MS: Recent submissions

  • Yousuf, Muhammad (School of Electrical Engineering and Computer Science (SEECS), NUST, 2020)
    Recent decade has witnessed a remarkable progress in cloud computing, that has urged various healthcare organizations to deploy their electronic health records (EHRs) over cloud for the sake of management and ...
  • Saeed, Momna (School of Electrical Engineering and Computer Science (SEECS), NUST, 2021)
    Several authentication techniques and security protocols require users to compare hash strings in different forms like cryptographic keys, addresses, and identifiers. As these hash values are long sequences of digits ...
  • Tariq, Mahak (School of Electrical Engineering and Computer Science (SEECS), NUST, 2019)
    Supply chain management is the essential part to enhance the coordination, which refers flow of product and exchange of associated information among different actors of supply chain network. This flow have primary ...
  • Shabbir, Farrukh (School of Electrical Engineering and Computer Science (SEECS), NUST, 2020)
    In this modern era of rapidly increasing digitalization where most of the critical and important data resides on the storage of digital devices, out of which computers are the most commonly used devices on the planet. ...
  • TAHIR, FAIZA (School of Electrical Engineering and Computer Science (SEECS), NUST, 2020)
    The Internet of Things (IoT) is a network of interconnected smart devices, which gathers the data, transmit the data, and can communicate with other smart devices over the network. A smartwatch is an IoT device that ...
  • Aliza, Zahoor Ahmed (School of Electrical Engineering and Computer Science (SEECS), NUST, 2020)
    By design Transport Layer Security (TLS) and Secure Socket Layer (SSL) are not designed to work at the application layer. This means that there is considerable security protocol isolation between the upper and lower ...
  • Anwar, Muhammad (School of Electrical Engineering and Computer Science (SEECS), NUST, 2020)
    Travelling is the essential part of our daily life. With the advancement of mobile technology most of the traveling companies are providing online booking / reservation services to their customers. These services on ...
  • Unknown author (School of Electrical Engineering and Computer Science (SEECS), NUST, 2019)
    The thesis presents a detailed analysis of BitCoin Inspired messaging application - Bitmessage. The working, protocols and cryptographic algorithms used by bitmessage are explained and analyzed in detail. Certain design flaws ...
  • Afzal, Asmara (School of Electrical Engineering and Computer Science (SEECS), NUST, 2020)
    Instant Messaging applications (apps) have played a vital role in online interaction, especially during COVID-19 lockdowns. Apps with security provisions are able to provide confidentiality through end-to-end encryption. Ill ...
  • Husain, Naveed (School of Electrical Engineering and Computer Science (SEECS), NUST, 2021)
    In the technology world, the wireless network is more flexible and adaptable compared to the wired network. Because it is easy to install and does not require cables. Also, there have been many recent advances in the ...
  • Mushtaq, Hafiza Rabail (School of Electrical Engineering and Computer Science, NUST, 2023)
    The proliferation of political extremism on social media has adverse effects on not only the individuals who are targeted but also on society at large. It causes great damage to the hosting platform as well where such ...
  • Zafar Qurashai, Zubaria (School of Electrical Engineering and Computer Sciences (SEECS), NUST, 2023)
    The storage of cryptographic keys is a significant concern in security systems, as keys can become a target for adversaries. The centralized storage of keys brings about the concern of a single point of failure, where ...
  • Shafiq, Fizza (School of Electrical Engineering and Computer Science, NUST, 2023)
    With the observed increase in Internet users, the volume of available data is increasing as well. Public platforms such as social media, news sources, and open data reposito ries present a vast potential that remains ...
  • Noor, Basirah (School of Electrical Engineering & Computer Science (SEECS), 2023)
    Rootkits are malicious software designed to hide their presence and activities on compromised systems. Traditional detection methods often struggle to identify rootkits due to their ability to mimic normal files and evade ...
  • Khanum, Aisha (School of Electrical Engineering and Computer Sciences (SEECS) NUST, 2023)
    In today’s cyber era, most businesses and services require an online presence to be globally accessible. This exposure, however, poses a threat of hacking and data theft, with malicious individuals constantly searching ...
  • Sharif, Saqib (School of Electrical Engineering and Computer Sciences (SEECS) NUST, 2023)
    The Information age has ushered in a new era of advancement and facilitation for human civilization. For entertainment and leisure, Vacation rental applications are a go-to for reserving rooms in hotels in distant ...
  • Tahir, Inshal (School of Electrical Engineering and Computer Sciences (SEECS) NUST, 2023)
    The increased popularity of IoT has raised many security concerns. New devices with improved operational activities and features are introduced into the market each year, expanding the IoT attack surface, and giving rise ...
  • Fatima, Arjumand (School of Electrical Engineering and Computer Sciences (SEECS) NUST, 2015)
  • Malik, Tanzeela Younas (School of Electrical Engineering and Computer Sciences (SEECS) NUST, 2018)
    Every aspect of information security cannot be addressed efficiently by taking only technical measures into consideration. With the increasing rate of insider threat, information security awareness plays a crucial role ...

Search DSpace


Advanced Search

Browse

My Account