Muhammad Khurram Khan

According to our database1, Muhammad Khurram Khan authored at least 275 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A new journey in the new year.
Telecommunication Systems, 2019

g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices.
IEEE Trans. Consumer Electronics, 2019

Communal Acts of IoT Consumers: A Potential Threat to Security and Privacy.
IEEE Trans. Consumer Electronics, 2019

A scene image classification technique for a ubiquitous visual surveillance system.
Multimedia Tools Appl., 2019

Towards augmented proactive cyberthreat intelligence.
J. Parallel Distrib. Comput., 2019

A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases.
J. Network and Computer Applications, 2019

A survey on privacy protection in blockchain system.
J. Network and Computer Applications, 2019

Energy Management in RFID-Sensor Networks: Taxonomy and Challenges.
IEEE Internet of Things Journal, 2019

Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities.
Comput. Sci. Inf. Syst., 2019

Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things.
IEEE Consumer Electronics Magazine, 2019

Cloud-Based Wireless Body Area Networks: Managing Data for Better Health Care.
IEEE Consumer Electronics Magazine, 2019

Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications.
IEEE Access, 2019

Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks Using Collaborative Communication.
IEEE Access, 2019

Trust Management Techniques for the Internet of Things: A Survey.
IEEE Access, 2019

The Internet of Things: A Review of Enabled Technologies and Future Challenges.
IEEE Access, 2019

2018
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Vehicular Communications, 2018

An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data.
The Journal of Supercomputing, 2018

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomedical and Health Informatics, 2018

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services.
IEEE Systems Journal, 2018

Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things.
IEEE Network, 2018

Digital multimedia audio forensics: past, present and future.
Multimedia Tools Appl., 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multimedia Tools Appl., 2018

An enhanced lightweight anonymous biometric based authentication scheme for TMIS.
Multimedia Tools Appl., 2018

A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multimedia Tools Appl., 2018

Intelligent Technique for Seamless Vertical Handover in Vehicular Networks.
MONET, 2018

Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits.
J. Network and Computer Applications, 2018

Structures and data preserving homomorphic signatures.
J. Network and Computer Applications, 2018

Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges.
J. Network and Computer Applications, 2018

Medical Image Analysis using Convolutional Neural Networks: A Review.
J. Medical Systems, 2018

A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor.
IJAHUC, 2018

A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Generation Comp. Syst., 2018

A secure chaotic map-based remote authentication scheme for telecare medicine information systems.
Future Generation Comp. Syst., 2018

SIMDOM: A framework for SIMD instruction translation and offloading in heterogeneous mobile architectures.
Trans. Emerging Telecommunications Technologies, 2018

Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions.
IEEE Communications Surveys and Tutorials, 2018

Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions.
IEEE Consumer Electronics Magazine, 2018

Certificateless searchable public key encryption scheme for mobile healthcare system.
Computers & Electrical Engineering, 2018

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks.
Computers & Electrical Engineering, 2018

A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.
IEEE Access, 2018

A Newly Developed Ground Truth Dataset for Visual Saliency in Videos.
IEEE Access, 2018

CloudProcMon: A Non-Intrusive Cloud Monitoring Framework.
IEEE Access, 2018

Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols.
IEEE Access, 2018

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018

Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare.
IEEE Access, 2018

Five acts of consumer behavior: A potential security and privacy threat to Internet of Things.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

2017
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things.
Wireless Personal Communications, 2017

A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2017

An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography.
Wireless Personal Communications, 2017

Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G Systems.
IEEE Wireless Commun., 2017

Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs.
IEEE Trans. Vehicular Technology, 2017

A secure and efficient public auditing scheme using RSA algorithm for cloud storage.
The Journal of Supercomputing, 2017

Security analysis of a publicly verifiable data possession scheme for remote storage.
The Journal of Supercomputing, 2017

On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Sec. Comput., 2017

A software agent enabled biometric security algorithm for secure file access in consumer storage devices.
IEEE Trans. Consumer Electronics, 2017

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments.
Security and Communication Networks, 2017

An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Personal and Ubiquitous Computing, 2017

An improved smart card based authentication scheme for session initiation protocol.
Peer-to-Peer Networking and Applications, 2017

Formal modeling and verification of security controls for multimedia systems in the cloud.
Multimedia Tools Appl., 2017

Cloud resource allocation schemes: review, taxonomy, and opportunities.
Knowl. Inf. Syst., 2017

Cryptanalysis of an identity-based public auditing protocol for cloud storage.
Frontiers of IT & EE, 2017

Cloud monitoring: A review, taxonomy, and open research issues.
J. Network and Computer Applications, 2017

Towards next-generation heterogeneous mobile data stream mining applications: Opportunities, challenges, and future research directions.
J. Network and Computer Applications, 2017

