Fahad Bin Muhaya

According to our database1, Fahad Bin Muhaya authored at least 28 papers between 2009 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wirel. Pers. Commun., 2015

An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2015

Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system.
Secur. Commun. Networks, 2015

Security analysis and improvement of a mutual authentication scheme under trusted computing.
Int. J. Ad Hoc Ubiquitous Comput., 2015

A Comprehensive Study of Email Spam Botnet Detection.
IEEE Commun. Surv. Tutorials, 2015

2014
Spam Trapping System: Novel security framework to fight against spam botnets.
Proceedings of the 21st International Conference on Telecommunications, 2014

2013
Chaotic and AES cryptosystem for satellite imagery.
Telecommun. Syst., 2013

Editorial "Secure Multimedia Communication in Vehicular Adhoc Network".
Multim. Tools Appl., 2013

Framework for Secure Wireless Communication in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

MapIt: a case study for location driven knowledge discovery and mining.
Int. J. Data Min. Model. Manag., 2013

Lattice-based signcryption.
Concurr. Comput. Pract. Exp., 2013

Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme".
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Predicted probability enhancement for multi-label text classification using class label pair association.
Proceedings of the 2013 IEEE Conference on Evolving and Adaptive Intelligent Systems, 2013

Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2013

2012
Refinement of Strategy and Technology Domains STOPE View on ISO 27001
CoRR, 2012

2011
Estimating Twitter User Location Using Social Interactions-A Content Based Approach.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Efficient Identity-Based Signcryption in the Standard Model.
Proceedings of the Provable Security - 5th International Conference, 2011

Subjectivity classification and analysis of the ASRS corpus.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Polymorphic Malware Detection Using Hierarchical Hidden Markov Model.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
Sensor Based Framework for Secure Multimedia Communication in VANET.
Sensors, 2010

Enhanced Relevance-Based Approach for Network Controls.
Informatica (Slovenia), 2010

Information Sharing in Vehicular AdHoc Network.
Int. J. Comput. Commun. Control, 2010

Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication.
Comput. Math. Appl., 2010

Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Performance Evaluation of Video Streaming in Vehicular Adhoc Network.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Secure multimedia communication in wireless mesh networks.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Discovering the Botnet Detection Techniques.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

2009
Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009


  Loading...