D-Index & Metrics Best Publications
Computer Science
Saudi Arabia
2023

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 77 Citations 17,795 452 World Ranking 761 National Ranking 3

Research.com Recognitions

Awards & Achievements

2023 - Research.com Computer Science in Saudi Arabia Leader Award

2022 - Research.com Computer Science in Saudi Arabia Leader Award

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Computer network
  • Artificial intelligence

Muhammad Khurram Khan mostly deals with Computer security, Computer network, Authentication, Password and Smart card. His work in Mutual authentication, Session key, Authentication protocol, Challenge–response authentication and Anonymity is related to Computer security. His Computer network study combines topics in areas such as Key distribution in wireless sensor networks, Vehicular communication systems and Wireless ad hoc network.

His Authentication study combines topics from a wide range of disciplines, such as Random oracle, Public-key cryptography, Roaming, The Internet and Scheme. The Password study combines topics in areas such as Hash function, Cryptanalysis and Login. His work focuses on many connections between Smart card and other disciplines, such as User authentication, that overlap with his field of interest in Robustness.

His most cited work include:

  • Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ (282 citations)
  • An enhanced smart card based remote user password authentication scheme (209 citations)
  • Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' (208 citations)

What are the main themes of his work throughout his whole career to date?

Muhammad Khurram Khan focuses on Computer security, Computer network, Authentication, Password and Artificial intelligence. In his research on the topic of Computer security, Security analysis is strongly related with Scheme. In Computer network, Muhammad Khurram Khan works on issues like Cloud computing, which are connected to Scalability.

His Authentication research includes elements of Key, Cryptography and Login. His work carried out in the field of Password brings together such families of science as Hash function and Anonymity. His research in Artificial intelligence intersects with topics in Computer vision and Pattern recognition.

He most often published in these fields:

  • Computer security (48.09%)
  • Computer network (26.08%)
  • Authentication (25.60%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (48.09%)
  • Authentication (25.60%)
  • Computer network (26.08%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Authentication, Computer network, The Internet and Scheme. His Computer security study deals with Taxonomy intersecting with Service. The various areas that Muhammad Khurram Khan examines in his Authentication study include Security analysis, Password, Cryptography and Biometrics.

His research links Cloud computing with Computer network. His Authentication protocol research is multidisciplinary, incorporating elements of Wireless sensor network and Hash function. He has included themes like Password cracking and Mutual authentication in his Session key study.

Between 2017 and 2021, his most popular works were:

  • Medical Image Analysis using Convolutional Neural Networks: A Review. (189 citations)
  • A survey on privacy protection in blockchain system (171 citations)
  • A robust and anonymous patient monitoring system using wireless medical sensor networks (130 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Artificial intelligence

His primary scientific interests are in Authentication, Computer security, Computer network, The Internet and Authentication protocol. His Authentication study integrates concerns from other disciplines, such as Information security, Biometrics, Security analysis, Hash function and Server. His study brings together the fields of Scheme and Computer security.

His study in Computer network is interdisciplinary in nature, drawing from both Cloud computing and Mobile telephony. Muhammad Khurram Khan combines subjects such as Distributed computing and Cache with his study of The Internet. Muhammad Khurram Khan interconnects Forward secrecy, Wireless sensor network and Mutual authentication in the investigation of issues within Password.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Medical Image Analysis using Convolutional Neural Networks: A Review

Syed Muhammad Anwar;Muhammad Majid;Adnan Qayyum;Muhammad Awais.
Journal of Medical Systems (2018)

521 Citations

A survey on privacy protection in blockchain system

Qi Feng;Debiao He;Sherali Zeadally;Muhammad Khurram Khan.
Journal of Network and Computer Applications (2019)

459 Citations

Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’

Muhammad Khurram Khan;Khaled Alghathbar.
Sensors (2010)

431 Citations

An enhanced smart card based remote user password authentication scheme

Xiong Li;Xiong Li;Jianwei Niu;Muhammad Khurram Khan;Junguo Liao.
Journal of Network and Computer Applications (2013)

290 Citations

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

Muhammad Khurram Khan;Soo-Kyun Kim;Khaled Alghathbar.
Computer Communications (2011)

287 Citations

Performance evaluation of score level fusion in multimodal biometric systems

Mingxing He;Shi-Jinn Horng;Pingzhi Fan;Ray-Shine Run.
Pattern Recognition (2010)

268 Citations

Diagnosing COVID-19 pneumonia from X-ray and CT images using deep learning and transfer learning algorithms

Halgurd Maghdid;Aras T. Asaad;Kayhan Zrar Ghafoor Ghafoor;Ali S. Sadiq.
Multimodal Image Exploitation and Learning 2021 (2021)

247 Citations

b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET

Shi-Jinn Horng;Shiang-Feng Tzeng;Yi Pan;Pingzhi Fan.
IEEE Transactions on Information Forensics and Security (2013)

242 Citations

Improving the security of 'a flexible biometrics remote user authentication scheme'

Muhammad Khurram Khan;Jiashu Zhang.
Computer Standards & Interfaces (2007)

242 Citations

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

Ruhul Amin;SK Hafizul Islam;G.P. Biswas;Muhammad Khurram Khan.
Computer Networks (2016)

226 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Muhammad Khurram Khan

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 85

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 71

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 65

Debiao He

Debiao He

Wuhan University

Publications: 54

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 46

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 39

Shehzad Ashraf Chaudhry

Shehzad Ashraf Chaudhry

Abu Dhabi University

Publications: 37

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 37

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 33

SK Hafizul Islam

SK Hafizul Islam

Indian Institute of Information Technology, Kalyani

Publications: 31

Sundarapandian Vaidyanathan

Sundarapandian Vaidyanathan

Vel Tech University

Publications: 30

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 27

Abdullah Gani

Abdullah Gani

University of Malaya

Publications: 26

Mohsen Guizani

Mohsen Guizani

Mohamed bin Zayed University of Artificial Intelligence

Publications: 26

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 25

Mohammad S. Obaidat

Mohammad S. Obaidat

University of Jordan

Publications: 24

Trending Scientists

Alex Pang

Alex Pang

University of California, Santa Cruz

Mykola Pechenizkiy

Mykola Pechenizkiy

Eindhoven University of Technology

Serena DeBeer

Serena DeBeer

Max Planck Society

Warren R. Roper

Warren R. Roper

University of Auckland

Alexander Teumer

Alexander Teumer

Greifswald University Hospital

Jane K. Hill

Jane K. Hill

University of York

Catherine Godson

Catherine Godson

University College Dublin

Geoffrey E. Petts

Geoffrey E. Petts

University of Westminster

Oded Aharonson

Oded Aharonson

Weizmann Institute of Science

Alice Newton

Alice Newton

University of Algarve

David D. Brand

David D. Brand

Veterans Health Administration

Dean Philip McKenzie

Dean Philip McKenzie

Monash University

Susan Chinn

Susan Chinn

King's College London

Kazuyuki Shimada

Kazuyuki Shimada

Nagoya University

Jim McCambridge

Jim McCambridge

University of York

Something went wrong. Please try again later.