2023 - Research.com Computer Science in Saudi Arabia Leader Award
2022 - Research.com Computer Science in Saudi Arabia Leader Award
Muhammad Khurram Khan mostly deals with Computer security, Computer network, Authentication, Password and Smart card. His work in Mutual authentication, Session key, Authentication protocol, Challenge–response authentication and Anonymity is related to Computer security. His Computer network study combines topics in areas such as Key distribution in wireless sensor networks, Vehicular communication systems and Wireless ad hoc network.
His Authentication study combines topics from a wide range of disciplines, such as Random oracle, Public-key cryptography, Roaming, The Internet and Scheme. The Password study combines topics in areas such as Hash function, Cryptanalysis and Login. His work focuses on many connections between Smart card and other disciplines, such as User authentication, that overlap with his field of interest in Robustness.
Muhammad Khurram Khan focuses on Computer security, Computer network, Authentication, Password and Artificial intelligence. In his research on the topic of Computer security, Security analysis is strongly related with Scheme. In Computer network, Muhammad Khurram Khan works on issues like Cloud computing, which are connected to Scalability.
His Authentication research includes elements of Key, Cryptography and Login. His work carried out in the field of Password brings together such families of science as Hash function and Anonymity. His research in Artificial intelligence intersects with topics in Computer vision and Pattern recognition.
His primary areas of investigation include Computer security, Authentication, Computer network, The Internet and Scheme. His Computer security study deals with Taxonomy intersecting with Service. The various areas that Muhammad Khurram Khan examines in his Authentication study include Security analysis, Password, Cryptography and Biometrics.
His research links Cloud computing with Computer network. His Authentication protocol research is multidisciplinary, incorporating elements of Wireless sensor network and Hash function. He has included themes like Password cracking and Mutual authentication in his Session key study.
His primary scientific interests are in Authentication, Computer security, Computer network, The Internet and Authentication protocol. His Authentication study integrates concerns from other disciplines, such as Information security, Biometrics, Security analysis, Hash function and Server. His study brings together the fields of Scheme and Computer security.
His study in Computer network is interdisciplinary in nature, drawing from both Cloud computing and Mobile telephony. Muhammad Khurram Khan combines subjects such as Distributed computing and Cache with his study of The Internet. Muhammad Khurram Khan interconnects Forward secrecy, Wireless sensor network and Mutual authentication in the investigation of issues within Password.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Medical Image Analysis using Convolutional Neural Networks: A Review
Syed Muhammad Anwar;Muhammad Majid;Adnan Qayyum;Muhammad Awais.
Journal of Medical Systems (2018)
A survey on privacy protection in blockchain system
Qi Feng;Debiao He;Sherali Zeadally;Muhammad Khurram Khan.
Journal of Network and Computer Applications (2019)
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
Muhammad Khurram Khan;Khaled Alghathbar.
An enhanced smart card based remote user password authentication scheme
Xiong Li;Xiong Li;Jianwei Niu;Muhammad Khurram Khan;Junguo Liao.
Journal of Network and Computer Applications (2013)
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
Muhammad Khurram Khan;Soo-Kyun Kim;Khaled Alghathbar.
Computer Communications (2011)
Performance evaluation of score level fusion in multimodal biometric systems
Mingxing He;Shi-Jinn Horng;Pingzhi Fan;Ray-Shine Run.
Pattern Recognition (2010)
Diagnosing COVID-19 pneumonia from X-ray and CT images using deep learning and transfer learning algorithms
Halgurd Maghdid;Aras T. Asaad;Kayhan Zrar Ghafoor Ghafoor;Ali S. Sadiq.
Multimodal Image Exploitation and Learning 2021 (2021)
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET
Shi-Jinn Horng;Shiang-Feng Tzeng;Yi Pan;Pingzhi Fan.
IEEE Transactions on Information Forensics and Security (2013)
Improving the security of 'a flexible biometrics remote user authentication scheme'
Muhammad Khurram Khan;Jiashu Zhang.
Computer Standards & Interfaces (2007)
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
Ruhul Amin;SK Hafizul Islam;G.P. Biswas;Muhammad Khurram Khan.
Computer Networks (2016)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: