default search action
Abdul Ghafoor Abbasi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c22]Abdul Ghafoor Abbasi, Anna Rydberg, Peter Altmann:
Towards a verifiable and secure data sharing platform for livestock supply chain. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-6 - 2020
- [j2]Zaheer Abbas Khan, Abdul Ghafoor Abbasi, Zeeshan Pervez:
Blockchain and edge computing-based architecture for participatory smart city applications. Concurr. Comput. Pract. Exp. 32(12) (2020) - [c21]Peter Altmann, Abdul Ghafoor Abbasi, Olov Schelén, Karl Andersson, Morteza Alizadeh:
Creating a Traceable Product Story in Manufacturing Supply Chains Using IPFS. NCA 2020: 1-8
2010 – 2019
- 2019
- [c20]Abdul Ghafoor Abbasi, A. Qudus Abbasi, Zaheer Khan:
Towards Trusted Security Context Exchange Protocol for SDN Based Low Latency Networks. SAFECOMP 2019: 286-298 - 2017
- [j1]Zaheer Abbas Khan, Zeeshan Pervez, Abdul Ghafoor Abbasi:
Towards a secure service provisioning framework in a Smart city environment. Future Gener. Comput. Syst. 77: 112-135 (2017) - [c19]Abdul Ghafoor Abbasi, Zaheer Abbas Khan:
VeidBlock: Verifiable Identity using Blockchain and Ledger in a Software Defined Network. UCC (Companion") 2017: 173-179 - 2015
- [c18]W. Noor-ul-Ain, Muhammad Atta-ur-Rahman, Muhammad Nadeem, Abdul Ghafoor Abbasi:
Quantum Cryptography Trends: A Milestone in Information Security. HIS 2015: 25-39 - [c17]Ubaid Ur Rehman, Abdul Ghafoor Abbasi:
Secure Layered Architecture for Session Initiation Protocol Based on SIPSSO: Formally Proved by Scyther. ITNG 2015: 185-190 - 2014
- [c16]Muhammad Awais Shibli, Naveed Ahmad, Ayesha Kanwal, Abdul Ghafoor Abbasi:
Secure Virtual Machine Migration (SV2M) in Cloud Federation. SECRYPT 2014: 344-349 - [c15]Shizra Sultan, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Ali Nasir:
Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA. SECRYPT 2014: 387-392 - [c14]Tayyaba Zeb, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Yousaf:
A Secure Architecture for Inter-cloud Virtual Machine Migration. SecureComm (1) 2014: 24-35 - [c13]Zaheer Abbas Khan, Zeeshan Pervez, Abdul Ghafoor Abbasi:
Towards Cloud Based Smart Cities Data Security and Privacy Management. UCC 2014: 806-811 - 2013
- [c12]Syeda Madiha Qamar, Khawaja Fahad Iqbal, Ahmed Hussain Qureshi, Muhammad Naveed, Yasar Ayaz, Abdul Ghafoor Abbasi:
A solution to Perceptual Aliasing through Probabilistic Fuzzy Logic and SIFT. AIM 2013: 1393-1398 - [c11]Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli, Abdul Ghafoor Abbasi:
Security Aspects of Virtualization in Cloud Computing. CISIM 2013: 229-240 - [c10]Ayesha Kanwal, Rahat Masood, Um-e-Ghazia, Muhammad Awais Shibli, Abdul Ghafoor Abbasi:
Assessment Criteria for Trust Models in Cloud Computing. GreenCom/iThings/CPScom 2013: 254-261 - [c9]Amna Joyia, Abdul Ghafoor Abbasi, Maryam Sajjad, Muhammad Qaisar Choudhary:
Secure and privacy enhanced email system as a cloud service. ICDIM 2013: 73-78 - [c8]Umer Khalid, Abdul Ghafoor Abbasi, Misbah Irum, Muhammad Awais Shibli:
Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol. KES 2013: 680-688 - [c7]Umme Habiba, Abdul Ghafoor Abbasi, Rahat Masood, Muhammad Awais Shibli:
Assessment Criteria for Cloud Identity Management Systems. PRDC 2013: 188-195 - 2011
- [b1]Abdul Ghafoor Abbasi:
CryptoNET : Generic Security Framework for Cloud Computing Environments. Royal Institute of Technology, Stockholm, Sweden, 2011 - [c6]Abdul Ghafoor Abbasi, Sead Muftic, Shahzad Mumtaz:
Security extensions of Windows environment based on FIPS 201 (PIV) smart card. WorldCIS 2011: 86-92
2000 – 2009
- 2009
- [c5]Abdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer:
CryptoNET: Secure federation protocol and authorization policies for SMI. CRiSIS 2009: 19-25 - [c4]Abdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer:
A model and design of a security provider for Java applications. ICITST 2009: 1-7 - 2006
- [c3]Abdul Ghafoor Abbasi, Arshad Ali, Hafiz Farooq Ahmad, Iftikhar Azim Niaz:
Interoperability: IEEEE FIPA Compliant MAS with Web Services Resource Framework. iiWAS 2006: 239-248 - 2004
- [c2]Abdul Ghafoor Abbasi, Bilal Mustafa, Hafiz Farooq Ahmad, Arshad Ali, Hiroki Suguri, Zaheer Abbas Khan:
Autonomous Cache-Provision Agreement for Scalability of Directory in MAS. ECAI 2004: 1145-1146 - [c1]Abdul Ghafoor Abbasi, Mujahid ur Rehman, Zaheer Abbas Khan, Arshad Ali, Hafiz Farooq Ahmad, Hiroki Suguri:
SAGE: Next Generation Multi-Agent System. PDPTA 2004: 139-145
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-25 19:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint