Khalid Mahmood, Imran Hameed, Khalid Rashid and Amir Qayyum
Journal of Applied Sciences, 2003, 3(5), 346-359.
Research on mobile ad hoc networks has been focused primarily on routing protocols, whereas security issues remained mostly unexplored. This paper focuses on security mechanisms and notably on the key management mechanisms. Our authentication protocol is inspired from Resurrecting Duckling policy with a novel diversity. We present a reliable solution for securing bank transactions. In our approach devices exchange a limited amount of public information over location-constrained channel, which will later allow them to complete key exchange over wireless link. After the exchange of public keys, our banking transactions will be secure. This approach does not require any public key infrastructure as is required in MANET. Moreover our approach is secure against passive attacks on location-limited channel and all kinds of wireless attacks on wireless link.
ASCI-ID: 35-531
Journal of Applied Sciences, 2002, 2(5), 553-557.
An Authentication Protocol for Multicast CommunicationsJournal of Applied Sciences, 2002, 2(12), 1082-1083.
Cryptanalysis of an Authentication Key Exchange ProtocolJournal of Applied Sciences, 2005, 5(2), 281-283.
An Accurate Method to Obtain Bio-Metric Measurements for Three Dimensional SkullJournal of Applied Sciences, 2010, 10(2), 145-150.
Implementing Secure RSA Cryptosystems Using Your Own Cryptographic JCE ProviderJournal of Applied Sciences, 2006, 6(3), 482-510.
Improvement of Fixing Problems in Lin et al.s OSPA ProtocolJournal of Applied Sciences, 2006, 6(3), 639-643.
Analysis and Enhancement of Authentication Algorithms in Mobile NetworksJournal of Applied Sciences, 2006, 6(4), 872-877.
Security of the Cryptographic Protocols Based on Discrete Logarithm ProblemJournal of Applied Sciences, 2005, 5(9), 1692-1712.
An Elliptic Curve-Based Signcryption Scheme with Forward SecrecyJournal of Applied Sciences, 2009, 9(6), 1025-1035.
Research on Charging Technology of Mobile Self-organizing InternetJournal of Applied Sciences, 2013, 13(17), 3599-3603.
MANET-internet Integration ArchitectureJournal of Applied Sciences, 2017, 17(6), 264-281.
On Remote Attestation Based on Trusted Cloud ComputingJournal of Applied Sciences, 2013, 13(22), 5092-5098.