Follow
Mehreen Afzal
Mehreen Afzal
Director Security & GRC
Verified email at mcs.edu.pk
Title
Cited by
Cited by
Year
A systematic threat analysis and defense strategies for the metaverse and extended reality systems
S Qamar, Z Anwar, M Afzal
Computers & Security 128, 103127, 2023
552023
Behavioral based insider threat detection using deep learning
R Nasir, M Afzal, R Latif, W Iqbal
IEEE Access 9, 143266-143274, 2021
502021
FBASHI: Fuzzy and blockchain-based adaptive security for healthcare IoTs
Z Zulkifl, F Khan, S Tahir, M Afzal, W Iqbal, A Rehman, S Saeed, ...
IEEE Access 10, 15644-15656, 2022
492022
Algebraic cryptanalysis of a nlfsr based stream cipher
M Afzal, A Masood
2008 3rd International Conference on Information and Communication …, 2008
302008
Comparative analysis of S-boxes based on graphical SAC
I Hussain, T Shah, H Mahmood, M Afzal
International Journal of Computer Applications 2 (5), 5-8, 2010
292010
Correlation power analysis of modes of encryption in AES and its countermeasures
S Fahd, M Afzal, H Abbas, W Iqbal, S Waheed
Future Generation Computer Systems 83, 496-509, 2018
212018
On the security of LBlock against the cube attack and side channel cube attack
S Islam, M Afzal, A Rashdi
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013
182013
Algebraic side channel attack on trivium and grain ciphers
AR Kazmi, M Afzal, MF Amjad, H Abbas, X Yang
IEEE Access 5, 23958-23968, 2017
162017
A compact S-Box design for SMS4 block cipher
I Abbasi, M Afzal
IT Convergence and Services: ITCS & IRoA 2011, 641-658, 2011
152011
The comparative resistance of some recent releases of cotton cultivars to the insect-pest complex.
MA Wahla, M Tufail, M Afzal, MN Tariq
151998
Differential meet-in-the-middle cryptanalysis
C Boura, N David, P Derbez, G Leander, M Naya-Plasencia
Annual International Cryptology Conference, 240-272, 2023
142023
An efficient elliptic curve based signcryption scheme for firewalls
W Iqbal, M Afzal, F Ahmad
2013 2nd National Conference on Information Assurance (NCIA), 67-72, 2013
142013
A novel code attestation scheme against Sybil Attack in Wireless Sensor Networks
I Makhdoom, M Afzal, I Rashid
2014 National Software Engineering Conference, 1-6, 2014
132014
Comparative analysis of the structures of eSTREAM submitted stream ciphers
M Afzal, F Kausar, A Masood
2006 International Conference on Emerging Technologies, 245-250, 2006
112006
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages
AR Raza, K Mahmood, MF Amjad, H Abbas, M Afzal
Future Generation Computer Systems 104, 43-59, 2020
92020
Combining algebraic and side channel attacks on stream ciphers
AR Kazmi, M Afzal, MF Amjad, A Rashdi
2017 International Conference on Communication Technologies (ComTech), 138-142, 2017
92017
Resistance of stream ciphers to algebraic recovery of internal secret states
M Afzal, A Masood
2008 Third International Conference on Convergence and Hybrid Information …, 2008
82008
Improved results on algebraic cryptanalysis of A5/2
M Afzal, A Masood, N Shehzad
Global E-Security: 4th International Conference, ICGeS 2008, London, UK …, 2008
82008
Kleptographic attack on elliptic curve based cryptographic protocols
A Sajjad, M Afzal, MMW Iqbal, H Abbas, R Latif, RA Raza
IEEE Access 8, 139903-139917, 2020
72020
Experimental results on algebraic analysis of trivium and tweaked trivium
M Afzal, A Masood
Global E-Security: 4th International Conference, ICGeS 2008, London, UK …, 2008
62008
The system can't perform the operation now. Try again later.
Articles 1–20