H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 73 Citations 15,752 389 World Ranking 691 National Ranking 3

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Computer network
  • Artificial intelligence

Muhammad Khurram Khan mostly deals with Computer security, Computer network, Authentication, Password and Smart card. His work in Mutual authentication, Session key, Authentication protocol, Challenge–response authentication and Anonymity is related to Computer security. His Computer network study combines topics in areas such as Key distribution in wireless sensor networks, Vehicular communication systems and Wireless ad hoc network.

His Authentication study combines topics from a wide range of disciplines, such as Random oracle, Public-key cryptography, Roaming, The Internet and Scheme. The Password study combines topics in areas such as Hash function, Cryptanalysis and Login. His work focuses on many connections between Smart card and other disciplines, such as User authentication, that overlap with his field of interest in Robustness.

His most cited work include:

  • Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ (282 citations)
  • An enhanced smart card based remote user password authentication scheme (209 citations)
  • Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' (208 citations)

What are the main themes of his work throughout his whole career to date?

Muhammad Khurram Khan focuses on Computer security, Computer network, Authentication, Password and Artificial intelligence. In his research on the topic of Computer security, Security analysis is strongly related with Scheme. In Computer network, Muhammad Khurram Khan works on issues like Cloud computing, which are connected to Scalability.

His Authentication research includes elements of Key, Cryptography and Login. His work carried out in the field of Password brings together such families of science as Hash function and Anonymity. His research in Artificial intelligence intersects with topics in Computer vision and Pattern recognition.

He most often published in these fields:

  • Computer security (48.09%)
  • Computer network (26.08%)
  • Authentication (25.60%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (48.09%)
  • Authentication (25.60%)
  • Computer network (26.08%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Authentication, Computer network, The Internet and Scheme. His Computer security study deals with Taxonomy intersecting with Service. The various areas that Muhammad Khurram Khan examines in his Authentication study include Security analysis, Password, Cryptography and Biometrics.

His research links Cloud computing with Computer network. His Authentication protocol research is multidisciplinary, incorporating elements of Wireless sensor network and Hash function. He has included themes like Password cracking and Mutual authentication in his Session key study.

Between 2017 and 2021, his most popular works were:

  • Medical Image Analysis using Convolutional Neural Networks: A Review. (189 citations)
  • A survey on privacy protection in blockchain system (171 citations)
  • A robust and anonymous patient monitoring system using wireless medical sensor networks (130 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Artificial intelligence

His primary scientific interests are in Authentication, Computer security, Computer network, The Internet and Authentication protocol. His Authentication study integrates concerns from other disciplines, such as Information security, Biometrics, Security analysis, Hash function and Server. His study brings together the fields of Scheme and Computer security.

His study in Computer network is interdisciplinary in nature, drawing from both Cloud computing and Mobile telephony. Muhammad Khurram Khan combines subjects such as Distributed computing and Cache with his study of The Internet. Muhammad Khurram Khan interconnects Forward secrecy, Wireless sensor network and Mutual authentication in the investigation of issues within Password.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’

Muhammad Khurram Khan;Khaled Alghathbar.
Sensors (2010)

400 Citations

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

Muhammad Khurram Khan;Soo-Kyun Kim;Khaled Alghathbar.
Computer Communications (2011)

280 Citations

An enhanced smart card based remote user password authentication scheme

Xiong Li;Xiong Li;Jianwei Niu;Muhammad Khurram Khan;Junguo Liao.
Journal of Network and Computer Applications (2013)

253 Citations

Medical Image Analysis using Convolutional Neural Networks: A Review.

Syed Muhammad Anwar;Muhammad Majid;Adnan Qayyum;Muhammad Awais.
Journal of Medical Systems (2018)

251 Citations

Performance evaluation of score level fusion in multimodal biometric systems

Mingxing He;Shi-Jinn Horng;Pingzhi Fan;Ray-Shine Run.
Pattern Recognition (2010)

249 Citations

A survey on privacy protection in blockchain system

Qi Feng;Debiao He;Sherali Zeadally;Muhammad Khurram Khan.
Journal of Network and Computer Applications (2019)

244 Citations

Improving the security of 'a flexible biometrics remote user authentication scheme'

Muhammad Khurram Khan;Jiashu Zhang.
Computer Standards & Interfaces (2007)

240 Citations

Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards

Xiao-Min Wang;Wen-Fang Zhang;Jia-Shu Zhang;Muhammad Khurram Khan.
Computer Standards & Interfaces (2007)

195 Citations

b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET

Shi-Jinn Horng;Shiang-Feng Tzeng;Yi Pan;Pingzhi Fan.
IEEE Transactions on Information Forensics and Security (2013)

191 Citations

Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices

Muhammad Khurram Khan;Jiashu Zhang;Xiaomin Wang.
Chaos Solitons & Fractals (2008)

187 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Muhammad Khurram Khan

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 85

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 71

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 65

Debiao He

Debiao He

Wuhan University

Publications: 54

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 46

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 39

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 37

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 33

Sundarapandian Vaidyanathan

Sundarapandian Vaidyanathan

Vel Tech University

Publications: 30

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 27

Mohsen Guizani

Mohsen Guizani

Qatar University

Publications: 26

Abdullah Gani

Abdullah Gani

University of Malaya

Publications: 26

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 25

Athanasios V. Vasilakos

Athanasios V. Vasilakos

Luleå University of Technology

Publications: 24

Mohammad S. Obaidat

Mohammad S. Obaidat

University of Jordan

Publications: 24

Something went wrong. Please try again later.