Follow
Esam Khan
Esam Khan
Umm Al-Qura University - The Custodian of the Two Holy Mosques Institute for Hajj & Umrah Research
Verified email at uqu.edu.sa
Title
Cited by
Cited by
Year
Counting-based secret sharing technique for multimedia applications
A Gutub, N Al-Juaid, E Khan
Multimedia Tools and Applications 78, 5591-5619, 2019
1842019
An analytical study of mobile applications for Hajj and Umrah services
EA Khan, MKY Shambour
Applied computing and informatics 14 (1), 37-47, 2018
922018
A geometric-primitives-based compression scheme for testing systems-on-a-chip
A El-Maleh, S Al Zahir, E Khan
Proceedings 19th IEEE VLSI Test Symposium. VTS 2001, 54-59, 2001
832001
Enhancing PC data security via combining RSA cryptography and video based steganography
NA Al-Juaid, AA Gutub, EA Khan
Journal of Information Security and Cybercrimes Research 1 (1), 5-13, 2018
722018
Inclusion of unicode standard seamless characters to expand Arabic text steganography for secure individual uses
N Alanazi, E Khan, A Gutub
Journal of King Saud University-Computer and Information Sciences 34 (4 …, 2022
462022
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
N Alanazi, E Khan, A Gutub
Multimedia Tools and Applications 80, 1403-1431, 2021
412021
Design and performance analysis of a unified, reconfigurable HMAC-Hash unit
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
IEEE Transactions on Circuits and Systems I: Regular Papers 54 (12), 2683-2695, 2007
342007
Stego-system for hiding text in images of personal computers
N Alotaibi, A Gutub, E Khan
The 12th learning and technology conference: wearable tech/wearable learning …, 2015
242015
Functionality-improved Arabic text steganography based on unicode features
N Alanazi, E Khan, A Gutub
Arabian Journal for Science and Engineering 45, 11037-11050, 2020
202020
Using subthreshold SRAM to design low-power crypto hardware
A Gutub, E Khan
International Journal of New Computer Architectures and their Applications …, 2011
202011
Network processors for communication security: a review
E Khan, MW El-Kharashi, ANME Rafiq, F Gebali, M Abd-El-Barr
2003 IEEE Pacific Rim Conference on Communications Computers and Signal …, 2003
172003
Using Arabic poetry system for steganography
E Khan
Asian Journal of Computer Science and Information Technology 4 (6), 55-61, 2014
162014
An RFID-based system for pilgrim management in King Abdul Aziz international airport
EA Khan
2011 International Conference on Information Management, Innovation …, 2011
152011
Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations
N Alanazi, E Khan, A Gutub
Arabian Journal for Science and Engineering 46 (9), 8869-8885, 2021
142021
An FPGA design of a unified hash engine for IPSec authentication
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
Fifth International Workshop on System-on-Chip for Real-Time Applications …, 2005
132005
A reconfigurable hardware unit for the HMAC algorithm
E Khan, MW El-Kharashi, F Gebali, M Abd-El-Barr
2005 International Conference on Information and Communication Technology …, 2005
122005
An analytical study of mobile applications for Hajj and Umrah services. Applied Computing and Informatics, 14 (1), 37–47
EA Khan, MKY Shambour
112018
Test data compression based on geometric shapes
A El-Maleh, S Al Zahir, E Khan
Computers & Electrical Engineering 37 (3), 376-391, 2011
102011
A late acceptance hyper-heuristic approach for the optimization problem of distributing pilgrims over Mina Tents
MKY Shambour, EA Khan
Journal of Universal Computer Science 28 (4), 396, 2022
92022
Improved direct cover heuristic algorithms for synthesis of multiple-valued logic functions
MI Abd-El-Barr, EA Khan
International Journal of Electronics 101 (2), 271-286, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20