Syed Husnain Abbas Naqvi

Syed Husnain Abbas Naqvi
International Islamic University, Islamabad | IIUI · Department of Computer Science and Software Engineering

About

12
Publications
7,317
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
503
Citations

Publications

Publications (12)
Article
Increased appearance of robots in both the domestic and professional human life is no wonder today. It needs to improve human-intention recognition capabilities in a robot. Intention recognition is inevitable for effective Human-Robot Interaction (HRI). Proactive intention recognition will improve the intuitiveness of HRI. In the presented research...
Article
Full-text available
Even with imperfect phase and frequency synchronization, collaborative communication can mitigate the effect of fading and produce a significant gain in received power. This article investigates the benefits of spread spectrum based collaborative communication in the presence of noise and fading. A mathematical expression for calculating capacity g...
Article
Full-text available
Automated formalization of legal text is a time- and effort-consuming task, but human-based validation consumes even more of both. The exchange of healthcare data in compliance with the medical privacy law requires experts with deep familiarity of its intricate provisions for verification. The article presents a medical relational model (MRM) for t...
Article
Full-text available
A handover authentication protocol ensures secure and seamless roaming over multiple access points. A number of such protocols are proposed, but most of these protocols are inefficient or insecure. Very recently, Li et al. (Wireless Pers Commun 80(2):581–589, 2015) proposed a privacy-aware handover authentication protocol, and claimed their protoco...
Article
Full-text available
Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient’s as well as TMIS server’s legitimacy during remote healthcare...
Article
Full-text available
Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any multimedia based application or IP-based telephony service that requires sig-naling. SIP supports HTTP digest based authentication, and is responsible for creating, maintaining and terminating sessions. To guarantee secure SIP based communication, a number of aut...
Article
Full-text available
Very recently, Kumari et al. proposed a symmetric key and smart card-based remote user password authentication scheme to enhance Chung et al.'s scheme. They claimed their enhanced scheme to provide anonymity while resisting all known attacks. In this paper, we analyze that Kumari et al.'s scheme is still vulnerable to anonymity violation attack as...
Article
Full-text available
The use of e-payment system for electronic trade is on its way to make daily life more easy and convenient. Contrarily, there are a number of security issues to be addressed, user anonymity and fair exchange have become important concerns along with authentication, confidentiality, integrity and non-repudiation. In a number of existing e-payment sc...
Article
Full-text available
Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 3...
Article
Full-text available
The need for Lightweight cryptography is on the rise as transition has been made from wired to wireless network. Wireless systems inherently are insecure and resource (power) constrained, to deal with these constraints, many techniques for symmetric and asymmetric cryptography are defined. One such important development is Signcryption to achieve m...

Projects

Project (1)
Project
We will explore some new methods to secure advanced networks