default search action
Khaled Alghathbar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j21]Farzana Azam, Zeeshan Shafi Khan, Muhammad Sher, Khaled Alghathbar, Muhammad Khurram Khan:
Attack containment in mobile ad-hoc networks through fair distribution of processing resources. Telecommun. Syst. 55(1): 93-103 (2014) - 2013
- [j20]Ghulam Muhammad, Khaled Alghathbar:
Environment recognition for digital audio forensics using MPEG-7 and mel cepstral features. Int. Arab J. Inf. Technol. 10(1): 43-50 (2013) - [j19]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji:
Cyber security using arabic captcha scheme. Int. Arab J. Inf. Technol. 10(1): 76-84 (2013) - [j18]Xiaomin Wang, Wei Guo, Wenfang Zhang, Muhammad Khurram Khan, Khaled Alghathbar:
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network. Telecommun. Syst. 52(2): 515-524 (2013) - [c39]Amal Alsubaih, Alaaeldin M. Hafez, Khaled Alghathbar:
Authorization as a Service in Cloud Environments. CGC 2013: 487-493 - 2012
- [j17]Khaled Alghathbar:
Representing access control policies in use case. Int. Arab J. Inf. Technol. 9(3): 268-275 (2012) - [j16]Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Abdullah, Mohammad Yazid Bin Idris:
Intrinsic authentication of multimedia objects using biometric data manipulation. Int. Arab J. Inf. Technol. 9(4): 336-342 (2012) - [j15]Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi:
Identity-based online/offline signcryption for low power devices. J. Netw. Comput. Appl. 35(1): 340-347 (2012) - [j14]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Tai-Hoon Kim, Hassan M. Elkamchouchi:
Mobile one-time passwords: two-factor authentication using mobile phones. Secur. Commun. Networks 5(5): 508-516 (2012) - [j13]Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan, Khaled Alghathbar:
Analysis of existing remote attestation techniques. Secur. Commun. Networks 5(9): 1062-1082 (2012) - [c38]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan:
Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes. ISBAST 2012: 77-81 - 2011
- [j12]Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar:
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'. Comput. Commun. 34(3): 305-309 (2011) - [j11]Muhammad Khurram Khan, Jiashu Zhang, Khaled Alghathbar:
Challenge-response-based biometric image scrambling for secure personal identification. Future Gener. Comput. Syst. 27(4): 411-418 (2011) - [j10]Xianfeng Guo, Jiashu Zhang, Muhammad Khurram Khan, Khaled Alghathbar:
Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks. Sensors 11(2): 1607-1619 (2011) - [j9]Muhammad Khurram Khan, Khaled Alghathbar, Jiashu Zhang:
Privacy-preserving and tokenless chaotic revocable face authentication scheme. Telecommun. Syst. 47(3-4): 227-234 (2011) - [j8]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Jong Hyuk Park:
Energy Efficient Distributed Face Recognition in Wireless Sensor Network. Wirel. Pers. Commun. 60(3): 571-582 (2011) - [c37]Lu Leng, Jiashu Zhang, Gao Chen, Muhammad Khurram Khan, Khaled Alghathbar:
Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition. ICCSA (5) 2011: 458-470 - [c36]Waleed Halboob, Muhammad Abulaish, Khaled Alghathbar:
Quaternary privacy-levels preservation in computer forensics investigation process. ICITST 2011: 777-782 - [c35]Tarique Anwar, Muhammad Abulaish, Khaled Alghathbar:
Web content mining for alias identification: A first step towards suspect tracking. ISI 2011: 195-197 - [c34]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan:
OTP-Based Two-Factor Authentication Using Mobile Phones. ITNG 2011: 327-331 - [c33]M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar:
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms. ITNG 2011: 559-563 - [c32]Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, Hassan M. Elkamchouchi:
Secure Instant Messaging Protocol for Centralized Communication Group. NTMS 2011: 1-4 - [c31]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan:
Information Security Awareness Campaign: An Alternate Approach. ISA 2011: 1-10 - [c30]M. Zubair Rafique, Muhammad Khurram Khan, Khaled Alghathbar, Muddassar Farooq:
Embedding High Capacity Covert Channels in Short Message Service (SMS). STA 2011: 1-10 - [c29]M. Zubair Rafique, Muhammad Khurram Khan, Khaled Alghathbar, Muddassar Farooq:
A Framework for Detecting Malformed SMS Attack. STA 2011: 11-20 - [c28]Azeddine Chikh, Muhammad Abulaish, Syed Irfan Nabi, Khaled Alghathbar:
An Ontology Based Information Security Requirements Engineering Framework. STA 2011: 139-146 - [c27]Muhammad Abulaish, Syed Irfan Nabi, Khaled Alghathbar, Azeddine Chikh:
SIMOnt: A Security Information Management Ontology Framework. STA 2011: 201-208 - 2010
- [j7]Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee:
Chaos-based secure satellite imagery cryptosystem. Comput. Math. Appl. 60(2): 326-337 (2010) - [j6]Muhammad Khurram Khan, Khaled Alghathbar:
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'. Sensors 10(3): 2450-2459 (2010) - [j5]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Eun-suk Cho:
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem. Sensors 10(9): 8683-8695 (2010) - [c26]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf:
Face Recognition using Layered Linear Discriminant Analysis and Small Subspace. CIT 2010: 1407-1412 - [c25]Hanan A. Mahmoud, Khaled Alghathbar:
Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cards. IAS 2010: 52-55 - [c24]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji:
Using Arabic CAPTCHA for Cyber Security. FGIT-SecTech/DRBC 2010: 8-17 - [c23]Syed Irfan Nabi, Abdulrahman A. Mirza, Khaled Alghathbar:
Information Assurance in Saudi Organizations - An Empirical Study. FGIT-SecTech/DRBC 2010: 18-28 - [c22]Syed Irfan Nabi, Syed Waqar Nabi, Syed Awais Ahmed Tipu, Bushra Haqqi, Zahra Abid, Khaled Alghathbar:
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan. FGIT-SecTech/DRBC 2010: 47-56 - [c21]Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar:
One-Time Password System with Infinite Nested Hash Chains. FGIT-SecTech/DRBC 2010: 161-170 - [c20]Zeeshan Shafi Khan, Khaled Alghathbar, Muhammad Sher, Khalid Rashid:
Issues of Security and Network Load in Presence - A Survey. FGIT-SecTech/DRBC 2010: 224-230 - [c19]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar:
Contactless Biometrics in Wireless Sensor Network: A Survey. FGIT-SecTech/DRBC 2010: 236-243 - [c18]Raed Alosaimy, Khaled Alghathbar, Alaaeldin M. Hafez, Mohamed Hamdy Eldefrawy:
NMACA Approach Used to Build a Secure Message Authentication Code. FGIT-SecTech/DRBC 2010: 290-298 - [c17]Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad Sher, Rashid Mehmood:
Secure single packet IP Traceback mechanism to identify the source. ICITST 2010: 1-5 - [c16]Lu Leng, Jiashu Zhang, Jing Xu, Muhammad Khurram Khan, Khaled Alghathbar:
Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. ICTC 2010: 467-471 - [c15]Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar:
Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset. IIH-MSP 2010: 384-388 - [c14]Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar:
Security Analysis of Firewall Rule Sets in Computer Networks. SECURWARE 2010: 51-56 - [c13]Muhammad Khurram Khan, Khaled Alghathbar:
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'. AST/UCMA/ISA/ACN 2010: 55-60
2000 – 2009
- 2009
- [j4]Mona F. M. Mursi, Ghazy M. R. Assassa, Abeer S. Al-Humaimeedy, Khaled Alghathbar:
Face Detection and Count Estimates in Surveillance Color Images. Egypt. Comput. Sci. J. 31(2) (2009) - [c12]Hisham A. Kholidy, Khaled Alghathbar:
A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" Data. IAS 2009: 617-622 - [c11]Khaled Alghathbar, Hanan A. Mahmoud:
Noisy password scheme: A new one time password system. CCECE 2009: 841-846 - [c10]Abdulrahman A. Mirza, Khaled Alghathbar:
Acceptance and Applications of Smart Cards Technology in University Settings. DASC 2009: 746-748 - [c9]Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar:
Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding). FGIT-BSBT 2009: 97-107 - [c8]Khaled Alghathbar:
Low power design for silent pass authentication system. ICITST 2009: 1 - [c7]Khaled Alghathbar, Hanan A. Mahmoud:
Noisy password security technique. ICITST 2009: 1-5 - [c6]Khaled Alghathbar:
Enhancement of Use Case Diagram to Capture Authorization Requirements. ICSEA 2009: 394-400 - 2008
- [j3]Khaled Alghathbar, Duminda Wijesekera:
Enforcing Security Policies in Requirements Engineering Using AFUML. Int. J. Comput. Their Appl. 15(4): 237-251 (2008) - [c5]Khaled Alghathbar:
Practical ERP Implementation in Government Organization. CSREA EEE 2008: 343-349 - 2007
- [j2]Khaled Alghathbar:
Validating the enforcement of access control policies and separation of duty principle in requirement engineering. Inf. Softw. Technol. 49(2): 142-157 (2007) - 2006
- [j1]Khaled Alghathbar, Csilla Farkas, Duminda Wijesekera:
Securing UML Information Flow Using FlowUML. J. Res. Pract. Inf. Technol. 38(1) (2006) - 2005
- [c4]Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas:
Secure UML Information Flow using FlowUML. WOSIS 2005: 229-238 - 2004
- [c3]Khaled Alghathbar, Duminda Wijesekera:
Analyzing Information Flow Control Policies in Requirements Engineering. POLICY 2004: 193-196 - 2003
- [c2]Khaled Alghathbar, Duminda Wijesekera:
authUML: a three-phased framework to analyze access control specifications in use cases. FMSE 2003: 77-86 - [c1]Khaled Alghathbar, Duminda Wijesekera:
Consistent and Complete Access Control Policies in Use Cases. UML 2003: 373-387
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint