De Groef, F Piessens
CW Reports, 2014
Adaptive Security for Self-Protection of Mobile Computing Devices
A Aakash, M Asad, Waqar, A Abdulrahman, K Wilayat, S Maryam
Mobile Networks and Applications, 1-20, 2019
A Non-Destructive Depth Detection Approach for Substation Grounding Grids Based onMagnetostatics
Q Amir, K Wilayat, N Syed, O Farooq, Alam
Electronics Letters, 0, 2019
Formal Verification of Digital Circuits Using Simulator with Mathematical Foundation
K Wilayat, A Basim, S Noman, K Abdul, Moeed, S Ahtisham
Applied Mechanics and Materials 892, 134-142, 2019
Formal Analysis of Language-Based Android Security Using Theorem Proving Approach
W Khan, M Kamran, A Ahmad, FA Khan, A Derhab
IEEE Access 7, 16550-16560, 2019
Learning Outcomes and Assessment Methodology: Case study of an Undergraduate Engineering Project
N Syed, Rameez, A Tallha, H Sajjad, Ali, K Wilayat, K Muhammad, ...
International Journal of Electrical Engineering Education, 2018
Hybrid Cross-Platform Application Framework for Mobile Devices
W Khan, M Uzair, M Altaf, T Akram, SR Naqvi
Transylvanian Review 1 (12), 2018
Design of Hardware Mixing Model for ICA Algorithms Using Wireless MIMO System
Z Uddin, F Alam, M Altaf, M Uzair, W Khan
Transylvanian Review 1 (8), 2017
VeriFormal: An Executable Formal Model of a Hardware Description Language
K Wilayat, T Alwen, S David
Singapore Cyber Security R&D Conference, 2017
Web session security: formal verification, client-side enforcement and experimental analysis
W Khan
Università Ca'Foscari Venezia, 2015
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20