Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’ MK Khan, K Alghathbar Sensors 10 (3), 2450-2459, 2010 | 440* | 2010 |
Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’ MK Khan, SK Kim, K Alghathbar Computer Communications 34 (3), 305-309, 2011 | 273 | 2011 |
An enhanced smart card based remote user password authentication scheme X Li, J Niu, MK Khan, J Liao Journal of Network and Computer Applications 36 (5), 1365-1371, 2013 | 248 | 2013 |
Performance evaluation of score level fusion in multimodal biometric systems M He, SJ Horng, P Fan, RS Run, RJ Chen, JL Lai, MK Khan, KO Sentosa Pattern Recognition 43 (5), 1789-1800, 2010 | 240 | 2010 |
Improving the security of ‘a flexible biometrics remote user authentication scheme’ MK Khan, J Zhang Computer Standards & Interfaces 29 (1), 82-85, 2007 | 234 | 2007 |
A survey on privacy protection in blockchain system Q Feng, D He, S Zeadally, MK Khan, N Kumar Journal of Network and Computer Applications 126, 45-58, 2019 | 231 | 2019 |
Medical image analysis using convolutional neural networks: a review SM Anwar, M Majid, A Qayyum, M Awais, M Alnowami, MK Khan Journal of medical systems 42 (11), 1-13, 2018 | 228 | 2018 |
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards XM Wang, WF Zhang, JS Zhang, MK Khan Computer Standards & Interfaces 29 (5), 507-512, 2007 | 189 | 2007 |
Dynamic remote data auditing for securing big data storage in cloud computing M Sookhak, MK Khan University of Malaya, 2015 | 188 | 2015 |
b-SPECS+: Batch verification for secure pseudonymous authentication in VANET SJ Horng, SF Tzeng, Y Pan, P Fan, X Wang, T Li, MK Khan IEEE transactions on information forensics and security 8 (11), 1860-1875, 2013 | 182 | 2013 |
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices MK Khan, J Zhang, X Wang Chaos, Solitons & Fractals 35 (3), 519-524, 2008 | 182 | 2008 |
An effective memetic differential evolution algorithm based on chaotic local search D Jia, G Zheng, MK Khan Information Sciences 181 (15), 3175-3187, 2011 | 180 | 2011 |
Advances in Software Engineering T Kim, H Kim, MK Khan, A Kiumi, WC Fang, D Ślęzak Springer-Verlag New York Inc, 2010 | 172* | 2010 |
Securing software defined networks: taxonomy, requirements, and open issues A Akhunzada, E Ahmed, A Gani, MK Khan, M Imran, S Guizani IEEE Communications Magazine 53 (4), 36-44, 2015 | 165 | 2015 |
Millimeter-wave wireless communications for IoT-cloud supported autonomous vehicles: Overview, design, and challenges L Kong, MK Khan, F Wu, G Chen, P Zeng IEEE Communications Magazine 55 (1), 62-68, 2017 | 164 | 2017 |
A privacy preserving three-factor authentication protocol for e-Health clouds Q Jiang, MK Khan, X Lu, J Ma, D He The Journal of Supercomputing 72 (10), 3826-3849, 2016 | 164 | 2016 |
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar Computer Networks 101, 42-62, 2016 | 162 | 2016 |
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service S Iqbal, MLM Kiah, B Dhaghighi, M Hussain, S Khan, MK Khan, ... Journal of Network and Computer Applications 74, 98-120, 2016 | 152 | 2016 |
Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain L Leng, JS Zhang, MK Khan, X Chen, K Alghathbar Int. J. Phys. Sci 5 (17), 2543-2554, 2010 | 152* | 2010 |
A robust and anonymous patient monitoring system using wireless medical sensor networks R Amin, SKH Islam, GP Biswas, MK Khan, N Kumar Future Generation Computer Systems 80, 483-495, 2018 | 151 | 2018 |