default search action
Fahad Bin Muhaya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j14]Wazir Zada Khan, Muhammad Khurram Khan, Fahad T. Bin Muhaya, Mohammed Y. Aalsalem, Han-Chieh Chao:
A Comprehensive Study of Email Spam Botnet Detection. IEEE Commun. Surv. Tutorials 17(4): 2271-2295 (2015) - [j13]Fahad T. Bin Muhaya:
Security analysis and improvement of a mutual authentication scheme under trusted computing. Int. J. Ad Hoc Ubiquitous Comput. 18(1/2): 37-44 (2015) - [j12]Fahad Bin Muhaya:
Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system. Secur. Commun. Networks 8(2): 149-158 (2015) - [j11]SK Hafizul Islam, Muhammad Khurram Khan, Mohammad S. Obaidat, Fahad T. Bin Muhaya:
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps. Wirel. Pers. Commun. 84(3): 2013-2034 (2015) - [j10]Baojun Huang, Muhammad Khurram Khan, Libing Wu, Fahad T. Bin Muhaya, Debiao He:
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 85(1): 225-240 (2015) - 2014
- [c13]Abdelouahid Derhab, Abdelghani Bouras, Fahad Bin Muhaya, Muhammad Khurram Khan, Yang Xiang:
Spam Trapping System: Novel security framework to fight against spam botnets. ICT 2014: 467-471 - 2013
- [j9]Fagen Li, Fahad Bin Muhaya, Muhammad Khurram Khan, Tsuyoshi Takagi:
Lattice-based signcryption. Concurr. Comput. Pract. Exp. 25(14): 2112-2122 (2013) - [j8]Satyen Abrol, Latifur Khan, Fahad Bin Muhaya:
MapIt: a case study for location driven knowledge discovery and mining. Int. J. Data Min. Model. Manag. 5(1): 57-75 (2013) - [j7]Muhammad Usama, Fahad Bin Muhaya:
Framework for Secure Wireless Communication in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j6]Aneel Rahim, Muhammad Sher, Zeeshan Shafi Khan, Fahad Bin Muhaya:
Editorial "Secure Multimedia Communication in Vehicular Adhoc Network". Multim. Tools Appl. 66(2): 161-164 (2013) - [j5]Fahad Bin Muhaya:
Chaotic and AES cryptosystem for satellite imagery. Telecommun. Syst. 52(2): 573-581 (2013) - [c12]Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta, Fahad Bin Muhaya:
Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device. BICS 2013: 271-277 - [c11]Mohammad Salim Ahmed, Sourabh Jain, Fahad Bin Muhaya, Latifur Khan:
Predicted probability enhancement for multi-label text classification using class label pair association. EAIS 2013: 70-77 - [c10]Saru Kumari, Fahad Bin Muhaya, Muhammad Khurram Khan, R. Kumar:
Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme". ISBAST 2013: 247-250 - 2012
- [i1]Heru Susanto, Fahad Bin Muhaya, Mohammad Nabil Almunawar, Yong Chee Tuan:
Refinement of Strategy and Technology Domains STOPE View on ISO 27001. CoRR abs/1204.1385 (2012) - 2011
- [c9]Fahad Bin Muhaya, Muhammad Khurram Khan, Yang Xiang:
Polymorphic Malware Detection Using Hierarchical Hidden Markov Model. DASC 2011: 151-155 - [c8]Jason Switzer, Latifur Khan, Fahad Bin Muhaya:
Subjectivity classification and analysis of the ASRS corpus. IRI 2011: 160-165 - [c7]Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi:
Efficient Identity-Based Signcryption in the Standard Model. ProvSec 2011: 120-137 - [c6]Swarup Chandra, Latifur Khan, Fahad Bin Muhaya:
Estimating Twitter User Location Using Social Interactions-A Content Based Approach. SocialCom/PASSAT 2011: 838-843 - 2010
- [j4]Zeeshan Shafi Khan, Khalid Rashid, Fahad Bin Muhaya, Qutbuddin, Aneel Rahim:
Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication. Comput. Math. Appl. 60(2): 198-208 (2010) - [j3]Aneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya, Muhammad Sher, Muhammad Khurram Khan:
Information Sharing in Vehicular AdHoc Network. Int. J. Comput. Commun. Control 5(5): 892-899 (2010) - [j2]Aneel Rahim, Fahad Bin Muhaya, Zeeshan Shafi Khan, M. A. Ansari, Muhammad Sher:
Enhanced Relevance-Based Approach for Network Controls. Informatica (Slovenia) 34(2): 223-226 (2010) - [j1]Aneel Rahim, Zeeshan Shafi Khan, Fahad T. Bin Muhaya, Muhammad Sher, Tai-Hoon Kim:
Sensor Based Framework for Secure Multimedia Communication in VANET. Sensors 10(11): 10146-10154 (2010) - [c5]Aneel Rahim, Fahad Bin Muhaya:
Discovering the Botnet Detection Techniques. FGIT-SecTech/DRBC 2010: 231-235 - [c4]Fazl-e Hadi, Fahad Bin Muhaya, Atif R. Naseer:
Secure multimedia communication in wireless mesh networks. ICITST 2010: 1-4 - [c3]Aneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya:
Performance Evaluation of Video Streaming in Vehicular Adhoc Network. ISA 2010: 220-224 - [c2]Rehan Shafi, Aneel Rahim, Fahad Bin Muhaya, Shehzad Ashraf, Muhammad Sher:
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks. ISA 2010: 233-240
2000 – 2009
- 2009
- [c1]Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan:
Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. ICIC (1) 2009: 1014-1024
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint