Esam Khan
Esam Khan
Umm Al-Qura University - The Custodian of the Two Holy Mosques Institute for Hajj & Umrah Research
Verified email at uqu.edu.sa
Title
Cited by
Cited by
Year
Counting-based secret sharing technique for multimedia applications
A Gutub, N Al-Juaid, E Khan
Multimedia Tools and Applications 78 (5), 5591-5619, 2019
1112019
A geometric-primitives-based compression scheme for testing systems-on-a-chip
A El-Maleh, S Al Zahir, E Khan
Proceedings 19th IEEE VLSI Test Symposium. VTS 2001, 54-59, 2001
772001
Enhancing PC data security via combining RSA cryptography and video based steganography
NA Al-Juaid, AA Gutub, EA Khan
Journal of Information Security and Cybercrimes Research 1 (1), 5-13, 2018
512018
An analytical study of mobile applications for Hajj and Umrah services
EA Khan, MKY Shambour
Applied computing and informatics 14 (1), 37-47, 2018
452018
Design and performance analysis of a unified, reconfigurable HMAC-Hash unit
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
IEEE Transactions on Circuits and Systems I: Regular Papers 54 (12), 2683-2695, 2007
302007
Stego-system for hiding text in images of personal computers
N Alotaibi, A Gutub, E Khan
The 12th learning and technology conference: wearable tech/wearable learning …, 2015
192015
Using subthreshold SRAM to design low-power crypto hardware
A Gutub, E Khan
International Journal of New Computer Architectures and their Applications …, 2011
192011
Network processors for communication security: a review
E Khan, MW El-Kharashi, ANME Rafiq, F Gebali, M Abd-El-Barr
2003 IEEE Pacific Rim Conference on Communications Computers and Signal …, 2003
152003
Inclusion of Unicode standard seamless characters to expand Arabic text steganography for secure individual uses
N Alanazi, E Khan, A Gutub
Journal of King Saud University-Computer and Information Sciences, 2020
122020
An FPGA design of a unified hash engine for IPSec authentication
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
Fifth International Workshop on System-on-Chip for Real-Time Applications …, 2005
112005
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
N Alanazi, E Khan, A Gutub
Multimedia Tools and Applications 80 (1), 1403-1431, 2021
102021
Test data compression based on geometric shapes
A El-Maleh, S al Zahir, E Khan
Computers & Electrical Engineering 37 (3), 376-391, 2011
102011
A reconfigurable hardware unit for the HMAC algorithm
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
2005 International Conference on Information and Communication Technology …, 2005
102005
Using Arabic poetry system for steganography
E Khan
Asian Journal of Computer Science and Information Technology 4 (6), 55-61, 2014
92014
Applying the Handel-C design flow in designing an HMAC-hash unit on FPGAs
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
IEE Proceedings-Computers and Digital Techniques 153 (5), 323-334, 2006
92006
Improved direct cover heuristic algorithms for synthesis of multiple-valued logic functions
MI Abd-El-Barr, EA Khan
International Journal of Electronics 101 (2), 271-286, 2014
72014
An RFID-based system for pilgrim management in king abdul aziz international airport
EA Khan
2011 International Conference on Information Management, Innovation …, 2011
72011
An efficient test vector compression technique based on geometric shapes [system-on-a-chip]
S Al Zahir, A El-Maleh, E Khan
ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and …, 2001
72001
Forecasting the number of muslim pilgrims using NARX neural networks with a comparison study with other modern methods
EA Khan, MA Elgamal, SM Shaarawy
Journal of Advances in Mathematics and Computer Science, 394-401, 2015
62015
Functionality-improved Arabic text steganography based on unicode features
N Alanazi, E Khan, A Gutub
Arabian Journal for Science and Engineering 45 (12), 11037-11050, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20