Items where Author is "Akhbar, R."

Group by: Item Type | No Grouping
Number of items: 8.

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akhbar, R. (2011) Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords. [Citation Index Journal]

Akhbar, R. and Hassan, M.F. and Qureshi, M.A. and Safdar, S. (2011) Structured Role Based Interaction Model for Agile Based Outsourced IT Projects: Client's Composite Structure. [Citation Index Journal]

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akhbar, R. and Aamir, R. (2010) Authentication Model Based on Reformation Mapping Method. In: International Conference on Information and Emerging Technologies (ICIET 2010), 14-16 June 2010 , Karachi, Pakistan.

Akhbar, R. and Hassan, M.F. (2010) Limitations and Measures in Outsourcing Projects to Geographically Distributed Offshore Teams. In: International Symposium on Information Technology 2010, ITSim, June 2010, Kuala Lumpur.

Safdar, S. and Hassan, M.F. and Qureshi, MA. and Akhbar, R. (2010) Framework for Alternate Execution of Workflows Under Threat. In: IEEE. International Conference of Communication Software and Networks (ICCSN 2010), 28-26 Feb 2010, Singapore.

Qureshi, MA. and Hassan, M.F. and Safdar, S. and Akhbar, R. (2010) Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs. In: IEEE International Conference of Communication Software and Networks (ICCSN 2010), 28-26 Feb 2010, Singapore.

Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akhbar, R. (2010) A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs. International Journal on Computer Science and Information Security (IJSIS), Volume 6 (No 1). pp. 40-46. ISSN 1947-5500

Safdar, S. and Hassan, M.F. and Qureshi, M.A and Akhbar, R. (2009) Biologically Inspired Execution Framework for Vulnerable Workflow Systems. International Journal of Computer Science and Information Security (IJCSIS), Volume 6 (No. 1). pp. 47-51. ISSN 1947-5500

This list was generated on Tue Nov 26 22:21:08 2024 +08.