Khaled Alghathbar
According to our database1,
Khaled Alghathbar
authored at least 60 papers
between 2003 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
Attack containment in mobile ad-hoc networks through fair distribution of processing resources.
Telecommun. Syst., 2014
2013
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network.
Telecommun. Syst., 2013
Environment recognition for digital audio forensics using MPEG-7 and mel cepstral features.
Int. Arab J. Inf. Technol., 2013
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013
2012
Secur. Commun. Networks, 2012
J. Netw. Comput. Appl., 2012
Int. Arab J. Inf. Technol., 2012
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012
2011
Wirel. Pers. Commun., 2011
Telecommun. Syst., 2011
Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks.
Sensors, 2011
Challenge-response-based biometric image scrambling for secure personal identification.
Future Gener. Comput. Syst., 2011
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'.
Comput. Commun., 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Information Security and Assurance - International Conference, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
2010
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'.
Sensors, 2010
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem.
Sensors, 2010
Proceedings of the Advances in Computer Science and Information Technology, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cards.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Egypt. Comput. Sci. J., 2009
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding).
Proceedings of the Bio-Science and Bio-Technology, 2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009
A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" Data.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Enforcing Security Policies in Requirements Engineering Using AFUML.
Int. J. Comput. Their Appl., 2008
Practical ERP Implementation in Government Organization.
Proceedings of the 2008 International Conference on E-Learning, 2008
2007
Validating the enforcement of access control policies and separation of duty principle in requirement engineering.
Inf. Softw. Technol., 2007
2006
2005
Secure UML Information Flow using FlowUML.
Proceedings of the Security in Information Systems, 2005
2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
2003
Proceedings of the «UML» 2003, 2003
authUML: a three-phased framework to analyze access control specifications in use cases.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003