Name
Affiliation
Papers
KHALED ALGHATHBAR
King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11451, Saudi Arabia
53
Collaborators
Citations 
PageRank 
68
498
32.54
Referers 
Referees 
References 
1127
883
512
Search Limit
1001000
Title
Citations
PageRank
Year
Attack containment in mobile ad-hoc networks through fair distribution of processing resources00.342014
Authorization as a Service in Cloud Environments10.402013
Cyber Security Using Arabic Captcha Scheme20.392013
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network20.392013
Environment recognition for digital audio forensics using MPEG-7 and mel cepstral features.80.642013
Mobile one-time passwords: two-factor authentication using mobile phones50.492012
Representing Access Control Policies In Use Cases20.512012
Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes20.422012
Analysis of existing remote attestation techniques10.362012
Intrinsic Authentication Of Multimedia Objects Using Biometric Data Manipulation30.452012
Identity-based online/offline signcryption for low power devices110.552012
SIMOnt: A Security Information Management Ontology Framework00.342011
Challenge-response-based biometric image scrambling for secure personal identification211.192011
Two-directional two-dimensional random projection and its variations for face and palmprint recognition170.522011
Privacy-preserving and tokenless chaotic revocable face authentication scheme50.462011
Authenticated key agreement with rekeying for secured body sensor networks.40.702011
Secure chaotic map based block cryptosystem with application to camera sensor networks.50.902011
Secure Instant Messaging Protocol for Centralized Communication Group.10.372011
Quaternary privacy-levels preservation in computer forensics investigation process.40.422011
An Ontology Based Information Security Requirements Engineering Framework40.392011
Information Security Awareness Campaign: An Alternate Approach.30.392011
OTP-Based Two-Factor Authentication Using Mobile Phones100.782011
Web content mining for alias identification: A first step towards suspect tracking.20.362011
A Framework for Detecting Malformed SMS Attack00.342011
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'1153.172011
Energy Efficient Distributed Face Recognition in Wireless Sensor Network80.532011
Security analysis of 'two-factor user authentication in wireless sensor networks'40.432010
Face Recognition using Layered Linear Discriminant Analysis and Small Subspace80.612010
Information Assurance in Saudi Organizations - An Empirical Study.00.342010
NMACA Approach Used to Build a Secure Message Authentication Code.00.342010
Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cards.10.432010
Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset20.372010
One-Time Password System with Infinite Nested Hash Chains.30.432010
Issues of Security and Network Load in Presence - A Survey.00.342010
Using Arabic CAPTCHA for Cyber Security.50.502010
Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem.140.832010
Contactless Biometrics in Wireless Sensor Network: A Survey.00.342010
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan.00.342010
Security Analysis of Firewall Rule Sets in Computer Networks20.362010
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.1504.682010
Chaos-based secure satellite imagery cryptosystem211.042010
Face Detection and Count Estimates in Surveillance Color Images.00.342009
Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding)10.392009
Acceptance and Applications of Smart Cards Technology in University Settings00.342009
A New Accelerated RC4 Scheme Using "Ultra Gridsec” and "HIMAN” and use this Scheme to Secure "HIMAN” Data00.342009
Enhancement of Use Case Diagram to Capture Authorization Requirements10.362009
Enforcing Security Policies in Requirements Engineering Using AFUML00.342008
Practical ERP Implementation in Government Organization00.342008
Validating the enforcement of access control policies and separation of duty principle in requirement engineering110.522007
Securing UML Information Flow Using FlowUML50.442005
  • 1
  • 2