Obserwuj
Esam Khan
Esam Khan
Umm Al-Qura University - The Custodian of the Two Holy Mosques Institute for Hajj & Umrah Research
Zweryfikowany adres z uqu.edu.sa
Tytuł
Cytowane przez
Cytowane przez
Rok
Counting-based secret sharing technique for multimedia applications
A Gutub, N Al-Juaid, E Khan
Multimedia Tools and Applications 78, 5591-5619, 2019
1772019
An analytical study of mobile applications for Hajj and Umrah services
EA Khan, MKY Shambour
Applied computing and informatics 14 (1), 37-47, 2018
862018
A geometric-primitives-based compression scheme for testing systems-on-a-chip
A El-Maleh, S Al Zahir, E Khan
Proceedings 19th IEEE VLSI Test Symposium. VTS 2001, 54-59, 2001
832001
Enhancing PC data security via combining RSA cryptography and video based steganography
NA Al-Juaid, AA Gutub, EA Khan
Journal of Information Security and Cybercrimes Research 1 (1), 5-13, 2018
722018
Inclusion of unicode standard seamless characters to expand Arabic text steganography for secure individual uses
N Alanazi, E Khan, A Gutub
Journal of King Saud University-Computer and Information Sciences 34 (4 …, 2022
352022
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
N Alanazi, E Khan, A Gutub
Multimedia Tools and Applications 80, 1403-1431, 2021
342021
Design and performance analysis of a unified, reconfigurable HMAC-Hash unit
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
IEEE Transactions on Circuits and Systems I: Regular Papers 54 (12), 2683-2695, 2007
342007
Stego-system for hiding text in images of personal computers
N Alotaibi, A Gutub, E Khan
The 12th learning and technology conference: wearable tech/wearable learning …, 2015
232015
Using subthreshold SRAM to design low-power crypto hardware
A Gutub, E Khan
International Journal of New Computer Architectures and their Applications …, 2011
192011
Network processors for communication security: a review
E Khan, MW El-Kharashi, ANME Rafiq, F Gebali, M Abd-El-Barr
2003 IEEE Pacific Rim Conference on Communications Computers and Signal …, 2003
162003
Using Arabic poetry system for steganography
E Khan
Asian Journal of Computer Science and Information Technology 4 (6), 55-61, 2014
142014
An RFID-based system for pilgrim management in king abdul aziz international airport
EA Khan
2011 International Conference on Information Management, Innovation …, 2011
142011
Functionality-improved Arabic text steganography based on unicode features
N Alanazi, E Khan, A Gutub
Arabian Journal for Science and Engineering 45, 11037-11050, 2020
132020
An FPGA design of a unified hash engine for IPSec authentication
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
Fifth International Workshop on System-on-Chip for Real-Time Applications …, 2005
132005
Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations
N Alanazi, E Khan, A Gutub
Arabian Journal for Science and Engineering 46 (9), 8869-8885, 2021
112021
An analytical study of mobile applications for Hajj and Umrah services. Applied Computing and Informatics, 14 (1), 37–47
EA Khan, MKY Shambour
102018
Test data compression based on geometric shapes
A El-Maleh, S Al Zahir, E Khan
Computers & Electrical Engineering 37 (3), 376-391, 2011
102011
A reconfigurable hardware unit for the HMAC algorithm
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
2005 International Conference on Information and Communication Technology …, 2005
102005
Improved direct cover heuristic algorithms for synthesis of multiple-valued logic functions
MI Abd-El-Barr, EA Khan
International Journal of Electronics 101 (2), 271-286, 2014
82014
Applying the Handel-C design flow in designing an HMAC-hash unit on FPGAs
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
IEE Proceedings-Computers and Digital Techniques 153 (5), 323-334, 2006
82006
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20