The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Muhammad Khurram Khan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Muhammad Khurram Khan, Jiashu Zhang
    Securing Biometric Templates for Reliable Identity Authentication. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:723-732 [Conf]
  2. Muhammad Khurram Khan, Jiashu Zhang
    Enhancing the Transmission Security of Content-Based Hidden Biometric Data. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:214-223 [Conf]
  3. Muhammad Khurram Khan, Jiashu Zhang
    An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:260-268 [Conf]
  4. Muhammad Khurram Khan, Jiashu Zhang, Lei Tian
    Protecting Biometric Data for Personal Identification. [Citation Graph (0, 0)][DBLP]
    SINOBIOMETRICS, 2004, pp:629-638 [Conf]
  5. Muhammad Khurram Khan, Ling Xie, Jiashu Zhang
    Robust Hiding of Fingerprint-Biometric Data into Audio Signals. [Citation Graph (0, 0)][DBLP]
    ICB, 2007, pp:702-712 [Conf]
  6. Muhammad Khurram Khan, Jiashu Zhang
    An Intelligent Fingerprint-Biometric Image Scrambling Scheme. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2007, pp:1141-1151 [Conf]

  7. Face Recognition using Layered Linear Discriminant Analysis and Small Subspace. [Citation Graph (, )][DBLP]


  8. Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. [Citation Graph (, )][DBLP]


  9. Bio-chaotic Stream Cipher-Based Iris Image Encryption. [Citation Graph (, )][DBLP]


  10. Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'. [Citation Graph (, )][DBLP]


  11. Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002