Towards port-knocking authentication methods for mobile cloud computing.
J. Network and Computer Applications, 2017

Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.
J. Network and Computer Applications, 2017

Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey.
J. Network and Computer Applications, 2017

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
J. Medical Systems, 2017

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.
IEEE Internet of Things Journal, 2017

ABC-PSO for vertical handover in heterogeneous wireless networks.
Neurocomputing, 2017

An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems.
Int. J. Communication Systems, 2017

A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography.
Int. J. Communication Systems, 2017

An efficient chaos-based 2-party key agreement protocol with provable security.
Int. J. Communication Systems, 2017

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.
Int. J. Communication Systems, 2017

A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017

Attribute-based data access control in mobile cloud computing: Taxonomy and open issues.
Future Generation Comp. Syst., 2017

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Computer Standards & Interfaces, 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2017

Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art.
IEEE Communications Surveys and Tutorials, 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2.
IEEE Communications Magazine, 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1.
IEEE Communications Magazine, 2017

Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges.
IEEE Communications Magazine, 2017

Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues.
IEEE Communications Magazine, 2017

A high-level domain-specific language for SIEM (design, development and formal verification).
Cluster Computing, 2017

On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues.
Comput. J., 2017

Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique.
IEEE Consumer Electronics Magazine, 2017

When social objects collaborate: Concepts, processing elements, attacks and challenges.
Computers & Electrical Engineering, 2017

An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Annales des Télécommunications, 2017

Towards a set aggregation-based data integrity scheme for smart grids.
Annales des Télécommunications, 2017

Fog Computing Over IoT: A Secure Deployment and Formal Verification.
IEEE Access, 2017

A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing.
IEEE Access, 2017

Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures.
IEEE Access, 2017

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017

Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

A secure framework for digital Quran certification.
Proceedings of the IEEE International Conference on Consumer Electronics, 2017

2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wireless Personal Communications, 2016

A privacy preserving three-factor authentication protocol for e-Health clouds.
The Journal of Supercomputing, 2016

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Security and Communication Networks, 2016

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Security and Communication Networks, 2016

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Security and Communication Networks, 2016

Robust three-factor remote user authentication scheme with key agreement for multimedia systems.
Security and Communication Networks, 2016

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Security and Communication Networks, 2016

Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
Security and Communication Networks, 2016

A provably secure anonymous authentication scheme for Session Initiation Protocol.
Security and Communication Networks, 2016

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Security and Communication Networks, 2016

Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification.
Peer-to-Peer Networking and Applications, 2016

Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges.
IEEE Network, 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multimedia Tools Appl., 2016

A more secure digital rights management authentication scheme based on smart card.
Multimedia Tools Appl., 2016

Cloud-assisted Industrial Systems and Applications.
MONET, 2016

On the Analysis and Detection of Mobile Botnet Applications.
J. UCS, 2016

Towards native code offloading based MCC frameworks for multimedia applications: A survey.
J. Network and Computer Applications, 2016

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.
J. Network and Computer Applications, 2016

Intrusion response systems: Foundations, design, and challenges.
J. Network and Computer Applications, 2016

Secure and dependable software defined networks.
J. Network and Computer Applications, 2016

A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
J. Medical Systems, 2016

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Systems, 2016

A User Anonymous Mutual Authentication Protocol.
TIIS, 2016

Design of a user anonymous password authentication scheme without smart card.
Int. J. Communication Systems, 2016

Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks.
Int. J. Communication Systems, 2016

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Communications, 2016

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Generation Comp. Syst., 2016

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Computer Networks, 2016

On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc Network.
IEEE Access, 2016

Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis.
IEEE Access, 2016

EHR: Routing Protocol for Energy Harvesting Wireless Sensor Networks.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

2015
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wireless Personal Communications, 2015

Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wireless Personal Communications, 2015

An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography.
Wireless Personal Communications, 2015

A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems.
Security and Communication Networks, 2015

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing.
Security and Communication Networks, 2015

An enhanced privacy preserving remote user authentication scheme with provable security.
Security and Communication Networks, 2015

Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code.
Multimedia Tools Appl., 2015

Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions.
J. Network and Computer Applications, 2015

Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges.
J. Network and Computer Applications, 2015

An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.
J. Medical Systems, 2015

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Systems, 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Systems, 2015

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Systems, 2015

An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks.
Inf. Sci., 2015

Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014.
IJDSN, 2015

A new handover authentication protocol based on bilinear pairing functions for wireless networks.
IJAHUC, 2015

A Comprehensive Study of Email Spam Botnet Detection.
IEEE Communications Surveys and Tutorials, 2015

On the security enhancement of integrated electronic patient records information systems.
Comput. Sci. Inf. Syst., 2015

Securing software defined networks: taxonomy, requirements, and open issues.
IEEE Communications Magazine, 2015

A framework to address inconstant user requirements in cloud SLAs management.
Cluster Computing, 2015

User authentication schemes for wireless sensor networks: A review.
Ad Hoc Networks, 2015

A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.
Proceedings of the Security and Privacy in Communication Networks, 2015

An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs.
Wireless Personal Communications, 2014

Attack containment in mobile ad-hoc networks through fair distribution of processing resources.
Telecommunication Systems, 2014

Interactive Artificial Bee Colony Supported Passive Continuous Authentication System.
IEEE Systems Journal, 2014

A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion.
Security and Communication Networks, 2014

More secure smart card-based remote user password authentication scheme with user anonymity.
Security and Communication Networks, 2014

An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.
Security and Communication Networks, 2014

Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems".
Security and Communication Networks, 2014

An adaptive watermarking scheme for e-government document images.
Multimedia Tools Appl., 2014

A review on remote data auditing in single cloud server: Taxonomy and open issues.
J. Network and Computer Applications, 2014

Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System.
J. Medical Systems, 2014

Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce.
J. Medical Systems, 2014

Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Systems, 2014

Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems.
J. Medical Systems, 2014

Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition.
Neurocomputing, 2014

On the Security of a RSA-based Certificateless Signature Scheme.
I. J. Network Security, 2014

An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks.
IJDSN, 2014

Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'.
Int. J. Communication Systems, 2014

More efficient key-hash based fingerprint remote authentication scheme using mobile device.
Computing, 2014

An improved remote user authentication scheme with key agreement.
Computers & Electrical Engineering, 2014

Binary Artificial Bee Colony optimization using bitwise operation.
Computers & Industrial Engineering, 2014

Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint Preprocessing.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

DWT+LSB-based fragile watermarking method for digital Quran images.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Notes on "a password-based remote user authentication scheme without smart card".
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Spam Trapping System: Novel security framework to fight against spam botnets.
Proceedings of the 21st International Conference on Telecommunications, 2014

Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

2013
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET.
IEEE Trans. Information Forensics and Security, 2013

Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network.
Telecommunication Systems, 2013

Editorial - Chaotic cryptography and its applications in telecommunication systems.
Telecommunication Systems, 2013

Anonymous two-factor authentication for consumer roaming service in global mobility networks.
IEEE Trans. Consumer Electronics, 2013

A blind image copyright protection scheme for e-government.
J. Visual Communication and Image Representation, 2013

Using Sorted Switching Median Filter to remove high-density impulse noises.
J. Visual Communication and Image Representation, 2013

A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata.
J. Network and Computer Applications, 2013

An enhanced smart card based remote user password authentication scheme.
J. Network and Computer Applications, 2013

Temporal, Delegable and Cheap Update Access control to published XML Documents.
JCS, 2013

Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles.
TIIS, 2013

Cryptanalysis of a key agreement protocol based on chaotic Hash.
IJESDF, 2013

On the security of an authentication scheme for multi-server architecture.
IJESDF, 2013

Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks.
IJDSN, 2013

An Efficient Binary Differential Evolution with Parameter Adaptation.
Int. J. Comput. Intell. Syst., 2013

Cyber security using arabic captcha scheme.
Int. Arab J. Inf. Technol., 2013

Lattice-based signcryption.
Concurrency and Computation: Practice and Experience, 2013

Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard".
Proceedings of the 12th IEEE International Conference on Trust, 2013

Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Authentication and Tamper Detection of Digital Holy Quran Images.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Core-Point Detection on Camera-Based Fingerprint Image.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme".
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2013

2012
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography.
Security and Communication Networks, 2012

Mobile one-time passwords: two-factor authentication using mobile phones.
Security and Communication Networks, 2012

Analysis of existing remote attestation techniques.
Security and Communication Networks, 2012

Identity-based online/offline signcryption for low power devices.
J. Network and Computer Applications, 2012

Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'.
J. Medical Systems, 2012

An Authentication Scheme for Secure Access to Healthcare Services.
J. Medical Systems, 2012

Study on the common criteria methodology for secure ubiquitous environment construction.
J. Intelligent Manufacturing, 2012

Copyright Protection for E-Government Document Images.
IEEE MultiMedia, 2012

Intrinsic authentication of multimedia objects using biometric data manipulation.
Int. Arab J. Inf. Technol., 2012

Adaptively weighted sub-directional two-dimensional linear discriminant analysis for face recognition.
Future Generation Comp. Syst., 2012

A biometric identity-based signcryption scheme.
Future Generation Comp. Syst., 2012

High performance biometrics recognition algorithms and systems.
Future Generation Comp. Syst., 2012

