scispace - formally typeset
S

Sabah Suhail

Researcher at Kyung Hee University

Publications -  25
Citations -  435

Sabah Suhail is an academic researcher from Kyung Hee University. The author has contributed to research in topics: Computer science & Network packet. The author has an hindex of 9, co-authored 21 publications receiving 225 citations. Previous affiliations of Sabah Suhail include COMSATS Institute of Information Technology.

Papers
More filters
Journal ArticleDOI

Trustworthy Data: A Survey, Taxonomy and future trends of Secure Provenance Schemes

TL;DR: The lifecycle of secure provenance is described and how trust is achieved in different domains by its application is highlighted and future trends, which should be focused upon by the research community, are highlighted.
Journal ArticleDOI

Trustworthy Digital Twins in the Industrial Internet of Things with Blockchain

TL;DR: A blockchain-based framework for the Industrial Internet of Things (IIoT) to address the issues of data management and security and leverage Digital Twins that can draw intelligent conclusions from data by identifying the faults and recommending precautionary measures ahead of critical events is envisioned.
Journal ArticleDOI

A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints

TL;DR: This paper proposes a robust and efficient watermarking scheme for relational databases that is able to meet all above-mentioned four challenges and does not require that a database owner defines usability constraints for each type of application and every recipient separately.
Journal ArticleDOI

On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions

TL;DR: In this paper, the authors investigate applications of one of the postquantum signatures called hash-based signature (HBS) schemes for the security of IoT devices in the quantum era, and give a succinct overview of the evolution of HBS schemes with an emphasis on their construction parameters and associated strengths and weaknesses.
Proceedings ArticleDOI

Introducing Secure Provenance in IoT: Requirements and Challenges

TL;DR: The challenges on technical infrastructure of IP-based, WSN-based and RFID-based IoT are discussed and the possible ways to integrate secure provenance into IoT grounded on security issues and other resource constraints in IoT are identified.