DSpace

King Saud University Repository >

Browsing by Author "Maqsood Mahmud"

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   
Sort by: In order: Results/Page Authors/Record:
Showing results 1 to 19 of 19
Issue DateTitleAuthor(s)
2009 Bio-chaotic Stream Cipher-Based Iris Image EncryptionDr. Abdullah S. Alghamdi; Maqsood Mahmud; Muhammad Khurram Khan
2009 Bio-Chaotic Stream Cipher-Based Iris Image EncryptionAbdullah Alghamdi; Maqsood Mahmud; Muhammad Khurram Khan
2009 Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding)Maqsood Mahmud; Hanif Ullah; Muhammad Khurram Khan; Khaled Alghathbar
2010 Currencies Analysis Based on Stability: Using Apriori-AlgorithmHameed Ullah Khan; Zahid Ullah; Maqsood Mahmud
2010 Currencies Analysis Based on Stability: Using Apriori-AlgorithmHameed Ullah Khan; , Zahid Ullah; Maqsood Mahmud
2010 Currency Analysis on the Basis of Fluctuation in the Rates using Data mining Techniques (Apriori-Algorithm)Khan.H.U; Maqsood Mahmud
2009 Data Mining Strategies and Methods to Develop Microfinance Market - Use Case Currency ExchangeMaqsood Mahmud; Ullah.Z
2009 Data Mining Strategies and Methods to Develop Microfinance Market – Use Case Currency ExchangeHameed Ullah Khan; Zahid Ullah; Maqsood Mahmud
2009 Data Mining Strategies and Methods to Develop Microfinance Market – Use Case Currency ExchangeHameed Ullah Khan; Zahid Ullah; Maqsood Mahmud
2010 Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy ConservationMaqsood Mahmud; Abdul Hanan Abdullah; Yazid bin Idris
2010 Intrinsic Authentication of Multimedia Objects using Biometric Data ManipulationMaqsood Mahmud; Muhammad Khurram Khan; Khaled S. Alghathbar
2009 Micro Business of Currency Conversion using Data Mining TechniquesUllah.Z; Maqsood Mahmud
2009 Micro Business of Currency Conversion using Data Mining TechniquesMaqsood Mahmud; Zahid Ullah; Hameed Ullah Khan
2009 Micro Business of Currency Conversion using Data Mining TechniquesHameed Ullah Khan; Zahid Ullah; Maqsood Mahmud
2008 Most Known vulnerabilities in Saudi Arabian web serversKhaled Alghathbar; Maqsood Mahmud; Hanif Ullah
2008 NATURAL LANGUAGE DEPENDENT STREAM CIPHERSMaqsood Mahmud
2008 Natural Language (ARABIC) as a Strengthening Layer for Stream Ciphers in Wireless NetworksMaqsood Mahmud
2010 Security Analysis of Firewall Rule Sets in Computer NetworksMaqsood Mahmud; Muhammad Khurram Khan; Khaled S. Alghathbar
2010 Systems and Methods for Improving a Cryptosystem using BiometricsMaqsood Mahmud; Muhammad Khurram Khan; Khaled S. Alghathbar
Showing results 1 to 19 of 19

 

DSpace Software Copyright © 2002-2007 MIT and Hewlett-Packard - Feedback