Khaled S. Alghathbar, Ph.D.
Affiliations: | 2004 | George Mason University, Washington, DC |
Area:
Computer ScienceGoogle:
"Khaled Alghathbar"Parents
Sign in to add mentorDuminda Wijesekera | grad student | 2004 | George Mason | |
(Incorporating access and flow control policies in requirements engineering.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Halboob W, Mahmod R, Alghathbar KS, et al. (2014) TC-enabled and distributed cloud computing access control model Journal of Applied Sciences. 14: 620-630 |
Azam F, Shafi Khan Z, Sher M, et al. (2014) Attack containment in mobile ad-hoc networks through fair distribution of processing resources Telecommunication Systems. 55: 93-103 |
Wang X, Guo W, Zhang W, et al. (2013) Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network Telecommunication Systems. 52: 515-524 |
Halboob W, Mamat A, Mahmod R, et al. (2013) Trusted-based scalable access control model for broadcast XML documents Information (Japan). 16: 2075-2085 |
Li F, Khan MK, Alghathbar K, et al. (2012) Identity-based online/offline signcryption for low power devices Journal of Network and Computer Applications. 35: 340-347 |
Alam M, Ali T, Khan S, et al. (2012) Analysis of existing remote attestation techniques Security and Communication Networks. 5: 1062-1082 |
Guo X, Zhang J, Khan MK, et al. (2011) Secure chaotic map based block cryptosystem with application to camera sensor networks. Sensors (Basel, Switzerland). 11: 1607-19 |
Eldefrawy MH, Khan MK, Alghathbar K, et al. (2011) Authenticated key agreement with rekeying for secured body sensor networks. Sensors. 11: 5835-5849 |
Siddiqui Z, Abdullah AH, Khan MK, et al. (2011) Analysis of enterprise service buses based on information security, interoperability and high-availability using analytical hierarchy process (AHP) method International Journal of Physical Sciences. 6: 35-42 |
Khan B, Alghathbar KS, Nabi SI, et al. (2011) Effectiveness of information security awareness methods based on psychological theories African Journal of Business Management. 5: 10862-10868 |