scispace - formally typeset
A

Anwar Ghani

Researcher at International Islamic University, Islamabad

Publications -  62
Citations -  842

Anwar Ghani is an academic researcher from International Islamic University, Islamabad. The author has contributed to research in topics: Computer science & Authentication protocol. The author has an hindex of 10, co-authored 52 publications receiving 473 citations.

Papers
More filters
Journal ArticleDOI

Fisher score and Matthews correlation coefficient-based feature subset selection for heart disease diagnosis using support vector machines

TL;DR: A clinical heart disease diagnostic system is presented by proposing feature subset selection methodology with an object of achieving improved performance and the proposed methodology is validated through accuracy, specificity and sensitivity using four UCI datasets.
Journal ArticleDOI

Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key

TL;DR: An enhanced symmetric key‐based authentication protocol for IoT‐based WSN has been presented that has the ability to counter user traceability, stolen verifier, and DoS attacks and has the same communication cost as the baseline protocol.
Journal ArticleDOI

A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card

TL;DR: The server can now authenticate the user on the request message received, rather than the response received upon sending the challenge message, saving another round-trip of exchanged messages and hence escapes a possible denial of service attack.
Journal ArticleDOI

A robust authentication and access control protocol for securing wireless healthcare sensor networks

TL;DR: An improved scheme to mitigate the weaknesses of Challah et al. and Liu-Chang schemes is proposed in this paper, using the elliptic curve cryptography and bilinear paring and demonstrating that the proposed scheme is secure against well-known attacks.
Journal ArticleDOI

Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography

TL;DR: This article presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks and outperforms the competing protocols in terms of security.