DSpace

King Saud University Repository >

Browsing by Author "Khaled Alghathbar"

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   
Sort by: In order: Results/Page Authors/Record:
Showing results 20 to 39 of 39
< previous 
Issue DateTitleAuthor(s)
2004 Incorporating Access Control Policies in Requirements EngineeringKhaled Alghathbar; Duminda Wijesekera
2010 Issues of Secuity and Network Load in Presence- A SurveyZeeshan Shafi Khan; Khaled Alghathbar; Khalid Rashid; Muhammad Sher
2003 Modeling Dynamic Role-based Access Constraints using the UMLKhaled Alghathbar; Wijesekera
2008 Most Known vulnerabilities in Saudi Arabian web serversKhaled Alghathbar; Maqsood Mahmud; Hanif Ullah
2009 Motion Estimation Analysis for Unsupervised Training for Lip Reading User Authentication SystemsHanan Mahmoud; Khaled Alghathbar; Khaled Bin Muhaya
2009 Motion estimation analysis for unsupervised training for lip reading user authentication systemsHanan A. Mahmoud; Khaled Alghathbar; Fahad Bin Muhaya
2010 NMACA Approach Used to Build a Secure Message Authentication CodeRaed Alosaimy; Khaled Alghathbar; Alaaeldin M. Hafez; Mohamed H. Eldefrawy
2009 NMACA: A Novel Methodology for Message Authentication Code AlgorithmsKhaled Alghathbar; , Alaaeldin M. Hafez; Fahad Bin Muhaya
2011 A Novel Stegnosystem Design for Defying Differential Power Analysis Attacks on Smart CardsHanan Mahmoud; Khaled Alghathbar; Alaaeldin Hafez
2010 One-Time Password System with Infinite Nested Hash ChainsMohamed Hamdy Eldefrawy; Muhammad Khurram Khan; Khaled Alghathbar
2008 Practical ERP Implementation in Government OrganizationKhaled Alghathbar
2009 Privacy-Preserving and Tokenless Chaotic Revocable Face Authentication SchemeMuhammad Khurram Khan; Khaled Alghathbar
2011 Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor NetworksXianfeng Guo; Jiashu Zhang; Muhammad Khurram Khan; Khaled Alghathbar
2011 Secure Instant Messaging Protocol for Centralized Communication GroupMohamed Hamdy Eldefrawy; Khaled Alghathbar; Muhammad Khurram Khan
2010 Secure Single Packet IP Traceback Mechanism to Identify the SourceKhaled Alghathbar; Muhammad khurram khan
2006 Securing UML Information Flow Using FlowUMLKhaled Alghathbar; Csilla Farkas; Duminda Wijesekera
2010 Security Analysis of ‘Two-Factor User Authentication in Wireless Sensor Networks’Muhammad Khurram Khan; Khaled Alghathbar
2010 Security Analysis of Firewall Rule Sets in Computer NetworksKhaled Alghathbar; Muhammad khurram khan; Abdullah AlKelabi
2010 Using Arabic CAPTCHA for Cyber SecurityBilal khan; Khaled Alghathbar; Muhammad khurram khan; Abdullah AlKelabi
2007 Validating the Enforcement of Access Control Policies and Separation of Duty Principle in Requirement EngineeringKhaled Alghathbar
Showing results 20 to 39 of 39
< previous 

 

DSpace Software Copyright © 2002-2007 MIT and Hewlett-Packard - Feedback