Остановите войну!
for scientists:
default search action
Muhammad Khurram Khan
- > Home > Persons > Muhammad Khurram Khan
Publications
- 2014
- [j65]Farzana Azam, Zeeshan Shafi Khan, Muhammad Sher, Khaled Alghathbar, Muhammad Khurram Khan:
Attack containment in mobile ad-hoc networks through fair distribution of processing resources. Telecommun. Syst. 55(1): 93-103 (2014) - 2013
- [j62]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji:
Cyber security using arabic captcha scheme. Int. Arab J. Inf. Technol. 10(1): 76-84 (2013) - [j48]Xiaomin Wang, Wei Guo, Wenfang Zhang, Muhammad Khurram Khan, Khaled Alghathbar:
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network. Telecommun. Syst. 52(2): 515-524 (2013) - 2012
- [j42]Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Abdullah, Mohammad Yazid Bin Idris:
Intrinsic authentication of multimedia objects using biometric data manipulation. Int. Arab J. Inf. Technol. 9(4): 336-342 (2012) - [j37]Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi:
Identity-based online/offline signcryption for low power devices. J. Netw. Comput. Appl. 35(1): 340-347 (2012) - [j36]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Tai-Hoon Kim, Hassan M. Elkamchouchi:
Mobile one-time passwords: two-factor authentication using mobile phones. Secur. Commun. Networks 5(5): 508-516 (2012) - [j35]Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan, Khaled Alghathbar:
Analysis of existing remote attestation techniques. Secur. Commun. Networks 5(9): 1062-1082 (2012) - [c30]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan:
Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes. ISBAST 2012: 77-81 - 2011
- [j32]Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar:
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'. Comput. Commun. 34(3): 305-309 (2011) - [j25]Muhammad Khurram Khan, Jiashu Zhang, Khaled Alghathbar:
Challenge-response-based biometric image scrambling for secure personal identification. Future Gener. Comput. Syst. 27(4): 411-418 (2011) - [j20]Xianfeng Guo, Jiashu Zhang, Muhammad Khurram Khan, Khaled Alghathbar:
Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks. Sensors 11(2): 1607-1619 (2011) - [j17]Muhammad Khurram Khan, Khaled Alghathbar, Jiashu Zhang:
Privacy-preserving and tokenless chaotic revocable face authentication scheme. Telecommun. Syst. 47(3-4): 227-234 (2011) - [j16]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Jong Hyuk Park:
Energy Efficient Distributed Face Recognition in Wireless Sensor Network. Wirel. Pers. Commun. 60(3): 571-582 (2011) - [c26]Lu Leng, Jiashu Zhang, Gao Chen, Muhammad Khurram Khan, Khaled Alghathbar:
Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition. ICCSA (5) 2011: 458-470 - [c25]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan:
OTP-Based Two-Factor Authentication Using Mobile Phones. ITNG 2011: 327-331 - [c24]M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar:
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms. ITNG 2011: 559-563 - [c23]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, Hassan M. Elkamchouchi:
Secure Instant Messaging Protocol for Centralized Communication Group. NTMS 2011: 1-4 - [c22]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan:
Information Security Awareness Campaign: An Alternate Approach. ISA 2011: 1-10 - [c21]M. Zubair Rafique, Muhammad Khurram Khan, Khaled Alghathbar, Muddassar Farooq:
Embedding High Capacity Covert Channels in Short Message Service (SMS). STA 2011: 1-10 - [c20]M. Zubair Rafique, Muhammad Khurram Khan, Khaled Alghathbar, Muddassar Farooq:
A Framework for Detecting Malformed SMS Attack. STA 2011: 11-20 - 2010
- [j15]Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee:
Chaos-based secure satellite imagery cryptosystem. Comput. Math. Appl. 60(2): 326-337 (2010) - [j7]Muhammad Khurram Khan, Khaled Alghathbar:
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'. Sensors 10(3): 2450-2459 (2010) - [j6]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Eun-suk Cho:
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem. Sensors 10(9): 8683-8695 (2010) - [c18]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf:
Face Recognition using Layered Linear Discriminant Analysis and Small Subspace. CIT 2010: 1407-1412 - [c17]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji:
Using Arabic CAPTCHA for Cyber Security. FGIT-SecTech/DRBC 2010: 8-17 - [c16]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar:
One-Time Password System with Infinite Nested Hash Chains. FGIT-SecTech/DRBC 2010: 161-170 - [c15]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar:
Contactless Biometrics in Wireless Sensor Network: A Survey. FGIT-SecTech/DRBC 2010: 236-243 - [c14]Lu Leng, Jiashu Zhang, Jing Xu, Muhammad Khurram Khan, Khaled Alghathbar:
Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. ICTC 2010: 467-471 - [c13]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar:
Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset. IIH-MSP 2010: 384-388 - [c12]Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar:
Security Analysis of Firewall Rule Sets in Computer Networks. SECURWARE 2010: 51-56 - [c11]Muhammad Khurram Khan, Khaled Alghathbar:
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'. AST/UCMA/ISA/ACN 2010: 55-60 - 2009
- [c9]Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar:
Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding). FGIT-BSBT 2009: 97-107
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-05 03:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint