Follow
Dr. Shish Ahmad
Title
Cited by
Cited by
Year
Energy Saving Secure Framework for Sensor Network using Elliptic Curve Cryptography
S Ahmad, MR Beg, QamarAbbas
IJCA Special Issue of Mobile Ad-hoc Networks, 167-172, 2012
63*2012
An Exhaustive Review on Security Issues in Cloud Computing.
S Fatima, S Ahmad
KSII Transactions on Internet & Information Systems 13 (6), 2019
272019
Comparative study between stream cipher and block cipher using RC4 and Hill Cipher
S Ahmad, MR Beg, Q Abbas, J Ahmad, S Atif
International Journal of Computer Applications 1 (25), 0975-8887, 2010
132010
A Comparative Study of Trends in Security in Cloud Computing
AM Khan, S Ahmad, M Haroon
Communication Systems and Network Technologies (CSNT), 2015 Fifth …, 2015
112015
Energy efficient sensor network security using Stream cipher mode of operation
S Ahmad, MR Beg, Q Abbas
IEEE Computer and Communication Technology (ICCCT), 2010 International …, 2010
112010
Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing
S Fatima, S Ahmad
International Journal of e-Collaboration (IJeC) 16 (1), 1-15, 2020
102020
Quantum Key Distribution Approach for Secure Authentication of Cloud Servers
S Fatima, S Ahmad
International Journal of Cloud Applications and Computing (IJCAC) 11 (3), 19-32, 2021
92021
Security Issues in Vehicular Ad Hoc Network: A Critical Survey
M Arif, S Ahmad
Intelligent Communication, Control and Devices, 527-536, 2018
82018
Meet In The Middle Attack: A Cryptanalysis Approach
S Ahmad, MR Beg, J Ahmad, N Barua
International Journal of Computer Applications 1 (25), 1-7, 2010
8*2010
Energy Saving Secure Framework for Sensor Network Using Elliptic Curve Cryptography
S Ahmad, BM Rizwan, Q Abbas
IJCA Special Issue on “Mobile Ad-Hoc Networks, 167-172, 2010
72010
Certificate Based Security Services in Adhoc Sensor Network
S Fatima, S Ahmad, PM Khan
BIJIT - BVICAM’s International Journal of Information Technology 6 (2), 2014
62014
SECURITY ISSUES IN CLOUD COMPUTING: A SURVEY
S Fatima, S Ahmad, S Siddiqui
International Journal of Advanced Research in Computer Science 9 (Special …, 2018
52018
Energy Efficient Image Compression Techniques in WSN
N Bano, M Alam, S Ahmad
Intelligent Communication, Control and Devices, 1079-1088, 2018
52018
X. 509 and PGP Public Key Infrastructure methods: A critical
S Fatima, MS Ahmad, S Siddiqui
IJRIT International Journal of Research in Information Technology 2 (5), 68-74, 2014
5*2014
Fault tolerance management for cloud environment: a critical review
AA Shaikh, S Ahmad
International Journal of Advanced Research in Computer Science 9, 34, 2018
42018
Evaluation of security risk associated with different network layers
A Ali, MR Beg, S Ahmad, A Ali
International Journal of Scientific & Engineering Research 3 (8), 2012
32012
Bio-Computing Based Algorithms for Cloud Security: A Critical Review
A Srivastava, S Ahmad
2022 IEEE World Conference on Applied Intelligence and Computing (AIC), 894-900, 2022
22022
Energy Optimization in Cloud Computing: A Review
AK Pandey, S Ahmad
International Journal of Computer Sciences and Engineering 7, 249-256, 2019
22019
A comprehensive study on evolution, present scenario and future prospects of retailing
A Pandey, DA Kaur
International Journal of Current Research in Life Sciences 7 (02), 1158-1162, 2018
22018
Anomaly Detection in Wireless Sensor Networks-Critical Survey
MS Yadav, S Ahamad
22018
The system can't perform the operation now. Try again later.
Articles 1–20