Khaled Alghathbar

According to our database1, Khaled Alghathbar authored at least 60 papers between 2003 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Attack containment in mobile ad-hoc networks through fair distribution of processing resources.
Telecommun. Syst., 2014

2013
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network.
Telecommun. Syst., 2013

Environment recognition for digital audio forensics using MPEG-7 and mel cepstral features.
Int. Arab J. Inf. Technol., 2013

Cyber security using arabic captcha scheme.
Int. Arab J. Inf. Technol., 2013

Authorization as a Service in Cloud Environments.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
Mobile one-time passwords: two-factor authentication using mobile phones.
Secur. Commun. Networks, 2012

Analysis of existing remote attestation techniques.
Secur. Commun. Networks, 2012

Identity-based online/offline signcryption for low power devices.
J. Netw. Comput. Appl., 2012

Intrinsic authentication of multimedia objects using biometric data manipulation.
Int. Arab J. Inf. Technol., 2012

Representing access control policies in use case.
Int. Arab J. Inf. Technol., 2012

Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

2011
Energy Efficient Distributed Face Recognition in Wireless Sensor Network.
Wirel. Pers. Commun., 2011

Privacy-preserving and tokenless chaotic revocable face authentication scheme.
Telecommun. Syst., 2011

Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks.
Sensors, 2011

Challenge-response-based biometric image scrambling for secure personal identification.
Future Gener. Comput. Syst., 2011

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'.
Comput. Commun., 2011

A Framework for Detecting Malformed SMS Attack.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Embedding High Capacity Covert Channels in Short Message Service (SMS).
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

An Ontology Based Information Security Requirements Engineering Framework.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

SIMOnt: A Security Information Management Ontology Framework.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Information Security Awareness Campaign: An Alternate Approach.
Proceedings of the Information Security and Assurance - International Conference, 2011

Secure Instant Messaging Protocol for Centralized Communication Group.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

OTP-Based Two-Factor Authentication Using Mobile Phones.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Web content mining for alias identification: A first step towards suspect tracking.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Quaternary privacy-levels preservation in computer forensics investigation process.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

2010
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'.
Sensors, 2010

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem.
Sensors, 2010

Chaos-based secure satellite imagery cryptosystem.
Comput. Math. Appl., 2010

Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Security Analysis of Firewall Rule Sets in Computer Networks.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010

Secure single packet IP Traceback mechanism to identify the source.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Contactless Biometrics in Wireless Sensor Network: A Survey.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Information Assurance in Saudi Organizations - An Empirical Study.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Issues of Security and Network Load in Presence - A Survey.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Using Arabic CAPTCHA for Cyber Security.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

One-Time Password System with Infinite Nested Hash Chains.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

NMACA Approach Used to Build a Secure Message Authentication Code.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cards.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

Face Recognition using Layered Linear Discriminant Analysis and Small Subspace.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Face Detection and Count Estimates in Surveillance Color Images.
Egypt. Comput. Sci. J., 2009

Enhancement of Use Case Diagram to Capture Authorization Requirements.
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009

Noisy password security technique.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Low power design for silent pass authentication system.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding).
Proceedings of the Bio-Science and Bio-Technology, 2009

Acceptance and Applications of Smart Cards Technology in University Settings.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Noisy password scheme: A new one time password system.
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009

A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" Data.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Enforcing Security Policies in Requirements Engineering Using AFUML.
Int. J. Comput. Their Appl., 2008

Practical ERP Implementation in Government Organization.
Proceedings of the 2008 International Conference on E-Learning, 2008

2007
Validating the enforcement of access control policies and separation of duty principle in requirement engineering.
Inf. Softw. Technol., 2007

2006
Securing UML Information Flow Using FlowUML.
J. Res. Pract. Inf. Technol., 2006

2005
Secure UML Information Flow using FlowUML.
Proceedings of the Security in Information Systems, 2005

2004
Analyzing Information Flow Control Policies in Requirements Engineering.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

2003
Consistent and Complete Access Control Policies in Use Cases.
Proceedings of the «UML» 2003, 2003

authUML: a three-phased framework to analyze access control specifications in use cases.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003


  Loading...