DSpace

King Saud University Repository >

Browsing by Author "Muhammad Khurram Khan"

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   
Sort by: In order: Results/Page Authors/Record:
Showing results 12 to 31 of 31
< previous 
Issue DateTitleAuthor(s)
2010 Dynamic Weighted discrimination Power Analysis in DCT Domain for Face and Palmprint RecognitionL. Leng; Muhammad Khurram Khan; Khaled Alghathbar
2010 Face Recognition using Layered Linear Discriminant Analysis and Small SubspaceMuhammad Imran; Rubiyah Yousaf; Muhammad Khurram Khan; Khaled Alghathbar
2009 Fingerprint Biometric-based Self and Deniable Authentication Schemes for the Electronic WorldMuhammad Khurram Khan
2010 Fingerprint Verification Based on Statistical AnalysisM. S. Khalil; D. Muhammad; Muhammad Khurram Khan; Khaled Alghathbar; Khaled Alghathbar
2009 Fingerprint Verification using Fingerprint TextureMuhammad Khurram Khan
2010 Fingerprint Verification using Statistical DescriptorsMuhammad Khurram Khan
2010 Intrinsic Authentication of Multimedia Objects using Biometric Data ManipulationMaqsood Mahmud; Muhammad Khurram Khan; Khaled S. Alghathbar
2010 One-Time Password System with Infinite Nested Hash ChainsMohamed Hamdy Eldefrawy; Muhammad Khurram Khan; Khaled Alghathbar
2010 Performance Evaluation of Score Level Fusion in Multimodal Biometric SystemsMuhammad Khurram Khan
2009 Privacy-Preserving and Tokenless Chaotic Revocable Face Authentication SchemeMuhammad Khurram Khan; Khaled Alghathbar
2011 Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor NetworksXianfeng Guo; Jiashu Zhang; Muhammad Khurram Khan; Khaled Alghathbar
2011 Secure Instant Messaging Protocol for Centralized Communication GroupMohamed Hamdy Eldefrawy; Khaled Alghathbar; Muhammad Khurram Khan
2010 Secure Single Packet IP Traceback Mechanism to Identify the SourceKhaled Alghathbar; Muhammad khurram khan
2010 Security Analysis of ‘Two-Factor User Authentication in Wireless Sensor Networks’Muhammad Khurram Khan; Khaled Alghathbar
2010 Security Analysis of Firewall Rule Sets in Computer NetworksMaqsood Mahmud; Muhammad Khurram Khan; Khaled S. Alghathbar
2010 Security Analysis of Firewall Rule Sets in Computer NetworksKhaled Alghathbar; Muhammad khurram khan; Abdullah AlKelabi
2009 Statistical analysis of several reversible data hiding algorithmsMuhammad Khurram Khan
2009 Study on the Common Criteria Methodology for Secure Ubiquitous Environment ConstructionMuhammad Khurram Khan
2010 Systems and Methods for Improving a Cryptosystem using BiometricsMaqsood Mahmud; Muhammad Khurram Khan; Khaled S. Alghathbar
2010 Using Arabic CAPTCHA for Cyber SecurityBilal khan; Khaled Alghathbar; Muhammad khurram khan; Abdullah AlKelabi
Showing results 12 to 31 of 31
< previous 

 

DSpace Software Copyright © 2002-2007 MIT and Hewlett-Packard - Feedback