Works matching AU Khan, Muhammad Khurram


Results: 116
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15

    Cyber Security Using Arabic CAPTCHA Scheme.

    Published in:
    International Arab Journal of Information Technology (IAJIT), 2013, v. 10, n. 1, p. 76
    By:
    • Khanl, Bilal;
    • Alghathbar, Khaled;
    • Khan, Muhammad Khurram;
    • Alkelab, Abdullah;
    • Alajaji, Abdulaziz
    Publication type:
    Article
    16
    17
    18

    Art or Artifact: Evaluating the Accuracy, Appeal, and Educational Value of AI-Generated Imagery in DALL·E 3 for Illustrating Congenital Heart Diseases.

    Published in:
    Journal of Medical Systems, 2024, v. 48, n. 1, p. 1, doi. 10.1007/s10916-024-02072-0
    By:
    • Temsah, Mohamad-Hani;
    • Alhuzaimi, Abdullah N.;
    • Almansour, Mohammed;
    • Aljamaan, Fadi;
    • Alhasan, Khalid;
    • Batarfi, Munirah A.;
    • Altamimi, Ibraheem;
    • Alharbi, Amani;
    • Alsuhaibani, Adel Abdulaziz;
    • Alwakeel, Leena;
    • Alzahrani, Abdulrahman Abdulkhaliq;
    • Alsulaim, Khaled B.;
    • Jamal, Amr;
    • Khayat, Afnan;
    • Alghamdi, Mohammed Hussien;
    • Halwani, Rabih;
    • Khan, Muhammad Khurram;
    • Al-Eyadhy, Ayman;
    • Nazer, Rakan
    Publication type:
    Article
    19
    20
    21
    22
    23

    A New Random Walk for Replica Detection in WSNs.

    Published in:
    PLoS ONE, 2016, v. 11, n. 7, p. 1, doi. 10.1371/journal.pone.0158072
    By:
    • Aalsalem, Mohammed Y.;
    • Khan, Wazir Zada;
    • Saad, N. M.;
    • Hossain, Md. Shohrab;
    • Atiquzzaman, Mohammed;
    • Khan, Muhammad Khurram
    Publication type:
    Article
    24
    25
    26
    27
    28
    29
    30

    Lattice-based signcryption.

    Published in:
    Concurrency & Computation: Practice & Experience, 2013, v. 25, n. 14, p. 2112, doi. 10.1002/cpe.2826
    By:
    • Li, Fagen;
    • Bin Muhaya, Fahad T.;
    • Khan, Muhammad Khurram;
    • Takagi, Tsuyoshi
    Publication type:
    Article
    31
    32

    A User Anonymous Mutual Authentication Protocol.

    Published in:
    KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 9, p. 4508, doi. 10.3837/tiis.2016.09.026
    By:
    • Saru Kumari;
    • Xiong Li;
    • Fan Wu;
    • Das, Ashok Kumar;
    • Odelu, Vanga;
    • Khan, Muhammad Khurram
    Publication type:
    Article
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50