S
Sabah Suhail
Researcher at Kyung Hee University
Publications - 25
Citations - 435
Sabah Suhail is an academic researcher from Kyung Hee University. The author has contributed to research in topics: Computer science & Network packet. The author has an hindex of 9, co-authored 21 publications receiving 225 citations. Previous affiliations of Sabah Suhail include COMSATS Institute of Information Technology.
Papers
More filters
Journal ArticleDOI
Trustworthy Data: A Survey, Taxonomy and future trends of Secure Provenance Schemes
Faheem Zafar,Abid Khan,Sabah Suhail,Idrees Ahmed,Khizar Hameed,Hayat Mohammad Khan,Farhana Jabeen,Adeel Anjum +7 more
TL;DR: The lifecycle of secure provenance is described and how trust is achieved in different domains by its application is highlighted and future trends, which should be focused upon by the research community, are highlighted.
Journal ArticleDOI
Trustworthy Digital Twins in the Industrial Internet of Things with Blockchain
TL;DR: A blockchain-based framework for the Industrial Internet of Things (IIoT) to address the issues of data management and security and leverage Digital Twins that can draw intelligent conclusions from data by identifying the faults and recommending precautionary measures ahead of critical events is envisioned.
Journal ArticleDOI
A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints
TL;DR: This paper proposes a robust and efficient watermarking scheme for relational databases that is able to meet all above-mentioned four challenges and does not require that a database owner defines usability constraints for each type of application and every recipient separately.
Journal ArticleDOI
On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions
TL;DR: In this paper, the authors investigate applications of one of the postquantum signatures called hash-based signature (HBS) schemes for the security of IoT devices in the quantum era, and give a succinct overview of the evolution of HBS schemes with an emphasis on their construction parameters and associated strengths and weaknesses.
Proceedings ArticleDOI
Introducing Secure Provenance in IoT: Requirements and Challenges
TL;DR: The challenges on technical infrastructure of IP-based, WSN-based and RFID-based IoT are discussed and the possible ways to integrate secure provenance into IoT grounded on security issues and other resource constraints in IoT are identified.