Muhammad Khurram Khan
Muhammad Khurram Khan
King Saud University, Saudi Arabia
Dirección de correo verificada de ksu.edu.sa - Página principal
TítuloCitado porAño
Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’
MK Khan, K Alghathbar
Sensors 10 (3), 2450-2459, 2010
3182010
Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
MK Khan, SK Kim, K Alghathbar
Computer Communications 34 (3), 305-309, 2011
2462011
Performance evaluation of score level fusion in multimodal biometric systems
M He, SJ Horng, P Fan, RS Run, RJ Chen, JL Lai, MK Khan, KO Sentosa
Pattern Recognition 43 (5), 1789-1800, 2010
2142010
Improving the security of ‘a flexible biometrics remote user authentication scheme’
MK Khan, J Zhang
Computer Standards & Interfaces 29 (1), 82-85, 2007
2142007
An enhanced smart card based remote user password authentication scheme
X Li, J Niu, MK Khan, J Liao
Journal of Network and Computer Applications 36 (5), 1365-1371, 2013
1992013
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
XM Wang, WF Zhang, JS Zhang, MK Khan
Computer Standards & Interfaces 29 (5), 507-512, 2007
1782007
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
MK Khan, J Zhang, X Wang
Chaos, Solitons & Fractals 35 (3), 519-524, 2008
1672008
Dynamic remote data auditing for securing big data storage in cloud computing
M Sookhak
University of Malaya, 2015
1492015
An effective memetic differential evolution algorithm based on chaotic local search
D Jia, G Zheng, MK Khan
Information Sciences 181 (15), 3175-3187, 2011
1442011
b-SPECS+: Batch verification for secure pseudonymous authentication in VANET
SJ Horng, SF Tzeng, Y Pan, P Fan, X Wang, T Li, MK Khan
IEEE Transactions on Information Forensics and Security 8 (11), 1860-1875, 2013
1212013
Chaos-based secure satellite imagery cryptosystem
M Usama, MK Khan, K Alghathbar, C Lee
Computers & Mathematics with Applications 60 (2), 326-337, 2010
1202010
An efficient phishing webpage detector
M He, SJ Horng, P Fan, MK Khan, RS Run, JL Lai, RJ Chen, A Sutanto
Expert systems with applications 38 (10), 12018-12027, 2011
1192011
Securing software defined networks: taxonomy, requirements, and open issues
A Akhunzada, E Ahmed, A Gani, MK Khan, M Imran, S Guizani
IEEE Communications Magazine 53 (4), 36-44, 2015
1132015
A privacy preserving three-factor authentication protocol for e-Health clouds
Q Jiang, MK Khan, X Lu, J Ma, D He
The Journal of Supercomputing 72 (10), 3826-3849, 2016
1122016
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar
Computer Networks 101, 42-62, 2016
1042016
Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges
E Ahmed, A Gani, MK Khan, R Buyya, SU Khan
Journal of Network and Computer Applications 52, 154-172, 2015
1032015
Chaotic secure content-based hidden transmission of biometric templates
MK Khan, J Zhang, L Tian
Chaos, Solitons & Fractals 32 (5), 1749-1759, 2007
992007
A review on remote data auditing in single cloud server: Taxonomy and open issues
M Sookhak, H Talebian, E Ahmed, A Gani, MK Khan
Journal of Network and Computer Applications 43, 121-141, 2014
982014
Effectiveness of information security awareness methods based on psychological theories
B Khan, KS Alghathbar, SI Nabi, MK Khan
African Journal of Business Management 5 (26), 10862-10868, 2011
932011
User authentication schemes for wireless sensor networks: A review
S Kumari, MK Khan, M Atiquzzaman
Ad Hoc Networks 27, 159-194, 2015
922015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20