Esam Khan
Esam Khan
Umm Al-Qura University - The Custodian of the Two Holy Mosques Institute for Hajj & Umrah Research
Verified email at
Cited by
Cited by
Counting-based secret sharing technique for multimedia applications
A Gutub, N Al-Juaid, E Khan
Multimedia Tools and Applications 78, 5591-5619, 2019
A geometric-primitives-based compression scheme for testing systems-on-a-chip
A El-Maleh, S Al Zahir, E Khan
Proceedings 19th IEEE VLSI Test Symposium. VTS 2001, 54-59, 2001
An analytical study of mobile applications for Hajj and Umrah services
EA Khan, MKY Shambour
Applied computing and informatics 14 (1), 37-47, 2018
Enhancing PC data security via combining RSA cryptography and video based steganography
NA Al-Juaid, AA Gutub, EA Khan
Journal of Information Security and Cybercrimes Research 1 (1), 5-13, 2018
Design and performance analysis of a unified, reconfigurable HMAC-Hash unit
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
IEEE Transactions on Circuits and Systems I: Regular Papers 54 (12), 2683-2695, 2007
Stego-system for hiding text in images of personal computers
N Alotaibi, A Gutub, E Khan
The 12th learning and technology conference: wearable tech/wearable learning …, 2015
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
N Alanazi, E Khan, A Gutub
Multimedia Tools and Applications 80, 1403-1431, 2021
Inclusion of unicode standard seamless characters to expand Arabic text steganography for secure individual uses
N Alanazi, E Khan, A Gutub
Journal of King Saud University-Computer and Information Sciences 34 (4 …, 2022
Using subthreshold SRAM to design low-power crypto hardware
A Gutub, E Khan
International Journal of New Computer Architectures and their Applications …, 2011
Network processors for communication security: a review
E Khan, MW El-Kharashi, ANME Rafiq, F Gebali, M Abd-El-Barr
2003 IEEE Pacific Rim Conference on Communications Computers and Signal …, 2003
Using Arabic poetry system for steganography
E Khan
Asian Journal of Computer Science and Information Technology 4 (6), 55-61, 2014
An RFID-based system for pilgrim management in king abdul aziz international airport
EA Khan
2011 International Conference on Information Management, Innovation …, 2011
An FPGA design of a unified hash engine for IPSec authentication
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
Fifth International Workshop on System-on-Chip for Real-Time Applications …, 2005
Test data compression based on geometric shapes
A El-Maleh, S al Zahir, E Khan
Computers & Electrical Engineering 37 (3), 376-391, 2011
A reconfigurable hardware unit for the HMAC algorithm
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
2005 International Conference on Information and Communication Technology …, 2005
Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations
N Alanazi, E Khan, A Gutub
Arabian Journal for Science and Engineering 46 (9), 8869-8885, 2021
Functionality-improved Arabic text steganography based on unicode features
N Alanazi, E Khan, A Gutub
Arabian Journal for Science and Engineering 45, 11037-11050, 2020
Applying the Handel-C design flow in designing an HMAC-hash unit on FPGAs
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
IEE Proceedings-Computers and Digital Techniques 153 (5), 323-334, 2006
Improved direct cover heuristic algorithms for synthesis of multiple-valued logic functions
MI Abd-El-Barr, EA Khan
International Journal of Electronics 101 (2), 271-286, 2014
An efficient test vector compression technique based on geometric shapes [system-on-a-chip]
S Al Zahir, A El-Maleh, E Khan
ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and …, 2001
The system can't perform the operation now. Try again later.
Articles 1–20