Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Muhammad Khurram Khan
2010 – today
- 2014
[j50]Debiao He, Muhammad Khurram Khan, Shuhua Wu: On the Security of a RSA-based Certificateless Signature Scheme. I. J. Network Security 16(1): 78-80 (2014)- 2013
[j49]Fagen Li, Fahad Bin Muhaya, Muhammad Khurram Khan, Tsuyoshi Takagi: Lattice-based signcryption. Concurrency and Computation: Practice and Experience 25(14): 2112-2122 (2013)
[j48]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz AlAjaji: Cyber security using arabic captcha scheme. Int. Arab J. Inf. Technol. 10(1): 76-84 (2013)
[j47]Shi-Jinn Horng, Shiang-Feng Tzeng, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan: Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles. TIIS 7(6): 1512-1532 (2013)
[j46]Adeela Waqar, Asad Raza, Haider Abbas, Muhammad Khurram Khan: A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata. J. Network and Computer Applications 36(1): 235-248 (2013)
[j45]Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao: An enhanced smart card based remote user password authentication scheme. J. Network and Computer Applications 36(5): 1365-1371 (2013)
[j44]Shi-Jinn Horng, Ling-Yuan Hsu, Tianrui Li, Shaojie Qiao, Xun Gong, Hsien-Hsin Chou, Muhammad Khurram Khan: Using Sorted Switching Median Filter to remove high-density impulse noises. J. Visual Communication and Image Representation 24(7): 956-967 (2013)
[j43]Shi-Jinn Horng, Didi Rosiyadi, Tianrui Li, Takao Terano, Minyi Guo, Muhammad Khurram Khan: A blind image copyright protection scheme for e-government. J. Visual Communication and Image Representation 24(7): 1099-1105 (2013)
[j42]Muhammad Khurram Khan: Editorial - Chaotic cryptography and its applications in telecommunication systems. Telecommunication Systems 52(2): 513-514 (2013)
[j41]Xiaomin Wang, Wei Guo, Wenfang Zhang, Muhammad Khurram Khan, Khaled Alghathbar: Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network. Telecommunication Systems 52(2): 515-524 (2013)
[c29]Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta, Fahad Bin Muhaya: Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device. BICS 2013: 271-277- 2012
[j40]Mahmoud E. Farfoura, Shi-Jinn Horng, Jui-Lin Lai, Ray-Shine Run, Rong-Jian Chen, Muhammad Khurram Khan: A blind reversible method for watermarking relational databases based on a time-stamping protocol. Expert Syst. Appl. 39(3): 3185-3196 (2012)
[j39]Muhammad Khurram Khan: High performance biometrics recognition algorithms and systems. Future Generation Comp. Syst. 28(1): 210-211 (2012)
[j38]Lijun Yan, Jeng-Shyang Pan, Shu-Chuan Chu, Muhammad Khurram Khan: Adaptively weighted sub-directional two-dimensional linear discriminant analysis for face recognition. Future Generation Comp. Syst. 28(1): 232-235 (2012)
[j37]Fagen Li, Muhammad Khurram Khan: A biometric identity-based signcryption scheme. Future Generation Comp. Syst. 28(1): 306-310 (2012)
[j36]Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul-Hanan Abdullah, Mohammad Yazid Bin Idris: Intrinsic authentication of multimedia objects using biometric data manipulation. Int. Arab J. Inf. Technol. 9(4): 336-342 (2012)
[j35]Didi Rosiyadi, Shi-Jinn Horng, Pingzhi Fan, Xian Wang, Muhammad Khurram Khan, Yi Pan: Copyright Protection for E-Government Document Images. IEEE MultiMedia 19(3): 62-73 (2012)
[j34]Muhammad Khurram Khan, Saru Kumari: An Authentication Scheme for Secure Access to Healthcare Services. J. Medical Systems 37(4): 1-12 (2012)
[j33]Saru Kumari, Muhammad Khurram Khan, Rahul Kumar: Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'. J. Medical Systems 37(4) (2012)
[j32]Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi: Identity-based online/offline signcryption for low power devices. J. Network and Computer Applications 35(1): 340-347 (2012)
[j31]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Tai-Hoon Kim, Hassan M. Elkamchouchi: Mobile one-time passwords: two-factor authentication using mobile phones. Security and Communication Networks 5(5): 508-516 (2012)
[j30]Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan, Khaled Alghathbar: Analysis of existing remote attestation techniques. Security and Communication Networks 5(9): 1062-1082 (2012)
[j29]Muhammad Khurram Khan, Debiao He: A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Security and Communication Networks 5(11): 1260-1266 (2012)
[c28]Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta: Further cryptanalysis of 'A remote authentication scheme using mobile device'. CASoN 2012: 234-237
[c27]Muhammad Khurram Khan, Debiao He: Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol". ICDKE 2012: 243-249
[c26]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan: Detecting counterfeit-money using RFID-enabled mobile devices. ICITST 2012: 74-79
[c25]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan: Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes. ISBAST 2012: 77-81- 2011
[j28]Dongli Jia, Guoxin Zheng, Boyang Qu, Muhammad Khurram Khan: A hybrid particle swarm optimization algorithm for high-dimensional problems. Computers & Industrial Engineering 61(4): 1117-1122 (2011)
[j27]Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar: Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'. Computer Communications 34(3): 305-309 (2011)
[j26]Ling-Yuan Hsu, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Yuh-Rau Wang, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen: MTPSO algorithm for solving planar graph coloring problem. Expert Syst. Appl. 38(5): 5525-5531 (2011)
[j25]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen: A fast RFID tag identification algorithm based on counter and stack. Expert Syst. Appl. 38(6): 6829-6838 (2011)
[j24]Ling-Yuan Hsu, Shi-Jinn Horng, Mingxing He, Pingzhi Fan, Tzong-Wann Kao, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen: Mutual funds trading strategy based on particle swarm optimization. Expert Syst. Appl. 38(6): 7582-7602 (2011)
[j23]Yao-Lin Huang, Shi-Jinn Horng, Mingxing He, Pingzhi Fan, Tzong-Wann Kao, Muhammad Khurram Khan, Jui-Lin Lai, I-Hong Kuo: A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization. Expert Syst. Appl. 38(7): 8014-8023 (2011)
[j22]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen, Adi Sutanto: An efficient phishing webpage detector. Expert Syst. Appl. 38(10): 12018-12027 (2011)
[j21]Ray-Shine Run, Shi-Jinn Horng, Wei-Hung Lin, Tzong-Wann Kao, Pingzhi Fan, Muhammad Khurram Khan: An efficient wavelet-tree-based watermarking method. Expert Syst. Appl. 38(12): 14357-14366 (2011)
[j20]Muhammad Khurram Khan, Jiashu Zhang, Khaled Alghathbar: Challenge-response-based biometric image scrambling for secure personal identification. Future Generation Comp. Syst. 27(4): 411-418 (2011)
[j19]Dongli Jia, Guoxin Zheng, Muhammad Khurram Khan: An effective memetic differential evolution algorithm based on chaotic local search. Inf. Sci. 181(15): 3175-3187 (2011)
[j18]Shih-Ying Lin, Shi-Jinn Horng, Tzong-Wann Kao, Chin-Shyurng Fahn, Pingzhi Fan, Yuan-Hsin Chen, Muhammad Khurram Khan, Anu G. Bourgeois, Takao Terano: 3D block-based medial axis transform and chessboard distance transform based on dominance. Image Vision Comput. 29(4): 272-285 (2011)
[j17]Muhammad Khurram Khan: Research advances in data hiding for multimedia security. Multimedia Tools Appl. 52(2-3): 257-261 (2011)
[j16]Hong Zhao, Hongxia Wang, Muhammad Khurram Khan: Statistical analysis of several reversible data hiding algorithms. Multimedia Tools Appl. 52(2-3): 277-290 (2011)
[j15]Hong Zhao, Hongxia Wang, Muhammad Khurram Khan: Steganalysis for palette-based images using generalized difference image and color correlogram. Signal Processing 91(11): 2595-2605 (2011)
[j14]Muhammad Khurram Khan: Guest editorial for special issue on biometric systems and applications. Telecommunication Systems 47(3-4): 183-184 (2011)
[j13]Muhammad Khurram Khan, Khaled Alghathbar, Jiashu Zhang: Privacy-preserving and tokenless chaotic revocable face authentication scheme. Telecommunication Systems 47(3-4): 227-234 (2011)
[j12]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Jong Hyuk Park: Energy Efficient Distributed Face Recognition in Wireless Sensor Network. Wireless Personal Communications 60(3): 571-582 (2011)
[c24]Muhammad Khurram Khan, Pei-wei Tsai, Jeng-Shyang Pan, Bin-Yih Liao: Biometric driven initiative system for passive continuous authentication. IAS 2011: 139-144
[c23]Fahad Bin Muhaya, Muhammad Khurram Khan, Yang Xiang: Polymorphic Malware Detection Using Hierarchical Hidden Markov Model. DASC 2011: 151-155
[c22]M. Zubair Rafique, Nasser Alrayes, Muhammad Khurram Khan: Application of evolutionary algorithms in detecting SMS spam at access layer. GECCO 2011: 1787-1794
[c21]Lu Leng, Jiashu Zhang, Gao Chen, Muhammad Khurram Khan, Khaled Alghathbar: Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition. ICCSA (5) 2011: 458-470
[c20]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan: OTP-Based Two-Factor Authentication Using Mobile Phones. ITNG 2011: 327-331
[c19]M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar: Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms. ITNG 2011: 559-563
[c18]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, Hassan M. Elkamchouchi: Secure Instant Messaging Protocol for Centralized Communication Group. NTMS 2011: 1-4
[c17]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan: Information Security Awareness Campaign: An Alternate Approach. ISA 2011: 1-10
[e3]Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, L. Javier García-Villalba, Kirk P. Arnett, Muhammad Khurram Khan (Eds.): Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 259, Springer 2011, ISBN 978-3-642-27188-5- 2010
[j11]Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee: Chaos-based secure satellite imagery cryptosystem. Computers & Mathematics with Applications 60(2): 326-337 (2010)
[j10]Muhammad Khurram Khan, Ling Xie, Jiashu Zhang: Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals. Digital Signal Processing 20(1): 179-190 (2010)
[j9]Mohammed S. Khalil, Dzulkifli Mohamad, Muhammad Khurram Khan, Qais Al-Nuzaili: Fingerprint verification using statistical descriptors. Digital Signal Processing 20(4): 1264-1273 (2010)
[j8]Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo: Improvement of the Efficient Secret Broadcast Scheme. IEICE Transactions 93-D(12): 3396-3399 (2010)
[j7]Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo: Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing. IEICE Transactions 93-D(12): 3400-3402 (2010)
[j6]Muhammad Khurram Khan, Mohamed Kamel, Xudong Jiang: Special issue on: Recent advances and future directions in biometrics personal identification. J. Network and Computer Applications 33(3): 205-206 (2010)
[j5]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, Muhammad Khurram Khan, Kevin Octavius Sentosa: Performance evaluation of score level fusion in multimodal biometric systems. Pattern Recognition 43(5): 1789-1800 (2010)
[c16]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf: Face Recognition using Layered Linear Discriminant Analysis and Small Subspace. CIT 2010: 1407-1412
[c15]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz AlAjaji: Using Arabic CAPTCHA for Cyber Security. FGIT-SecTech/DRBC 2010: 8-17
[c14]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar: One-Time Password System with Infinite Nested Hash Chains. FGIT-SecTech/DRBC 2010: 161-170
[c13]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar: Contactless Biometrics in Wireless Sensor Network: A Survey. FGIT-SecTech/DRBC 2010: 236-243
[c12]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar: Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset. IIH-MSP 2010: 384-388
[c11]Muhammad Khurram Khan, Khaled Alghathbar: Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'. AST/UCMA/ISA/ACN 2010: 55-60
[e2]Tai-Hoon Kim, Haeng-Kon Kim, Muhammad Khurram Khan, Kiumi Akingbehin, Wai-Chi Fang, Dominik Slezak (Eds.): Advances in Software Engineering - International Conference, ASEA 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 117, Springer 2010, ISBN 978-3-642-17577-0
[e1]Tai-Hoon Kim, Wai-Chi Fang, Muhammad Khurram Khan, Kirk P. Arnett, Heau-Jo Kang, Dominik Slezak (Eds.): Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 122, Springer 2010, ISBN 978-3-642-17609-8
2000 – 2009
- 2009
[c10]Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan: Bio-chaotic Stream Cipher-Based Iris Image Encryption. CSE (2) 2009: 739-744
[c9]Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar: Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding). FGIT-BSBT 2009: 97-107
[c8]Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan: Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. ICIC (1) 2009: 1014-1024
[c7]Muhammad Khurram Khan: Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. NSS 2009: 420-424- 2007
[j4]Muhammad Khurram Khan, Jiashu Zhang: Improving the security of 'a flexible biometrics remote user authentication scheme'. Computer Standards & Interfaces 29(1): 82-85 (2007)
[j3]Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhammad Khurram Khan: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards & Interfaces 29(5): 507-512 (2007)
[c6]Muhammad Khurram Khan, Ling Xie, Jiashu Zhang: Robust Hiding of Fingerprint-Biometric Data into Audio Signals. ICB 2007: 702-712
[c5]Muhammad Khurram Khan, Jiashu Zhang: An Intelligent Fingerprint-Biometric Image Scrambling Scheme. ICIC (2) 2007: 1141-1151- 2006
[j2]Muhammad Khurram Khan, Jiashu Zhang: Pointing a Finger toward Standardized and Automated Biometrics. IEEE MultiMedia 13(4): 73-75 (2006)
[j1]Anthony D. Joseph, Alastair R. Beresford, Jean Bacon, David N. Cottingham, Jonathan J. Davies, Brian D. Jones, Haitao Guo, Wei Guan, Yong Lin, Houbing Song, Liviu Iftode, Simone Fuchs, Bernhard Lamprecht, Kyandoghere Kyamakya, Jorge González Fernández, Juan Carlos Yelmo García, Yod Samuel Martín García, Jorge de Gracia Santos, Milind Nimesh, Gang Pan, Zhaohui Wu, Qing Wu, Zhenyu Shan, Jie Sun, Jian Lu, Guoqing Yang, Muhammad Khurram Khan, Jiashu Zhang: Intelligent Transportation Systems. IEEE Pervasive Computing 5(4): 63-67 (2006)
[c4]Muhammad Khurram Khan, Jiashu Zhang: Enhancing the Transmission Security of Content-Based Hidden Biometric Data. ISNN (2) 2006: 214-223
[c3]Muhammad Khurram Khan, Jiashu Zhang: An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. ISPEC 2006: 260-268- 2005
[c2]Muhammad Khurram Khan, Jiashu Zhang: Securing Biometric Templates for Reliable Identity Authentication. ICIC (2) 2005: 723-732- 2004
[c1]Muhammad Khurram Khan, Jiashu Zhang, Lei Tian: Protecting Biometric Data for Personal Identification. SINOBIOMETRICS 2004: 629-638
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:09 CEST by the dblp team



