King Saud University Repository >

Browsing by Author "Khaled Alghathbar"

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   
Sort by: In order: Results/Page Authors/Record:
Showing results 20 to 39 of 39
< previous 
Issue DateTitleAuthor(s)
2004 Incorporating Access Control Policies in Requirements EngineeringKhaled Alghathbar; Duminda Wijesekera
2010 Issues of Secuity and Network Load in Presence- A SurveyZeeshan Shafi Khan; Khaled Alghathbar; Khalid Rashid; Muhammad Sher
2003 Modeling Dynamic Role-based Access Constraints using the UMLKhaled Alghathbar; Wijesekera
2008 Most Known vulnerabilities in Saudi Arabian web serversKhaled Alghathbar; Maqsood Mahmud; Hanif Ullah
2009 Motion Estimation Analysis for Unsupervised Training for Lip Reading User Authentication SystemsHanan Mahmoud; Khaled Alghathbar; Khaled Bin Muhaya
2009 Motion estimation analysis for unsupervised training for lip reading user authentication systemsHanan A. Mahmoud; Khaled Alghathbar; Fahad Bin Muhaya
2010 NMACA Approach Used to Build a Secure Message Authentication CodeRaed Alosaimy; Khaled Alghathbar; Alaaeldin M. Hafez; Mohamed H. Eldefrawy
2009 NMACA: A Novel Methodology for Message Authentication Code AlgorithmsKhaled Alghathbar; , Alaaeldin M. Hafez; Fahad Bin Muhaya
2011 A Novel Stegnosystem Design for Defying Differential Power Analysis Attacks on Smart CardsHanan Mahmoud; Khaled Alghathbar; Alaaeldin Hafez
2010 One-Time Password System with Infinite Nested Hash ChainsMohamed Hamdy Eldefrawy; Muhammad Khurram Khan; Khaled Alghathbar
2008 Practical ERP Implementation in Government OrganizationKhaled Alghathbar
2009 Privacy-Preserving and Tokenless Chaotic Revocable Face Authentication SchemeMuhammad Khurram Khan; Khaled Alghathbar
2011 Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor NetworksXianfeng Guo; Jiashu Zhang; Muhammad Khurram Khan; Khaled Alghathbar
2011 Secure Instant Messaging Protocol for Centralized Communication GroupMohamed Hamdy Eldefrawy; Khaled Alghathbar; Muhammad Khurram Khan
2010 Secure Single Packet IP Traceback Mechanism to Identify the SourceKhaled Alghathbar; Muhammad khurram khan
2006 Securing UML Information Flow Using FlowUMLKhaled Alghathbar; Csilla Farkas; Duminda Wijesekera
2010 Security Analysis of ‘Two-Factor User Authentication in Wireless Sensor Networks’Muhammad Khurram Khan, et al
2010 Security Analysis of Firewall Rule Sets in Computer NetworksKhaled Alghathbar, et al
2010 Using Arabic CAPTCHA for Cyber SecurityBilal khan, et al
2007 Validating the Enforcement of Access Control Policies and Separation of Duty Principle in Requirement EngineeringKhaled Alghathbar
Showing results 20 to 39 of 39
< previous 


DSpace Software Copyright © 2002-2007 MIT and Hewlett-Packard - Feedback