|
Search the dblp DataBase
Muhammad Khurram Khan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Muhammad Khurram Khan, Jiashu Zhang
Securing Biometric Templates for Reliable Identity Authentication. [Citation Graph (0, 0)][DBLP] ICIC (2), 2005, pp:723-732 [Conf]
- Muhammad Khurram Khan, Jiashu Zhang
Enhancing the Transmission Security of Content-Based Hidden Biometric Data. [Citation Graph (0, 0)][DBLP] ISNN (2), 2006, pp:214-223 [Conf]
- Muhammad Khurram Khan, Jiashu Zhang
An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:260-268 [Conf]
- Muhammad Khurram Khan, Jiashu Zhang, Lei Tian
Protecting Biometric Data for Personal Identification. [Citation Graph (0, 0)][DBLP] SINOBIOMETRICS, 2004, pp:629-638 [Conf]
- Muhammad Khurram Khan, Ling Xie, Jiashu Zhang
Robust Hiding of Fingerprint-Biometric Data into Audio Signals. [Citation Graph (0, 0)][DBLP] ICB, 2007, pp:702-712 [Conf]
- Muhammad Khurram Khan, Jiashu Zhang
An Intelligent Fingerprint-Biometric Image Scrambling Scheme. [Citation Graph (0, 0)][DBLP] ICIC (2), 2007, pp:1141-1151 [Conf]
Face Recognition using Layered Linear Discriminant Analysis and Small Subspace. [Citation Graph (, )][DBLP]
Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. [Citation Graph (, )][DBLP]
Bio-chaotic Stream Cipher-Based Iris Image Encryption. [Citation Graph (, )][DBLP]
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'. [Citation Graph (, )][DBLP]
Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|