Search Results - "Bin Muhaya, Fahad T."

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Sensor based framework for secure multimedia communication in VANET by Rahim, Aneel, Khan, Zeeshan Shafi, Bin Muhaya, Fahad T, Sher, Muhammad, Kim, Tai-Hoon

    Published in Sensors (Basel, Switzerland) (01-11-2010)
    “…Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a…”
    Get full text
    Journal Article
  2. 2

    Lattice-based signcryption by Li, Fagen, Bin Muhaya, Fahad T., Khan, Muhammad Khurram, Takagi, Tsuyoshi

    Published in Concurrency and computation (25-09-2013)
    “…SUMMARYSigncryption is a cryptographic primitive that performs simultaneously both the functions of digital signature and public‐key encryption, at a cost…”
    Get full text
    Journal Article
  3. 3

    Chaotic and AES cryptosystem for satellite imagery by Muhaya, Fahad T. Bin

    Published in Telecommunication systems (01-02-2013)
    “…The rapid development, advancement, and growing use of satellite imagery and information technologies have made the security of data storage and transmission…”
    Get full text
    Journal Article
  4. 4

    Framework for Secure Wireless Communication in Wireless Sensor Networks by Usama, Muhammad, Bin Muhaya, Fahad T.

    “…With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure wireless…”
    Get full text
    Journal Article
  5. 5

    Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system by Bin Muhaya, Fahad T.

    Published in Security and communication networks (25-01-2015)
    “…ABSTRACT The concept of Telecare medicine information systems (TMISs) has evolved to provide better health care to the masses. So the control of access to…”
    Get full text
    Journal Article
  6. 6

    A Comprehensive Study of Email Spam Botnet Detection by Khan, Wazir Zada, Khan, Muhammad Khurram, Bin Muhaya, Fahad T., Aalsalem, Mohammed Y., Han-Chieh Chao

    Published in IEEE Communications surveys and tutorials (01-01-2015)
    “…The problem of email spam has grown significantly over the past few years. It is not just a nuisance for users but also it is damaging for those who fall for…”
    Get full text
    Journal Article
  7. 7

    An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography by Huang, Baojun, Khan, Muhammad Khurram, Wu, Libing, Muhaya, Fahad T. Bin, He, Debiao

    Published in Wireless personal communications (01-11-2015)
    “…As the internet technology’s evolution, identity authentication in the network is becoming more and more significant. In 2014, Qu et al. proposed a two-factor…”
    Get full text
    Journal Article
  8. 8

    Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps by Islam, S. K. Hafizul, Khan, Muhammad Khurram, Obaidat, Mohammad S., Muhaya, Fahad T. Bin

    Published in Wireless personal communications (01-10-2015)
    “…In recent years, many anonymous password-based mobile user authentication techniques have been constructed for roaming service in global mobility networks…”
    Get full text
    Journal Article
  9. 9

    Selfish node detection in Wireless Mesh Networks by Bin Muhaya, Fahad T, Fazl-e-Hadi, Naseer, Atif

    “…Wireless Mesh Networks (WMNs) are multi-hop network in which each node communicates with each other to increase the performance of network. Security is a big…”
    Get full text
    Conference Proceeding
  10. 10

    Essentials for the e-government security by Hadi, Fazle, Bin Muhaya, Fahad T.

    “…In the modern digital age the world became a global village. Finger tips availability of all government services is the goal of every government. That's why…”
    Get full text
    Conference Proceeding
  11. 11

    Cryptanalysis of "an improved timestamp-based remote user authentication scheme" by Kumari, S., Gupta, Mridul K., Khan, Muhammad Khurram, Bin Muhaya, Fahad T.

    “…With the popularity of Internet technology, remote user authentication is receiving more and more attention than before. Recently, Awasthi et al. analysed…”
    Get full text
    Conference Proceeding