{"@attributes":{"name":"Abdulbasid S. Banga","pid":"380\/1789","n":"4"},"person":{"@attributes":{"key":"homepages\/380\/1789","mdate":"2024-07-12"},"author":"Abdulbasid S. Banga"},"r":[{"article":{"@attributes":{"key":"journals\/eswa\/IqbalBIEID25","mdate":"2025-05-01"},"author":["Nadeem Iqbal 0001","Abdulbasid S. Banga","Nisreen Innab","Bassam Mohammad Elzaghmouri","Atif Ikram","Hossam Diab"],"title":"Utilizing the nth root of numbers for novel random data calculus and its applications in network security and image encryption.","pages":"125992","year":"2025","volume":"265","journal":"Expert Syst. Appl.","ee":"https:\/\/doi.org\/10.1016\/j.eswa.2024.125992","url":"db\/journals\/eswa\/eswa265.html#IqbalBIEID25","stream":"streams\/journals\/eswa"}},{"article":{"@attributes":{"key":"journals\/access\/AlabdullahBIID24","mdate":"2025-09-06"},"author":["Bayan Ibrahimm Alabdullah","Abdulbasid S. Banga","Nadeem Iqbal 0001","Atif Ikram","Hossam Diab"],"title":"Advancing Cryptographic Security With a New Delannoy-Derived Chaotic S-Box.","pages":"82926-82937","year":"2024","volume":"12","journal":"IEEE Access","ee":"https:\/\/doi.org\/10.1109\/ACCESS.2024.3410668","url":"db\/journals\/access\/access12.html#AlabdullahBIID24"}},{"article":{"@attributes":{"key":"journals\/access\/KumarJHRB24","mdate":"2024-08-22"},"author":["Akshay Kumar","Usha Jain","Muzzammil Hussain","Mohammad Khalid Imam Rahmani","Abdulbasid S. Banga"],"title":"Mechanism for Device Authentication and Session Key Generation in Industrial Internet of Things Networks.","pages":"108770-108785","year":"2024","volume":"12","journal":"IEEE Access","ee":"https:\/\/doi.org\/10.1109\/ACCESS.2024.3435688","url":"db\/journals\/access\/access12.html#KumarJHRB24","stream":"streams\/journals\/access"}},{"article":{"@attributes":{"key":"journals\/wpc\/BangaAIAAAS24","mdate":"2025-08-05"},"author":["Abdulbasid S. Banga","Mohammed Moawad Alenazi","Nisreen Innab","Mansor Alohali","Fahad M. Alhomayani","Mohammad H. Algarni","Taoufik Saidani"],"title":"Remote Cardiac System Monitoring Using 6G-IoT Communication and Deep Learning.","pages":"123-142","year":"2024","month":"May","volume":"136","journal":"Wirel. Pers. Commun.","number":"1","ee":"https:\/\/doi.org\/10.1007\/s11277-024-11217-w","url":"db\/journals\/wpc\/wpc136.html#BangaAIAAAS24"}}],"coauthors":{"@attributes":{"n":"15","nc":"2"},"co":[{"@attributes":{"c":"0","n":"2"},"na":["Bayan Alabdullah","Bayan Ibrahimm Alabdullah"]},{"@attributes":{"c":"0"},"na":"Mohammed Moawad Alenazi"},{"@attributes":{"c":"0"},"na":"Mohammad H. Algarni"},{"@attributes":{"c":"0"},"na":"Fahad M. Alhomayani"},{"@attributes":{"c":"0"},"na":"Mansor Alohali"},{"@attributes":{"c":"0"},"na":"Hossam Diab"},{"@attributes":{"c":"0"},"na":"Bassam Mohammad Elzaghmouri"},{"@attributes":{"c":"1"},"na":"Muzzammil Hussain"},{"@attributes":{"c":"0"},"na":"Atif Ikram"},{"@attributes":{"c":"0"},"na":"Nisreen Innab"},{"@attributes":{"c":"0"},"na":"Nadeem Iqbal 0001"},{"@attributes":{"c":"1"},"na":"Usha Jain"},{"@attributes":{"c":"1"},"na":"Akshay Kumar"},{"@attributes":{"c":"1"},"na":"Mohammad Khalid Imam Rahmani"},{"@attributes":{"c":"0"},"na":"Taoufik Saidani"}]}}