A blind reversible method for watermarking relational databases based on a time-stamping protocol.
Expert Syst. Appl., 2012

Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

Detecting counterfeit-money using RFID-enabled mobile devices.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol".
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

Further cryptanalysis of 'A remote authentication scheme using mobile device'.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
Energy Efficient Distributed Face Recognition in Wireless Sensor Network.
Wireless Personal Communications, 2011

Privacy-preserving and tokenless chaotic revocable face authentication scheme.
Telecommunication Systems, 2011

Guest editorial for special issue on biometric systems and applications.
Telecommunication Systems, 2011

Steganalysis for palette-based images using generalized difference image and color correlogram.
Signal Processing, 2011

Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks.
Sensors, 2011

Statistical analysis of several reversible data hiding algorithms.
Multimedia Tools Appl., 2011

Research advances in data hiding for multimedia security.
Multimedia Tools Appl., 2011

3D block-based medial axis transform and chessboard distance transform based on dominance.
Image Vision Comput., 2011

An effective memetic differential evolution algorithm based on chaotic local search.
Inf. Sci., 2011

Challenge-response-based biometric image scrambling for secure personal identification.
Future Generation Comp. Syst., 2011

An efficient wavelet-tree-based watermarking method.
Expert Syst. Appl., 2011

A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization.
Expert Syst. Appl., 2011

Mutual funds trading strategy based on particle swarm optimization.
Expert Syst. Appl., 2011

MTPSO algorithm for solving planar graph coloring problem.
Expert Syst. Appl., 2011

An efficient phishing webpage detector.
Expert Syst. Appl., 2011

A fast RFID tag identification algorithm based on counter and stack.
Expert Syst. Appl., 2011

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'.
Computer Communications, 2011

A hybrid particle swarm optimization algorithm for high-dimensional problems.
Computers & Industrial Engineering, 2011

A Framework for Detecting Malformed SMS Attack.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Embedding High Capacity Covert Channels in Short Message Service (SMS).
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Information Security Awareness Campaign: An Alternate Approach.
Proceedings of the Information Security and Assurance - International Conference, 2011

Secure Instant Messaging Protocol for Centralized Communication Group.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

OTP-Based Two-Factor Authentication Using Mobile Phones.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Application of evolutionary algorithms in detecting SMS spam at access layer.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

Polymorphic Malware Detection Using Hierarchical Hidden Markov Model.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Biometric driven initiative system for passive continuous authentication.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'.
Sensors, 2010

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem.
Sensors, 2010

Performance evaluation of score level fusion in multimodal biometric systems.
Pattern Recognition, 2010

Special issue on: Recent advances and future directions in biometrics personal identification.
J. Network and Computer Applications, 2010

Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing.
IEICE Transactions, 2010

Improvement of the Efficient Secret Broadcast Scheme.
IEICE Transactions, 2010

Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals.
Digital Signal Processing, 2010

Fingerprint verification using statistical descriptors.
Digital Signal Processing, 2010

Chaos-based secure satellite imagery cryptosystem.
Computers & Mathematics with Applications, 2010

Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Security Analysis of Firewall Rule Sets in Computer Networks.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010

Contactless Biometrics in Wireless Sensor Network: A Survey.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Using Arabic CAPTCHA for Cyber Security.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

One-Time Password System with Infinite Nested Hash Chains.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Face Recognition using Layered Linear Discriminant Analysis and Small Subspace.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'.
Proceedings of the Third International Conference on Network and System Security, 2009

Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding).
Proceedings of the Bio-Science and Bio-Technology, 2009

Bio-chaotic Stream Cipher-Based Iris Image Encryption.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Multimodal face and fingerprint biometrics authentication on space-limited tokens.
Neurocomputing, 2008

2007
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards.
Computer Standards & Interfaces, 2007

Improving the security of 'a flexible biometrics remote user authentication scheme'.
Computer Standards & Interfaces, 2007

An Intelligent Fingerprint-Biometric Image Scrambling Scheme.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007

Robust Hiding of Fingerprint-Biometric Data into Audio Signals.
Proceedings of the Advances in Biometrics, International Conference, 2007

2006
Intelligent Transportation Systems.
IEEE Pervasive Computing, 2006

Pointing a Finger toward Standardized and Automated Biometrics.
IEEE MultiMedia, 2006

An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards.
Proceedings of the Information Security Practice and Experience, 2006

Enhancing the Transmission Security of Content-Based Hidden Biometric Data.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

2005
Securing Biometric Templates for Reliable Identity Authentication.
Proceedings of the Advances in Intelligent Computing, 2005

2004
Protecting Biometric Data for Personal Identification.
Proceedings of the Advances in Biometric Person Authentication, 2004


  Loading...