Muhammad Bilal Junaid

Learn More
In recent years, we have witnessed the dramatic increase in the volume of mobile SMS (Short Messaging Service) spam. The reason is that operators - owing to fierce market competition - have introduced packages that allow their customers to send unlimited SMS in less than $1 a month. It not only degrades the service of cellular operators but also compromises(More)
Wireless Networks call for enhanced confidentiality, integrity and authentication services because of their inherent weakness. 'Counter Mode Cipher Block Chaining Message Authentication Code Protocol' (CCMP) has recently been employed to replace flawed 'Wired Equivalent Privacy' (WEP) Protocol for the provision of security to IEEE 802.11 wireless local area(More)
Contemporary improvements in the type II clustered regularly interspaced short palindromic repeats/CRISPR-associated protein 9 (CRISPR/Cas9) system offer a convenient way for genome editing in zebrafish. However, the low efficiencies of genome editing and germline transmission require a time-intensive and laborious screening work. Here, we reported a method(More)
— The security and efficiency in terms of performance are the core requirements of cryptographic based algorithms. Recommendations proposed by the FIPS 140-2 standard emphasis on the correct implementations of the cryptographic algorithms after passing through a number of tests. Performance tests provide more security and efficient implementations on(More)
  • 1