Esam Khan
Esam Khan
Umm Al-Qura University - The Custodian of the Two Holy Mosques Institute for Hajj & Umrah Research
Verified email at
Cited by
Cited by
Counting-based secret sharing technique for multimedia applications
A Gutub, N Al-Juaid, E Khan
Multimedia Tools and Applications 78 (5), 5591-5619, 2019
A geometric-primitives-based compression scheme for testing systems-on-a-chip
A El-Maleh, S Al Zahir, E Khan
Proceedings 19th IEEE VLSI Test Symposium. VTS 2001, 54-59, 2001
Enhancing PC data security via combining RSA cryptography and video based steganography
NA Al-Juaid, AA Gutub, EA Khan
Journal of Information Security and Cybercrimes Research 1 (1), 5-13, 2018
An analytical study of mobile applications for Hajj and Umrah services
EA Khan, MKY Shambour
Applied computing and informatics 14 (1), 37-47, 2018
Design and performance analysis of a unified, reconfigurable HMAC-Hash unit
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
IEEE Transactions on Circuits and Systems I: Regular Papers 54 (12), 2683-2695, 2007
Stego-system for hiding text in images of personal computers
N Alotaibi, A Gutub, E Khan
The 12th learning and technology conference: wearable tech/wearable learning …, 2015
Using subthreshold SRAM to design low-power crypto hardware
A Gutub, E Khan
International Journal of New Computer Architectures and their Applications …, 2011
Network processors for communication security: a review
E Khan, MW El-Kharashi, ANME Rafiq, F Gebali, M Abd-El-Barr
2003 IEEE Pacific Rim Conference on Communications Computers and Signal …, 2003
Inclusion of Unicode standard seamless characters to expand Arabic text steganography for secure individual uses
N Alanazi, E Khan, A Gutub
Journal of King Saud University-Computer and Information Sciences, 2020
An FPGA design of a unified hash engine for IPSec authentication
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
Fifth International Workshop on System-on-Chip for Real-Time Applications …, 2005
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
N Alanazi, E Khan, A Gutub
Multimedia Tools and Applications 80 (1), 1403-1431, 2021
Test data compression based on geometric shapes
A El-Maleh, S al Zahir, E Khan
Computers & Electrical Engineering 37 (3), 376-391, 2011
A reconfigurable hardware unit for the HMAC algorithm
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
2005 International Conference on Information and Communication Technology …, 2005
Using Arabic poetry system for steganography
E Khan
Asian Journal of Computer Science and Information Technology 4 (6), 55-61, 2014
Applying the Handel-C design flow in designing an HMAC-hash unit on FPGAs
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
IEE Proceedings-Computers and Digital Techniques 153 (5), 323-334, 2006
Improved direct cover heuristic algorithms for synthesis of multiple-valued logic functions
MI Abd-El-Barr, EA Khan
International Journal of Electronics 101 (2), 271-286, 2014
An RFID-based system for pilgrim management in king abdul aziz international airport
EA Khan
2011 International Conference on Information Management, Innovation …, 2011
An efficient test vector compression technique based on geometric shapes [system-on-a-chip]
S Al Zahir, A El-Maleh, E Khan
ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and …, 2001
Forecasting the number of muslim pilgrims using NARX neural networks with a comparison study with other modern methods
EA Khan, MA Elgamal, SM Shaarawy
Journal of Advances in Mathematics and Computer Science, 394-401, 2015
Functionality-improved Arabic text steganography based on unicode features
N Alanazi, E Khan, A Gutub
Arabian Journal for Science and Engineering 45 (12), 11037-11050, 2020
The system can't perform the operation now. Try again later.
Articles 1–20