Counting-based secret sharing technique for multimedia applications A Gutub, N Al-Juaid, E Khan Multimedia Tools and Applications 78, 5591-5619, 2019 | 159 | 2019 |
A geometric-primitives-based compression scheme for testing systems-on-a-chip A El-Maleh, S Al Zahir, E Khan Proceedings 19th IEEE VLSI Test Symposium. VTS 2001, 54-59, 2001 | 79 | 2001 |
An analytical study of mobile applications for Hajj and Umrah services EA Khan, MKY Shambour Applied computing and informatics 14 (1), 37-47, 2018 | 69 | 2018 |
Enhancing PC data security via combining RSA cryptography and video based steganography NA Al-Juaid, AA Gutub, EA Khan Journal of Information Security and Cybercrimes Research 1 (1), 5-13, 2018 | 67 | 2018 |
Design and performance analysis of a unified, reconfigurable HMAC-Hash unit E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr IEEE Transactions on Circuits and Systems I: Regular Papers 54 (12), 2683-2695, 2007 | 30 | 2007 |
Stego-system for hiding text in images of personal computers N Alotaibi, A Gutub, E Khan The 12th learning and technology conference: wearable tech/wearable learning …, 2015 | 23 | 2015 |
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding N Alanazi, E Khan, A Gutub Multimedia Tools and Applications 80, 1403-1431, 2021 | 22 | 2021 |
Inclusion of unicode standard seamless characters to expand Arabic text steganography for secure individual uses N Alanazi, E Khan, A Gutub Journal of King Saud University-Computer and Information Sciences 34 (4 …, 2022 | 20 | 2022 |
Using subthreshold SRAM to design low-power crypto hardware A Gutub, E Khan International Journal of New Computer Architectures and their Applications …, 2011 | 19 | 2011 |
Network processors for communication security: a review E Khan, MW El-Kharashi, ANME Rafiq, F Gebali, M Abd-El-Barr 2003 IEEE Pacific Rim Conference on Communications Computers and Signal …, 2003 | 16 | 2003 |
Using Arabic poetry system for steganography E Khan Asian Journal of Computer Science and Information Technology 4 (6), 55-61, 2014 | 14 | 2014 |
An RFID-based system for pilgrim management in king abdul aziz international airport EA Khan 2011 International Conference on Information Management, Innovation …, 2011 | 14 | 2011 |
An FPGA design of a unified hash engine for IPSec authentication E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr Fifth International Workshop on System-on-Chip for Real-Time Applications …, 2005 | 11 | 2005 |
Test data compression based on geometric shapes A El-Maleh, S al Zahir, E Khan Computers & Electrical Engineering 37 (3), 376-391, 2011 | 10 | 2011 |
A reconfigurable hardware unit for the HMAC algorithm E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr 2005 International Conference on Information and Communication Technology …, 2005 | 9 | 2005 |
Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations N Alanazi, E Khan, A Gutub Arabian Journal for Science and Engineering 46 (9), 8869-8885, 2021 | 8 | 2021 |
Functionality-improved Arabic text steganography based on unicode features N Alanazi, E Khan, A Gutub Arabian Journal for Science and Engineering 45, 11037-11050, 2020 | 8 | 2020 |
Applying the Handel-C design flow in designing an HMAC-hash unit on FPGAs E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr IEE Proceedings-Computers and Digital Techniques 153 (5), 323-334, 2006 | 8 | 2006 |
Improved direct cover heuristic algorithms for synthesis of multiple-valued logic functions MI Abd-El-Barr, EA Khan International Journal of Electronics 101 (2), 271-286, 2014 | 7 | 2014 |
An efficient test vector compression technique based on geometric shapes [system-on-a-chip] S Al Zahir, A El-Maleh, E Khan ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and …, 2001 | 7 | 2001 |