Arshad Khan

ORCID: 0000-0002-3516-3489
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Advanced Malware Detection Techniques
  • Privacy, Security, and Data Protection
  • IoT and Edge/Fog Computing
  • Wireless Communication Networks Research
  • Multimedia Communication and Technology
  • Wireless Networks and Protocols
  • Neural Networks and Applications
  • Dermatoglyphics and Human Traits
  • Scientific Computing and Data Management
  • Teacher Education and Leadership Studies
  • Cryptography and Data Security
  • Internet of Things and AI
  • Cybersecurity and Information Systems
  • Digital Mental Health Interventions
  • User Authentication and Security Systems
  • Organizational Leadership and Management Strategies
  • Biometric Identification and Security
  • Cryptographic Implementations and Security
  • Education and Islamic Studies
  • Chaos-based Image/Signal Encryption
  • Mobile Learning in Education
  • Information and Cyber Security

Auckland University of Technology
2019-2021

Qurtuba University of Science and Information Technology
2017-2020

The study presents a blockchain-based incentive mechanism intended to encourage those in underserved communities engage with healthcare services. smart system, which is the result of amalgamation advanced technologies, has emerged recently and increasingly seen as essential meet needs modern society. An important part system prescription management but studies show that affordability accessibility play creating unequal access for communities. This form results living become disengaged from...

10.3390/s21155035 article EN cc-by Sensors 2021-07-25

This study is conducted in order to analyze the perception of students on use mobile learning 3G/4G higher education.Data has been collected through survey data, this comprises research questions based previous literature review and formulated hypotheses check tentative statements.Furthermore, data analysis using Kmean algorithm.Additionally, explore methodological gap K-Mean clustering algorithm.The sample consisted 200 department computer science at Gomal Qurtuba universities Dere Ismail Khan.

10.21833/ijaas.2017.02.003 article EN International Journal of ADVANCED AND APPLIED SCIENCES 2017-01-16

For any PPT adversary, most traditional leakage-resilient cryptographic primitives cannot ensure that all elements in ciphertext are random. What's worse, a continuous leakage setting, there few available. Currently, not many researchers studying hybrid encryption (LR-HE) scheme. Thus, two (CLR-HE) schemes constructed this paper, and the schemes' security proven based on standard static assumption. Our constructions only can maintain their claimed but also enjoy better performances. Because...

10.1080/02533839.2018.1547663 article EN Journal of the Chinese Institute of Engineers 2019-01-02

Network security attacks are the major and very common problem being faced by researchers as well network users. Different solution techniques tools technologies have been developed tested for complete provision of tight data over but still hundred percent securities is not assured any tool or technology. SIEM latest monitoring evaluation which alarm based helps in figuring out threats network. This study on performance within a order to evaluate its efficiency frequency types it can handle....

10.1109/comtech.2017.8065753 article EN 2017-04-01

10.3217/jucs-025-03-0270 article EN DOAJ (DOAJ: Directory of Open Access Journals) 2019-03-01

Authentication in personal identication using palm print method provides valuable evidence one's identication. It has been investigated over years by different methods employed both high resolution images which are further processed computerized techniques and software systems low have attracted many researchers attention. This paper proposes a brief introduction about prints its the current classication system is less time consuming followed for research to be carried out biometric...

10.36106/7905190 article EN Global Journal For Research Analysis 2021-03-15
Coming Soon ...