Følg
Esam Khan
Esam Khan
Umm Al-Qura University - The Custodian of the Two Holy Mosques Institute for Hajj & Umrah Research
Verifisert e-postadresse på uqu.edu.sa
Tittel
Sitert av
Sitert av
År
Counting-based secret sharing technique for multimedia applications
A Gutub, N Al-Juaid, E Khan
Multimedia Tools and Applications 78, 5591-5619, 2019
1872019
An analytical study of mobile applications for Hajj and Umrah services
EA Khan, MKY Shambour
Applied computing and informatics 14 (1), 37-47, 2018
932018
A geometric-primitives-based compression scheme for testing systems-on-a-chip
A El-Maleh, S Al Zahir, E Khan
Proceedings 19th IEEE VLSI Test Symposium. VTS 2001, 54-59, 2001
812001
Enhancing PC data security via combining RSA cryptography and video based steganography
NA Al-Juaid, AA Gutub, EA Khan
Journal of Information Security and Cybercrimes Research 1 (1), 5-13, 2018
732018
Inclusion of unicode standard seamless characters to expand Arabic text steganography for secure individual uses
N Alanazi, E Khan, A Gutub
Journal of King Saud University-Computer and Information Sciences 34 (4 …, 2022
442022
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
N Alanazi, E Khan, A Gutub
Multimedia Tools and Applications 80, 1403-1431, 2021
402021
Design and performance analysis of a unified, reconfigurable HMAC-Hash unit
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
IEEE Transactions on Circuits and Systems I: Regular Papers 54 (12), 2683-2695, 2007
352007
Stego-system for hiding text in images of personal computers
N Alotaibi, A Gutub, E Khan
The 12th learning and technology conference: wearable tech/wearable learning …, 2015
242015
Functionality-improved Arabic text steganography based on unicode features
N Alanazi, E Khan, A Gutub
Arabian Journal for Science and Engineering 45, 11037-11050, 2020
212020
Using subthreshold SRAM to design low-power crypto hardware
A Gutub, E Khan
International Journal of New Computer Architectures and their Applications …, 2011
202011
Using Arabic poetry system for steganography
E Khan
Asian Journal of Computer Science and Information Technology 4 (6), 55-61, 2014
162014
Network processors for communication security: a review
E Khan, MW El-Kharashi, ANME Rafiq, F Gebali, M Abd-El-Barr
2003 IEEE Pacific Rim Conference on Communications Computers and Signal …, 2003
162003
An RFID-based system for pilgrim management in King Abdul Aziz International Airport
EA Khan
2011 International Conference on Information Management, Innovation …, 2011
152011
Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations
N Alanazi, E Khan, A Gutub
Arabian Journal for Science and Engineering 46 (9), 8869-8885, 2021
142021
An FPGA design of a unified hash engine for IPSec authentication
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
Fifth International Workshop on System-on-Chip for Real-Time Applications …, 2005
132005
An analytical study of mobile applications for Hajj and Umrah services. Applied Computing and Informatics, 14 (1), 37–47
EA Khan, MKY Shambour
122018
A reconfigurable hardware unit for the HMAC algorithm
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
2005 International Conference on Information and Communication Technology …, 2005
122005
A late acceptance hyper-heuristic approach for the optimization problem of distributing pilgrims over Mina Tents
MKY Shambour, EA Khan
Journal of Universal Computer Science 28 (4), 396, 2022
102022
A Heuristic Approach for Distributing Pilgrims over Mina Tents
MK Shambour, EA Khan
Journal of King Abdulaziz University : Engineering Sciences 30 (2), 11 - 23, 2019
102019
Test data compression based on geometric shapes
A El-Maleh, S al Zahir, E Khan
Computers & Electrical Engineering 37 (3), 376-391, 2011
102011
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20