Zobrazeno 1 - 10
of 61
pro vyhledávání: '"Khaled Alghathbar"'
Autor:
Kyngn Jung Kim, Ahmed Saleh Tolba, Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar
Publikováno v:
Sensors, Vol 11, Iss 6, Pp 5835-5849 (2011)
Many medical systems are currently equipped with a large number of tiny, non-invasive sensors, located on, or close to, the patient’s body for health monitoring purposes. These groupings of sensors constitute a body sensor network (BSN). Key manage
Externí odkaz:
https://doaj.org/article/c946a18ae6774f69ba85a0a8f23d2fde
Publikováno v:
Sensors, Vol 11, Iss 2, Pp 1607-1619 (2011)
Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withst
Externí odkaz:
https://doaj.org/article/a82f5ff1920b43f68d3ae5c3e1ba5c14
Publikováno v:
Sensors, Vol 10, Iss 9, Pp 8683-8695 (2010)
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is
Externí odkaz:
https://doaj.org/article/13eedb76f6f44bb7bcc2822a82fc4d6d
Publikováno v:
Sensors, Vol 10, Iss 3, Pp 2450-2459 (2010)
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenti
Externí odkaz:
https://doaj.org/article/87fadea993ae4c8680e8d059b14f764a
Publikováno v:
AWICT
Recently, cell phone usage has increased incrementally to huge numbers. Statistics show that a total number of mobile phone users worldwide, from 2013 to 2019, is about 60 percent of the Earth's population. This reflects that the use of cell phones i
Publikováno v:
Journal of Applied Sciences. 14:620-630
Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trus
Publikováno v:
Telecommunication Systems. 55:93-103
Due to frequent joining and leaving of nodes and better performance, use of flooding algorithms is always proffered in Mobile Ad-hoc Networks (MANETs). A single query transmitted by a node can be received by hundreds of nodes at 3rd or 4th hop. But i
Publikováno v:
Journal of Network and Computer Applications. 35:340-347
Confidentiality and authentication are the basic security requirements for many cryptographic applications. In this paper, we propose an efficient identity-based online/offline signcryption scheme, which is very suitable for low power devices such as
Autor:
Muhammad Khurram Khan, Khaled Alghathbar, Tamleek Ali, Amir Hayat, Sanaullah Khan, Mohammad Nauman, Muhammad Ali, Shahbaz Khan, Masoom Alam
Publikováno v:
Security and Communication Networks. 5:1062-1082
This paper has been written as a part of the research project that is working towards the implementation of dynamic behavioral attestation for mobile platforms. The motivation behind this paper was to analyze the existing remote attestation technique
Autor:
Khaled Alghathbar, Ghulam Muhammad
Publikováno v:
Scopus-Elsevier
Environment Recognition for Digital Audio Forensics Using MPEG-7 and MEL Cepstral FeaturesEnvironment recognition from digital audio for forensics application is a growing area of interest. However, compared to other branches of audio forensics, it i