Change search
Refine search result
1 - 6 of 6
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Farash, Mohammad Sabzinejad
    et al.
    Kharazmi Univ., IRN.
    Nawaz, Omer
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Mahmood, Khalid
    nt Islamic Univ., PAK.
    Chaudhry, Shehzad Ashraf
    Kharazmi Univ., IRN.
    Khan, Muhammad Khurram
    King Saud Univ., SAU.
    A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments2016In: Journal of medical systems, ISSN 0148-5598, E-ISSN 1573-689X, Vol. 40, no 7, article id 165Article in journal (Refereed)
    Abstract [en]

    To enhance the quality of healthcare in the management of chronic disease, telecare medical information systems have increasingly been used. Very recently, Zhang and Qi (J. Med. Syst. 38(5):47, 32), and Zhao (J. Med. Syst. 38(5):46, 33) separately proposed two authentication schemes for telecare medical information systems using radio frequency identification (RFID) technology. They claimed that their protocols achieve all security requirements including forward secrecy. However, this paper demonstrates that both Zhang and Qi’s scheme, and Zhao’s scheme could not provide forward secrecy. To augment the security, we propose an efficient RFID authentication scheme using elliptic curves for healthcare environments. The proposed RFID scheme is secure under common random oracle model.

  • 2.
    Irshad, Azeem
    et al.
    Int. Islamic Univ., PAK.
    Sher, Muhammad
    Int. Islamic Univ., PAK.
    Nawaz, Omer
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Chaudhry, Shehzad Ashraf
    Int. Islamic Univ., PAK.
    Khan, Imran
    Int. Islamic Univ., PAK.
    Kumari, Saru
    Chaudhary Charan Singh Univ, IND.
    A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme2017In: Multimedia tools and applications, ISSN 1380-7501, E-ISSN 1573-7721, Vol. 76, no 15, p. 16463-16489Article in journal (Refereed)
    Abstract [en]

    The security for Telecare Medicine Information Systems (TMIS) has been crucial for reliable dispensing of the medical services to patients at distant locations. Security and privacy element needs to be there for any physician or caregiver to make certain an appropriate diagnosis, medical treatment or any other exchange of critical information. In this connection, many relevant TMIS-based authentication schemes have been presented, however various forms of attacks and inefficiencies render these schemes inapplicable for a practical scenario. Lately, Amin et al. proposed a scheme based on a multi-server authentication for TMIS. However, the Amin et al., scheme has been found vulnerable to user and server impersonation attacks. We have proposed an improved model with higher performance and efficiency, as evident from the forthcoming sections. Besides, the scheme has been backed up by formal security analysis using BAN logic to ensure the resilience of the proposed scheme.

  • 3.
    Minhas, Tahir Nawaz
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Nawaz, Omer
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Fiedler, Markus
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Khatibi, Siamak
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    The Effects of Additional Factors on Subjective Quality Assessments2019In: 2nd International Conference on Advancements in Computational Sciences, ICACS 2019, Institute of Electrical and Electronics Engineers Inc. , 2019, p. 120-124, article id 8689138Conference paper (Refereed)
    Abstract [en]

    In Quality of Experience, the users' degrees of delight or annoyance are quantized by direct human interaction via subjective quality assessments. There are many factors that may influence the users' responses, and standards have been laid down to strictly control the monitoring conditions. In this paper, we analyze limitations of Mean Opinion Score (MOS) assessment to portray the influence of additional factors on user behavior while assessing multimedia content. We show that the frequency of watching online video content as well as the user delight with the content play a significant role in her final feedback. Our study emphasizes the need to use additional metrics along with MOS for content ratings to obtain a more accurate measure of the user experience. © 2019 The University of Lahore.

