Counting-based secret sharing technique for multimedia applications A Gutub, N Al-Juaid, E Khan Multimedia Tools and Applications 78, 5591-5619, 2019 | 184 | 2019 |
An analytical study of mobile applications for Hajj and Umrah services EA Khan, MKY Shambour Applied computing and informatics 14 (1), 37-47, 2018 | 92 | 2018 |
A geometric-primitives-based compression scheme for testing systems-on-a-chip A El-Maleh, S Al Zahir, E Khan Proceedings 19th IEEE VLSI Test Symposium. VTS 2001, 54-59, 2001 | 83 | 2001 |
Enhancing PC data security via combining RSA cryptography and video based steganography NA Al-Juaid, AA Gutub, EA Khan Journal of Information Security and Cybercrimes Research 1 (1), 5-13, 2018 | 72 | 2018 |
Inclusion of unicode standard seamless characters to expand Arabic text steganography for secure individual uses N Alanazi, E Khan, A Gutub Journal of King Saud University-Computer and Information Sciences 34 (4 …, 2022 | 46 | 2022 |
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding N Alanazi, E Khan, A Gutub Multimedia Tools and Applications 80, 1403-1431, 2021 | 41 | 2021 |
Design and performance analysis of a unified, reconfigurable HMAC-Hash unit E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr IEEE Transactions on Circuits and Systems I: Regular Papers 54 (12), 2683-2695, 2007 | 34 | 2007 |
Stego-system for hiding text in images of personal computers N Alotaibi, A Gutub, E Khan The 12th learning and technology conference: wearable tech/wearable learning …, 2015 | 23 | 2015 |
Functionality-improved Arabic text steganography based on unicode features N Alanazi, E Khan, A Gutub Arabian Journal for Science and Engineering 45, 11037-11050, 2020 | 20 | 2020 |
Using subthreshold SRAM to design low-power crypto hardware A Gutub, E Khan International Journal of New Computer Architectures and their Applications …, 2011 | 20 | 2011 |
Network processors for communication security: a review E Khan, MW El-Kharashi, ANME Rafiq, F Gebali, M Abd-El-Barr 2003 IEEE Pacific Rim Conference on Communications Computers and Signal …, 2003 | 17 | 2003 |
Using Arabic poetry system for steganography E Khan Asian Journal of Computer Science and Information Technology 4 (6), 55-61, 2014 | 16 | 2014 |
An RFID-based system for pilgrim management in King Abdul Aziz international airport EA Khan 2011 International Conference on Information Management, Innovation …, 2011 | 15 | 2011 |
Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations N Alanazi, E Khan, A Gutub Arabian Journal for Science and Engineering 46 (9), 8869-8885, 2021 | 14 | 2021 |
An FPGA design of a unified hash engine for IPSec authentication E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr Fifth International Workshop on System-on-Chip for Real-Time Applications …, 2005 | 13 | 2005 |
A reconfigurable hardware unit for the HMAC algorithm E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr 2005 International Conference on Information and Communication Technology …, 2005 | 12 | 2005 |
An analytical study of mobile applications for Hajj and Umrah services. Applied Computing and Informatics, 14 (1), 37–47 EA Khan, MKY Shambour | 11 | 2018 |
Test data compression based on geometric shapes A El-Maleh, S Al Zahir, E Khan Computers & Electrical Engineering 37 (3), 376-391, 2011 | 10 | 2011 |
A late acceptance hyper-heuristic approach for the optimization problem of distributing pilgrims over Mina Tents MKY Shambour, EA Khan Journal of Universal Computer Science 28 (4), 396, 2022 | 9 | 2022 |
Improved direct cover heuristic algorithms for synthesis of multiple-valued logic functions MI Abd-El-Barr, EA Khan International Journal of Electronics 101 (2), 271-286, 2014 | 9 | 2014 |