  • 4.
    Nawaz, Omer
    et al.
    Blekinge Institute of Technology, School of Computing.
    Gehrmann, Christian
    Fiedler, Markus
    Blekinge Institute of Technology, School of Computing.
    Secure Mobile Social Networks using USIM in a Closed Environment2012Conference paper (Refereed)
    Abstract [en]

    Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices. Basic security mechanisms normally based on passwords for the authentication of social-network users are widely deployed and poses a threat for the user security. In particular, for dedicated social groups with high confidentiality and privacy demands, stronger and user friendly principles for the authentication and identification of group members are needed. On the other hand, most of the mobile units already provide strong authentication procedures through the USIM/ISIM module. This paper explores how to build an architectural framework for secure enrolment and identification of group members in dedicated closed social groups using the USIM/SIM authentication and in particular, the 3GPP Generic Authentication Architecture (GAA), which is built upon the USIM/SIM capabilities. One part of the research is to identify the marketable use-cases with corresponding security challenges to fulfil the requirements that extend beyond the online connectivity. This paper proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have also implemented an initial proof of the concept prototype to simulate the secure identification procedure based on the proposed design. Our implementation has demonstrated the flexibility of the solution to be applied independently for applications requiring secure identification.

  • 5.
    Nawaz, Omer
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems. Blekinge Inst Technol, Dept Commun Syst, Karlskrona, Sweden..
    Minhas, Tahir Nawaz
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems. Blekinge Inst Technol, Dept Commun Syst, Karlskrona, Sweden..
    Fiedler, Markus
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems. Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems. Blekinge Institute of Technology, School of Computing. Blekinge Inst Technol, Dept Commun Syst, Karlskrona, Sweden..
    Optimal MTU for Realtime Video Broadcast with Packet Loss - A QoE Perspective2014In: 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), IEEE , 2014, p. 396-401Conference paper (Refereed)
    Abstract [en]

    Multimedia applications have become the prime source of Internet traffic in recent years due to high bandwidth offered by almost all access mechanisms. This highlights the need of intense research efforts to improve the already demanding user perception levels for high-performance video delivery networks. Quality of Experience (QoE) based metrics are often used to quantify user satisfaction levels regarding an application or service. In this paper, we have analyzed the impact of variable frame sizes at link layer with different packet loss scenarios to evaluate the performance degradation of H.264 based live video streams from the end user perspective using subjective tests. We have focused on both subjective and objective quantitative measures to analyze the myth that smaller packets provide better quality in error-prone networks. We found that this assumption may not be true for some cases with a considerable packet loss ratio. Moreover, we observed that full-reference video assessment software like PEVQ predicts QoE to an acceptable extent, which allows cutting cost and effort coming with subjective evaluations. Keywords-Quality of Experience, Multimedia communication, Streaming media

  • 6.
    Nawaz, Omer
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Minhas, Tahir Nawaz
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Fiedler, Markus
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    QoE based comparison of H.264/AVC and WebM/VP8 in an error-prone wireless network2017In: Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management / [ed] Chemouil P.,Simoes P.,Madeira E.,Secci S.,Monteiro E.,Gaspary L.P.,dos Santos C.R.P.,Charalambides M., Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 1005-1010Conference paper (Refereed)
    Abstract [en]

    Quality of Experience (QoE) management is a prime topic of research community nowadays as video streaming, online gaming and security applications are completely reliant on the network service quality. Moreover, there are no standard models to map Quality of Service (QoS) into QoE. HTTP media streaming is primarily used for such applications due to its coherence with the Internet and simplified management. The most common video codecs used for video streaming are H.264/AVC and Google's VP8. In this paper, we have analyzed the performance of these two codecs from the perspective of QoE. The most common end-user medium for accessing video content is via home based wireless networks. We have emulated an error-prone wireless network with different scenarios involving packet loss, packet delay and delay variation. The focus of this paper is evaluating the end user satisfaction with the multimedia content by subjective assessment using Mean Opinion Score (MOS). We have observed the overall superiority of H.264/AVC but the VP8 codec strongly gains ground in highly error-prone networks in terms of user satisfaction. © 2017 IFIP.

1 - 6 of 6
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf