faculty

 

 PATENTS 


1. "Face Recognition using Multiresolution Discriminant Analysis, 
US Patent Number 9355303, 2016​

2.   "System and Method for Currency Validation", US​ Patent Number 
8931688, 2015

3.  "Passive Continuous Authentication Method", US Patent Number 8660322, 2014 

4. "One-Time Password Authentication with Infinite Nested Hash Claims", US Patent Number 8683564​, 2014

​5. "Systems and Methods for Three-Factor Authentication", US Patent Number 8862888, 2014 

6. "Systems and Methods for Improving a Cryptosystem using Biometrics", US Patent No.12/755,363, 2010
 
7. "One-Time Password Authentication with Infinite Nested Hash Chains", PCT Application No.: PCT/US10/57125, 2010

8. 
 “A Method to Collect Data of Audience Exposure of Smart TV through Smart Phone’s App”, IPO Application No. 12/2016, 2016​

9.  "
Two Factor Authentication using Biometric Data and Sensor’s Intrinsic Digital Traces", Patent Filed, No. 
012017-00720
, 2017

10. “Internet of Things based Reliable Monitoring System for Oil and Gas Operations”, Saudi Patent Office Application No. 113074, June 2016​

 

 BOOKS/EDITED PROCEEDINGS
1.  J.J.H. Park, H. Jin, Y.S. Jeong, Muhammad Khurram Khan (Eds.), “Advanced Multimedia andUbiquitous Engineering”, ISBN 978-981-10-1535-9, July 2016​

2.   T.H Kim, A. Stoica, W.C Fang, T. Vasilakos, J.G Villalba, K.P. Arnett, Muhammad Khurram Khan, B. H Kang, "Computer Applications for Security, Control and System Engineering", Communications in Computer and Information Science, ISBN: 978-3-642-35263-8​, Springer-Verlag, Dec. 2012 

3.  Muhammad Khurram Khan, A. Mirza, K. Alghathbar, "Proceedings of National Workshop on Information Assurance Research" (WIAR), ISBN: 978-3-8007-3432-0, VDE Verlag Germany, April 2012
 
4.  T.H Kim, H. Adeli, W.C Fang, J.G Villalba, K. P. Arnet, Muhammad Khurram Khan, “Security Technology”, Communications in Computer and Information Science, ISBN 978-3-642-27188-5, Springer-Verlag, 2011
 
5.  T.H Kim, W.C Fang, Muhammad Khurram Khan, K.P. Arnett, H.J Kang, D. Slezak, “Security Technology, Disaster Recovery and Business Continuity”, Communications in Computer and Information Science, ISBN: 978-3-642-17609-8, Springer-Verlag, Germany, 2010
 
6.   T.H Kim, H.K Kim, Muhammad Khurram Khan, A. Kiumi, W.C Fang, D. Slezak, “Advances in Software Engineering”, Communications in Computer and Information Science, ISBN: 978-3-642-17577-0, Springer-Verlag, Germany, 2010
 
7.   C.C Chang, T. Vasilakos, P. Das, T. H. Kim, B.H. Kang, Muhammad Khurram Khan, "Advanced Communication and Networking", Communications in Computer and Information Science, Springer-Verlag, ISBN 978-3-642-13404-3, Germany, June 2010  
 
8.  M. Khalid Anis, Muhammad Khurram Khan, S. Jamal H. Zaidi, Proceedings of 12th IEEE International Multitopic Conference, ISBN: 978-1-4244-2823-6, 2008 
 
 

EDITORIALS
 
1.
Muhammad Khurram Khan, "Laying the Foundation for a Productive New Year", Telecommunication Systems, Springer, vol. 64, issue 1, Jan. 2017

2.   JF. Wan, Muhammad Khurram Khan, M.K. Qiu, D.Q. Zhang, "
Cloud-assisted Industrial Systems and Applications", Mobile Networks and Applications, vol. 21, issue 5, pp. 822-824, Oct. 2016

3. Muhammad Khurram Khan, "Continuous Improvement: A Goal of New Year", Telecommunication Systems, vol. 61, Issue 1, Jan. 2016

4.  J.J. Park, N. Zhang, N.Y. Yen,Muhammad Khurram Khan, "Advanced Communication Models and Services for Smart World", Modelling and Simulation in Engineering, vol. 2015, Article ID 284394, 2015​

5.  Muhammad Khurram Khan, N. Kumar, S Horng, International Journal Ad Hoc and Ubiquitous Computing, vol. 18, Nos. 1/2, 2015

6.  Muhammad Khurram Khan, Y. Xiang, S.J. Horng,  H.H Chen, "Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks", International Journal of Distributed Sensor Networks, vol. 2015, Article ID 958190, 2015

7.   Muhammad Khurram Khan, T. Al-Saud, H. Alkhathlan, H. Derham, “New Reforms of Research, Innovation and Entrepreneurship in the GCC Countries”, Innovation: Management, Policy & Practice, 16(2), pp. 174-176, 2014​

8.  F. Yu, C.C Chang, Muhammad Khurram Khan,T. Cao, M. Ivanovic, "Recent Advances in Information Security", The Scientific World Journal
Article ID 562492, 
2014​

9.  Muhammad Khurram Khan, Y. Xiang, S.J Horng, H.H Chen, "Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks", International Journal of Distributed Sensor Networks, vol. 2013, Article ID 956736, 2013​

10. ​​​​ Muhammad Khurram Khan, "High Performance Biometrics Recognition Algorithms and Systems", Future Generation Computer Systems, Elsevier Science, vol. 28, pp. 210-2011, 2012

11. Muhammad Khurram Khan, “Chaotic Cryptography and Its Applications in Telecommunication Systems”, Telecommunication Systems, Springer-Verlag, DOI: 10.1007/s11235-011-9456-x, June 2011
 
12. Muhammad Khurram Khan, “Guest Editorial for Special Issue on Biometric Systems and Applications”, Telecommunication Systems, Springer-Verlag, Volume 47, Issue 3, pp. 183-184, June 2011 
 
13. Muhammad Khurram Khan, “Research Advances in Data Hiding for Multimedia Security”, Multimedia Tools & Applications, Springer-Verlag, vol. 52, numbers 2-3, pp. 257-261, April 2011
 
14. Muhammad Khurram Khan, Mohamed Kamel, Xudong Jiang, “Special issue on: Recent advances and future directions in biometrics personal identification”, Journal of Network & Computer Applications, Elsevier Science, vol. 33, issue 3, pp. 205-206, May 2010
 
15.  Muhammad Khurram Khan, Khaled Alghathbar, “Special Issue- Information Assurance and Security Engineering”, IETE Technical Review, vol. 27, issue 3, pp, 201-202, May-June 2010
 
JOURNAL PUBLICATIONS

1.      S. Lin, L. Kong, Q. Gao, Muhammad Khurram Khan, Z. Zhong, X. Jin, P. Zeng, “Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G System”, Accepted for Publication, IEEE Wireless Communications, July 2017 [ISI SCI-E]

2.      S.S Anjum, R. M Noor, M. H Anisi, O. Ismail, A. Fazidah, Muhammad Khurram Khan, “Energy Management in RFID-Sensor Networks: Taxonomy and Challenges”, Accepted for Publication, IEEE Internet of Things Journal, July 2017 [ISI SCI-E]

3.      S.A. Soleymani, A.H Abdullah, M.H. Anisi, Muhammad Khurram Khan, S. Goudarzi, T. Khodadadi, A. Altameem, “A Secure Trust Model based on Fuzzy Logic in Vehicular Ad Hoc Networks with Fog Computing”, Accepted for Publication, IEEE Access, July 2017 [ISI SCI-E]

4.      S. Khan, A. Gani, A.W.A Wahab, M. Guizani, Muhammad Khurram Khan, “Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art”, IEEE Communications Surveys and Tutorials, pp. 303-324, vol .19, issue 1, Feb 2017 [ISI SCI-E]

5.      Z. Liu, X. Huang, Z. Hu, Muhammad Khurram Khan, H. Seo, L. Zhou, “On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age”, IEEE Transactions on Dependable and Secure Computing, pp. 237-248, vol. 14, issue 3, May/June 2017 [ISI SCI-E]​

6.      S. Challa, M. Wazid, A.K. Das, Muhammad Khurram Khan, “Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions”, Accepted for Publication, IEEE Consumer Electronics Magazine, June 2017

7.      M. Wazid, A.K Das, Muhammad Khurram Khan, A. Alghaiheb, N. Kumar, A.V. Vasilakos,  “Secure Authentication Scheme for Medicine Anti-counterfeiting System in IoT Environment”, Accepted for Publication, IEEE Internet of Things Journal, May 2017 [ISI SCI-E]

8.      J. Shuja, S.A Madani, S. Mustafaa, R.W Ahmad, A. Gani, Muhammad Khurram Khan, “Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures”, Accepted for Publication, IEEE Access, May 2017 [ISI SCI-E]

9.      S.F Tzeng, S.J Horng, T. Li, X. Wang, P.H. Huang, Muhmmad Khurram Khan, "Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET", IEEE Transactions on Vehicular Technology, vol 66, no. 4, pp. 3235-3248April 2017 [ISI SCI-E]

10.      W.Z Khan, M.Y. Alsalem, Muhammad Khurram Khan, Q. Arshad, "Antecedents Affecting Consumer Trust Towards Adopting Internet of Things Enabled Products", Accepted for Publication, IEEE Consumer Electronics Magazine, April 2017 [ISI SCI-E]

11.      R. Amin, S. Sherratt, D. Giri, SKH Islam, Muhammad Khurram Khan, “A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices”, Accepted for Publication, IEEE Transactions on Consumer Electronics, Feb. 2017 [ISI SCI-E]

12.      A. Akhunzada, Muhammad Khurram Khan, "Towards Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues", Accepted for Publication, IEEE Communications Magazine, Feb. 2017 [ISI SCI-E]

13.      M. Sookhak, F. Yu, Muhammad Khurram Khan, N. Kumar, "Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing", Accepted for Publication, IEEE Vehicular Technology Magazine, Feb. 2017 [ISI SCI-E]  

14.      V. Odelu, AK Das, Muhammad Khurram Khan, K.K.R Choo, M. Jo, “Expressive CP-ABE Scheme for Mobile Devices in IoT satisfying Constant-size Keys and Ciphertexts”, Accepted for Publication, IEEE Access, Feb. 2017 [ISI SCI-E]

15.    A.S. Abiodun, M.H. Anisi, I. Ali, A. Akhunzada, Muhammad Khurram Khan, “A Novel Data Segregation and Classification Technique to Reduce Power Consumption in Wireless Body Area Networks”, Accepted for Publication, IEEE Consumer Electronics Magazine, Feb. 2017​ [ISI SCI-E]

16.     L. Kong, Muhammad Khurram Khan, F. Wu, G. Chen, P. Zeng, “Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges”, IEEE Communications Magazine, vol. 55, issue 1, pp. 62-68 Jan. 2017 [ISI SCI-E]​

17.     D. He, N. Kumar, Muhammad Khurram Khan, L. Wang, J. Shen,  “Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services”, In Press, IEEE Systems Journal, Nov. 2016 [ISI SCI-E]

18.      S. Khan, A. Gani, A.W.A Wahab, A. Abdelaziz, K. Ko, Muhammad Khurram Khan, M. Guizani, “Software Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges”, IEEE Network, pp. 6-13, vol. 30, Issue 6, November-December 2016 [ISI SCI-E]​

19.     M. Zareei, E.M. Mohamed, M.H. Anisi, CV. Rosales, K. Tsukamoto, Muhammad Khurram Khan “On-demand Hybrid Routing for Cognitive Radio Ad-Hoc Network", IEEE Accesspp. 8294-8302, vol. 4, Dec. 2016​ [ISI SCI-E]

20.    S. Khan, A. Gani, A.W.A Wahab, S.Iqbal, A. Abdelaziz, O.A. Mahdi, A.I.A. Ahmed, M.  Shiraz, Y. Al-Mayouf, Z. Khan, K. Ko, Muhammad Khurram Khan, V. Chang, “Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis”, IEEE Access, Nov. 2016 [ISI SCI-E]

21.    X. Li, F. Fu, Muhammad Khurram Khan, L. Xu, J. Shen, M. Jo, “A Secure Chaotic Map-based Remote Authentication Scheme for TelecareMedicine Information Systems”, Accepted for Publication, Future Generation Computer Systems, Elsevier, August 2017 [ISI SCI-E]

22.    M. Tahir, A. Khan, A. Hameed, M. Alam, Muhammad Khurram Khan, F. Jabeen, “Towards a Set Aggregation-based Data Integrity Scheme for Smart Grids”, In Press, Annals of Telecommunications, Springer, August 2017 [ISI SCI-E]​

23.    S. Goudarzi, W.H. Hassan, M.H Anisi, Muhammad Khurram Khan, S.A. Soleymani, “Intelligent Technique for Seamless Vertical Handover in Vehicular Networks”, Accepted for Publication, Mobile Networks and Applications, Springer, August 2017 [ISI SCI-E]

24.    S. Challa, A.K. Das, V. Odelu, N. Kumar, S. Kumari, Muhammad Khurram Khan, A.V. Vasilakos, “An Efficient ECC-based Provably Secure Three-factor User Authentication and Key Agreement Protocol for Wireless Healthcare Sensor Networks”, Accepted for Publication, Computers and Electrical Engineering, Elsevier, July 2017 [ISI SCI-E] 

23.    M. Sookhak, F.R Yu, Muhammad Khurram Khan, Y, Xiang, R. Buyya, “Attribute-Based Data Access Control in Mobile Cloud Computing: Taxonomy and Open Issues”, Future Generation Computer Systems, Elsevier, vol. 72, Pages 273-287, July 2017 [ISI SCI-E]​

24.    R. Amin, S.K.H Islam, P. Vijaykumar, Muhammad Khurram Khan, V. Chang, “A Robust and Efficient Bilinear Pairing based Mutual Authentication and Session Key Verification over Insecure Communication”, In Press, Multimedia Tools and Applications, Springer, July 2017 [ISI SCI-E]​

25.    S. Anwar, Z. Inayat, M.F. Zolkipli, J.M. Zain, A. Gani, N.B.l Anuar, Muhammad Khurram Khan, V. Chang, “Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey”, In Press, Journal of Network and Computer Applications, Elsevier, June 2017 [ISI SCI-E] 

26.    M. Ma, D. He, Muhammad Khurram Khan, J. Chen, “Certificateless Searchable Public Key Encryption Scheme for Mobilehealthcare System”, In Press, Computers & Electrical Engineering, Elsevier, May 2017 [ISI SCI-E]

27.    Z. Xu, L. Wu, Muhammad Khurram Khan, K.K.R Choo, D. He, "A Secure and Efficient Public Auditing Scheme using RSA Algorithm for Cloud Storage", Accepted for Publication, Supercomputing, Springer, May 2017 [ISI SCI-E]

28.    A.A. Osman, A.T. Fong, A. Gani, S. Khan, Muhammad Khurram Khan, “On Software Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues”, The Computer Journal, Oxford University Press, May 2017 [ISI-SCI-E]

29.    R. Amin, SKH Islam, Muhammad Khurram Khan, A. Karati, D. Giri, S. Kumari, “A Two-factor RSA-based Robust Authentication System for Multi-Server Environments”, Accepted for Publication, Security and Communication Networks, May 2017 [ISI SCI-E]

30.    Muhammad Khurram Khan, M. Zakariah, H. Malik, KKR Choo, “A Novel Audio Forensic Dataset for Digital Multimedia Forensics”, Accepted for Publication, Australian Journal of Forensic Sciences, Feb. 2017 [ISI SCI-E]

31.    M. Luo, Y. Zhang, Muhammad Khurram Khan, D. He, “Secure and Efficient Identity-based Mutual Authentication Scheme with Smart Card Using Elliptic Curve Cryptography, Accepted for Publication, International Journal of Communication Systems, Wiley, April 2017 [ISI SCI-E]

32.    Z. Xu, L. Wu, D. He, Muhammad Khurram Khan, “Security Analysis of a Publicly Verifiable Data Possession Scheme for Remote Storage”, Accepted for Publication, Supercomputing, Springer, April 2017 [ISI SCI-E]

33.    J. Shuja, A. Ghani, K. Ko, K. So, S. Mustafa, S.A. Madani, Muhammad Khurram Khan, “SIMDOM: A Framework for SIMD Instruction Translation and Offloading in Heterogeneous MCC Architectures”, Accepted for Publication, Transactions on Emerging Telecommunications Technologies, Wiley, Feb. 2017 [ISI SCI-E]

34.    S.A Chaudhry, H. Naqvi, Muhammad Khurram Khan, "An Enhanced Lightweight Anonymous Biometric based Authentication Scheme for TMIS", In Press, Multimedia Tools and Applications, Springer, Feb. 2017 [ISI SCI-E]

35.      R. Amin, P. Mohit, A. Karati, G.P. Biswas, Muhammad Khurram Khan, “A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System”, Accpted for Publication, Journal of Medical Systems, Springer, Feb. 2017 [ISI SCI-E]

36.    S. Kumari, A.K Das, X. Li, F. Wu, Muhammad Khurram Khan, Q. Jiang, S.K.H Islam, "A Provably Secure Biometrics-based Authenticated Key Agreement Scheme for Multi-server Environments", In Press, Multimedia Tools and Applications, Springer, Feb. 2017 [ISI SCI-E]

37.      A. Nazir, M. Alam. S.U.R Malik, A. Akhunzada, M.N Cheema, Muhammad Khurram Khan, Y. Xiang, "A High-Level Domain-specific Language for SIEM:Design, Development and Formal Verification", Accepted for Publication, Cluster Computing, Springer, Feb. 2017 [ISI SCI-E]

38.      Z. Inayat, A. Gani, N.B. Anuar, S. Anwar, Muhammad Khurram Khan, "Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions", In Press, Arabian Journal for Science and Engineering, Springer, Jan. 2017 [ISI SCI-E]

39.      M. Luo, Y. Zhang, Muhammad Khurram Khan, D. He, "An Efficient Chaos-based Two-party Key Agreement Protocol with Provable Security", Accepted for Publication, International Journal of Communication Systems, Wiley, Jan. 2017 [ISI SCI-E]

40.     L. Wu, J. Wang, D. He, Muhammad Khurram Khan, “Cryptanalysis of An Identity-based Public Auditing Protocolfor Cloud Storage”, Accepted for Publication, Journal of Zhejiang University-Science A, Springer, Jan. 2017 [ISI SCI-E]

41.     M. Zakariah, Muhammad Khurram Khan, O. Tayan, K. Salah, "Digital Quran Computing: Review, Classification, and Trend Analysis", Accepted for Publication, Arabian Journal for Science and Engineering, Springer, Jan. 2017 [ISI SCI-E]

42.      M. Zakariah, Muhammad Khurram Khan, H. Malik, "Digital Multimedia Audio Forensics: Past, Present and Future​", Accepted for Publication, Multimedia Tools and Applications, Springer, Dec. 2016 [ISI-SCI-E]

43.      M.H Rehman, L.C Sun, T.Y Wah, Muhammad Khurram Khan, “Towards Next-generation Heterogeneous Mobile Data Stream Mining Applications: Opportunities, Challenges, and Future Research Directions”, Accepted for Publication, Journal of Network and Computer Applications, Elsevier, Nov. 2016 [ISI SCI-E]

44.      WZ Khan, MY Aalsalem, Muhammad Khurram Khan, Q. Arshad, “When Social Objects Collaborate: Concepts, Processing Elements, Attacks and Challenges”, In Press, Computers and Electrical Engineering, Elsevier, Nov. 2016 [ISI SCI-E]

45.     D. He, H. Wang, Muhammad Khurram Khan, L. Wang, “Lightweight Anonymous Key Distribution Scheme for Smart Grid Using Elliptic Curve Cryptography” IET Communications, vol. 10, issue 14, pp. 1795-1802, 2016​ [ISI SCI-E]

46.    X. Li, A.K Sangaiah, S. Kumari, F. Wu, J. Shen, Muhammad Khurram Khan, “An Efficient Authentication and Key Agreement Scheme with User Anonymity for Roaming Service in Smart City”, Accepted for Publication, Personal and Ubiquitous Computing, Springer, Nov. 2016 [ISI SCI-E]

47.      F. Wu, L. Xu, S. Kumari, X. Li, Muhammad Khurram Khan, "An Enhanced Mutual Authentication and Key Agreement Scheme for Mobile User Roaming Service in Global Mobility Networks", Accepted for Publication, Annals of Telecommunications, Springer, Oct. 2016 [ISI SCI-E]

48.      T. Maitra, SKH Islam, R. Amin, D. Giri, Muhammad Khurram Khan, N. Kumar, “An Enhanced Multi-server Authentication Protocol using Password and Smart-card: Cryptanalysis and Design”, Accepted for Publication, Security and Communication Networks, Sept. 2016 [ISI SCI-E]

49.      I. Khan, S.A Chaudhry, M. Sher, J.I Khan, Muhammad Khurram Khan, “An Anonymous and Provably Secure Biometric based Authentication Scheme Using Chaotic Maps for Accessing Medical Drop Box Data”, Accepted for Publication, Journal of Supercomputing, Springer, Sept. 2016 [ISI SCI-E]

50.      S.A Chaudhry, M.T. Khan, Muhammad Khurram Khan, T. Shon, “A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography”, Journal of Medical Systems, Springer, vol. 40, Nov. 2016 [ISI SCI-E]

49.      S.A. Chaudhry, I. Khan, A. Irshad, M.U. Ashraf, Muhammad Khurram Khan, H.F Ahmed, “A Provably Secure Anonymous Authentication Scheme for Session Initiation Protocol”, Accepted for Publication, Security and Communication Networks, Sept. 2016 [ISI SCI-E]

50.      M. Karuppiah, S. Kumari, X. Li, F. Wu, A.K Das, Muhammad Khurram Khan, R. Saravanan, S. Basu, “A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks”, Accepted for Publication, Wireless Personal Communications, Springer, Sept. 2016 [ISI SCI-E]

51.      J. Shuja, A. Gani, MH Rehman, RW Ahmad, E. Ahmed, SA Madani, Muhammad Khurram Khan, “Towards Native Code Offloading based MCC Frameworks for Multimedia Applications: A Survey”, Accepted for Publication, Journal of Network and Computer Applications, Elsevier, August 2016 [ISI SCI-E]

52.      R. Amin, SKH Islam, G.P. Biswas, D. Giri, Muhammad Khurram Khan, N. Kumar, “A More Secure and Privacy-aware Anonymous User Authentication Scheme for Distributed Mobile Cloud Computing Environments”, Accepted for Publication, Security and Communication Networks, August 2016​ [ISI SCI-E]

53.      M. Khattak, MA Ihsan, S. Farooq, JAK Manzoor, M. Alam, Q. Javaid, A. Akhunzada, Muhammad Khurram Khan, “Optimizing SIEM Throughput on the Cloud Using Parallelization”, Accepted for Publication, PLOS ONE, August 2016​ [ISI SCI-E]

54.      S. Iqbal, MLM Kiah, NB Anuar, S. Khan, Muhammad Khurram Khan, KKR Choo, “On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service”, Accepted for Publication, Journal of Network and Computer Applications, Elsevier, August 2016 [ISI SCI-E]

55.      S. Goudarzi, W.H Hassan, M.H. Anisi, A. Soleymani, M. Sookhak, Muhammad Khurram Khan, “ABC-PSO for Vertical Handover in Heterogeneous Wireless Networks”, Accepted for Publication, Neurocomputing, Elsevier, Aug. 2016 [ISI SCI-E]

56.      S. Kumari, A.K Das, M. Wazid, X. Li, F. Wu, K.K.R Choo, Muhammad Khurram Khan, “On the Design of a Secure User Authentication and Key Agreement Scheme for Wireless Sensor Networks”, Concurrency and Computation: Practice and Experience, Wiley, July 2016 [ISI SCI-E]

57.      S.A Chaudhry, H. Naqvi, K. Mahmood, H.F. Ahmad · Muhammad Khurram Khan, “An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography”, Accepted for Publication, Wireless Personal Communications, Springer, July 2016​ [ISI SCI-E]

58.      M. Liaqat, A. Gani, M.H Anisi, S.H.A Hamid, A. Akhunzada, Muhammad Khurram Khan, R.A Ali, “Distance-based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks, In Press, PLOS ONE, August 2016​ [ISI SCI-E]

59.      M. Wazid, A.K Das, S. Kumari, Muhammad Khurram Khan, “Design of Sinkhole Node Detection Mechanism for Hierarchical Wireless Sensor Networks”, Accepted for Publication, Security & Communication Networks, August 2016​ [ISI SCI-E]

60.      S. Kumari, L. Xiong, F. Wu, A.K. Das, O Vanga, Muhammad Khurram Khan, “A User Anonymous Mutual Authentication Protocol”, Accepted for Publication, KSII Transactions on Internet and Information Systems, July 2016 [ISI SCI-E]

61.      M.Y. Aalsalem, W.Z. Khan, N.M. Saad, M.S. Hossain, M. Atiquzzaman, Muhammad Khurram Khan,  “A New Random Walk for Replica Detection in WSNs”, Accepted for Publication, PLOS ONE, June 2016 [ISI SCI-E]

62.      R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan, N. Kumar, “A Robust and Anonymous Patient Monitoring System using Wireless Medical Sensor Networks”, Accepted for Publication, Future Generation Computer Systems, Elsevier, May 2016 [ISI SCI-E]

63.      H. Shen, D. He, Muhammad Khurram Khan, J.H Lee “Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things”, Accepted for Publication, Wireless Personal Communications, Springer, May 2016 [ISI SCI-E]

64.      V. Odelu, A.K. Das, Y. S Rao, S. Kumari, Muhammad Khurram Khan, K.K.R Choo, “Pairing-based CP-ABE with Constant-size Ciphertexts and Secret Keys for Cloud Environment”, Accepted for Publication, Computer Standards & Interfaces, Elsevier, May 2016 [ISI SCI-E] 

65.      M.S. Farash, S.A. Chaudhry, K. Mahmood, Muhammad Khurram Khan, “A Provably Secure RFID Authentication Protocols Based on Elliptic Curve for Healthcare Environments”, Accepted for Publication, Journal of Medical Systems, Springer, May 2016 [ISI SCI-E]

66.      S. Kumari, X. Li, F. Wu, A.K. Das, H. Arshad, Muhammad Khurram Khan, “User Friendly Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks using Chaotic Maps”, In Press, Future Generation Computer Systems, Elsevier, April 2016 [ISI SCI-E]

67.      F. Wu, L. Xu, S. Kumari, X. Li, A.K. Das, Muhammad Khurram Khan, M. Karuppiah, R. Baliyani, “A Novel and Provable Authentication and Key Agreement Scheme with User Anonymity for Global Mobility Networks”, Accepted for Publication, Security and Communication Networks, Wiley, April 2016 [ISI SCI-E]

68.    X. Li, J. Niu, S. Kumari, SKH Islam, F. Wu, Muhammad Khurram Khan, AK Das, “A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security”, In Press, Wireless Personal Communications, Springer, April 2016 [ISI SCI-E]

69.      A. Karim, R. Salleh, Muhammad Khurram Khan, A. Siddiqa, K.K.R Choo, “On the Analysis and Detection of Mobile Botnet Applications”, Accepted for Publication, Journal of Universal Computer Science, April 2016 [ISI SCI-E]

70.      A. Yousafzai, A. Ghani, R.M Noor, M. Sookhak, R. W Ahmad, M. Shiraz, Muhammad Khurram Khan, "Cloud Resource Allocation Schemes: Review, Taxonomy, and Opportunities",  Accepted for Publication, Knowledge and Information Systems, Springer, March 2016 [ISI SCI-E]

71.      SKH Islam, G.P Biswas, M.S Obaidat, Muhammad Khurram Khan, R. Amin, “Provably Secure Pairing-free Identity-based Partially Blind Signature Scheme and its Application in Online e-cash System”, Accepted for Publication, The Arabian Journal for Science and Engineering, March 2016 [ISI SCI-E]​

72.     Z. Inayat, A. Gani, NB Anuar, Muhammad Khurram Khan, S. Anwar, "Intrusion Response Systems: Foundations, Design, and Challenges", Journal of Network and Computer Applications, Elsevier, pp. 53-74, vol. 62, Feb. 2016 [ISI SCI-E]

73.      SKH Islam, AK Das, Muhammad Khurram Khan, "Design of a Provably Secure Identity-based Digital Multi-signature Scheme using Biometrics and Fuzzy Extractor”, Accepted for Publication, Security and Communication Networks, Wiley, Feb. 2016 [ISI SCI-E]

74.      A. Karim, R. Saleh, Muhammad Khurram Khan, “SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications”, Accepted for Publication, PLOS ONE, Feb. 2016 [ISI SCI-E]

75.      S. Kumari, Muhammad Khurram Khan, X. Li, F. Wu, "Design of a User Anonymous Password Authentication Scheme without Smart Cards", International Journal of Communication Systems, Wiley, pp. 441-458, vol. 29, issue 3, Feb. 2016 [ISI SC-E]

76.      M. Jahanirada, N.B. Anuara, A. W. A Wahaba, R.M. Noora, M. Sookhak, F.R. YU, J. Abawajy, Muhammad Khurram Khan, "A Cooperative Co-evolutionary Immune System Detection Mechanism (CoCo-ISDM)", Accepted for Publication, Journal of Computer and System Sciences, Elsevier, Feb. 2016 [ISI SCI-E]

77.      Q. Jiang, Muhammad Khurram Khan, X. Lu, J. Ma, D. He, "A Privacy Preserving Three-factor Authentication Protocol for e-Health Clouds", In Press, The Journal of Supercomputing, Jan. 2016 [ISI SCI-E]

78.      R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan, L. Leng, N. Kumar, “Design of Anonymity Preserving Three-Factor Authenticated Key Exchange Protocol for Wireless Sensor Network", In Press, Computer Networks, Elsevier, Jan. 2016 [ISI SCI-E]

79.      W.Z Khan, Muhammad Khurram Khan, F.B Muhaya , M.Y Aalsalem, H.C Chao,  “A Comprehensive Study of Email Spam Botnet Detection”, IEEE Communications Surveys and Tutorials, vol. 17, issue 4, pp. 2271-2295, Nov. 2015 [ISI SCI-E]

80.      A. Akhanzada, E. Ahmed, A. Gani, Muhammad Khurram Khan, M. Imran, S. Guizani, “Securing the Software Defined Networks: Taxonomy, Requirements, and Open Issues”, IEEE Communications Magazine, pp. 36-44, vol. 53, issue 4, April 2015 [ISI SCI-E]

81.      P.W Tsai, Muhammad Khurram Khan, J.S Pan, B.Y Liao, "Interactive Artificial Bee Colony Supported Passive Continuous Authentication System", IEEE Systems Journal, vol. 8, no. 2,  pp. 395-405, 2014 [ISI SCI-E]​​     

82.      S.J Horng, S.F Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, Muhammad Khurram Khan, "b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET", IEEE Transactions on Information Forensics and Securityvol. 8, issue 11, pp. 1860-1875, Nov. 2013 [ISI SCI-E]
 
83.      D. He, N. Kumar, Muhammad Khurram Khan, J. H Lee, "Anonymous Two-factor Authentication for Consumer Roaming Service in Global Mobility Networks",  IEEE Transactions on Consumer Electronics, vol. 59, no. 4, pp. 811-817, Nov. 2013 [ISI SCI-E]   

84.      A. Akhunzadaa, A. Gani, N.B. Anuar, A. Aziz, Muhammad Khurram Khan, A. Hayat, S.U. Khan,"Secure and Dependable Software Defined Networks", In Press, Journal of Network and Computer Applications, Elsevier Science, Dec. 2015​​​ [ISI SCI-E]

85.      R. Amin, SKH Islam , G. P. Biswas, Muhammad Khurram Khan, MS. Obaidat, "Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System", Journal of Medical Systems, Springer, vol. 39, Issue 11, Nov 2015 [ISI SCI-E]​ 

86.      SKH Islam, AK Das, Muhammad Khurram Khan, "A Novel Biometric-based Password Authentication Scheme for Client-server Environment using ECC and Fuzzy Extractor", Accepted for Publication, International Journal of Adhoc and Ubiquitous Computing, Nov. 2015 [ISI SCI-E]

87.      SA Chaudhry, K. Mahmood, H. Naqvi, Muhammad Khurram Khan, "An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems based on Elliptic Curve Cryptography", Journal of Medical Systems, Springer, vol. 39, issue 11, Nov. 2015 [ISI SCI-E]

88.      R. Amin, SK Hafizul Islam, G. P. Biswas, M. K. Khan, X. Li, “Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems”, Journal of Medical Systems, Springer, vol. 39, issue 11, Nov. 2015​ [ISI SCI-E]​

89.    ​S.J Horng, S.F Tzeng, PH Huang, X. Wang, T. Li, Muhammad Khurram Khan, "An Efficient Certificateless Aggregate Signature with Conditional Privacy-Preserving for Vehicular Sensor Networks", vol. 317, issue 1, pp. 48-66, Information Sciences, Elsevier, Oct. 2015 [ISI SCI-E]

90.    M. Alizadeh, M. Zamani, S. Baharun, A. AbdulManaf, K.Sakurai, H. Anada, H. Keshavarz, S. A Chaudhry, Muhammad Khurram Khan, "Cryptanalysis and Improvement of 'A Secure Password Authentication Mechanism for Seamless Handover in ProxyMobile IPv6 Networks”, Accepted for Publication, PLOS ONE, Oct. 2015 [ISI SCI-E]

91.    S. Kumari, F. Wu, X. Li, MS Farash, Qi Jiang, Muhammad Khurram Khan, A.K Das, "Single Round-trip SIP Authentication Scheme with Provable Security for Voice over Internet Protocol using Smart Card, Multimedia Tools and Applications, Springer, vol. 75, Issue 24, pp 17215-17245, December 2016 [ISI SC-IE]

92.    R. Amin, SKH Islam, G. P. Biswas, Muhammad Khurram Khan, N. Kumar, “An Efficient and Practical Smart Card Based Anonymity Preserving UserAuthentication Scheme for TMIS using Elliptic Curve Cryptography”, Accepted for Publication, Journal of Medical Systems, Springer, Sept. 2015 [ISI SCI-E]

93.    M. Sookhak, A. Gani, Muhammad Khurram Khan, R.Buyya, "Dynamic Remote Data Auditing for Securing Big Data Storage in Cloud Computing", Information Sciences, Elsevier, pp. 101-116, vol. 380, February 2017 [ISI SCI-E] ​

94.     S. Kumari, L. Xiong, F. Wu, SA. Chaudary, Muhammad Khurram Khan, “An improved smart card based authentication scheme for session initiation protocol", Accepted for Publication, Peer-to-Peer Networking and Applications, Springer, August 2015 [ISI SCI-E]

95.     SKH Islam, MS Farash, G. P. Biswas, Muhammad Khurram Khan, MS Obaidat, “A Pairing-free Certificateless Digital Multisignature Scheme using Elliptic Curve Cryptography”, Accepted for Publication, International Journal of Computer Mathematics, Taylor & Francis, August 2015 [ISI SCI-E]

96.      S.K.H Islam, Muhammad Khurram Khan, X. Li, “Security Analysis and Improvement of `A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'”, PLOS ONE, August 2015 [ISI SCI-E]

97.      M.S Farash, S.A Chaudhry, M. Hyderi, M.S. Sadough, S. Kumari, Muhammad Khurram Khan, “A Lightweight Anonymous Authentication Scheme for Consumer Roaming in Ubiquitous Networks with Provable Security", Accepted for Publication, International Journal of Communication Systems, Wiley, June 2015 [ISI SCI-E]

98.      S. A Chaudhry, M.S Farash, H. Naqvi, S. Kumari, Muhammad Khurram Khan, "An Enhanced Privacy Preserving Remote User Authentication Scheme with Provable Security", Accepted for Publication, Security and Communication Networks, June 2015 [ISI SCI-E]​

99.      Muhammad Khurram Khan, A. Chaturvedi, D. Mishra, Saru Kumari,  “On the Security Enhancement of Integrated Electronic Patient Records Information Systems”, Computer Science and Information Systems, vol. 12, issue 2, June 2015 [ISI SCI-E]

100.     J. Dongli, D. Xintao, Muhammad Khurram Khan, “Modified Artificial Bee Colony Optimization with Block Perturbation Strategy”, Engineering Optimization, Taylor & Francis, vol. 47, issue 5, pp. 642-655, May 2015​ [ISI SCI-E]

101.     S. Kumari, Muhammad Khurram Khan, M. Atiquzzaman, "User Authentication Schemes for Wireless Sensor Networks: A Review”, Ad Hoc Networks, Elsevier, vol. 27, pp.159-194​, April 2015 [ISI SCI-E]​

102.     Z. Siddiqui, A. Hanan, Muhammad Khurram Khan, A. Alghamdi, "Cryptanalysis and Improvement of ‘A Secure Authentication Scheme for Telecare Medical Information System’ with Nonce Verification", In Press, Peer-to-Peer Networking and Applications, Springer, April 2015 [ISI SCI-E]

103.      W. Zhang, X. Wang, Muhammad Khurram Khan, “A Virtual Bridge Certificate Authority-based Cross-domain Authentication Mechanism for Distributed Collaborative Manufacturing Systems​”, Security & Communication Networks, Wiley, pp. 937-951, vol. 8, issue 6, April 2015​ [ISI SCI-E]

104.     W. Halboob, H. Abbas, Muhammad Khurram Khan, F.A Khan, M. Pasha, “A Framework to Address Inconstant User Requirements in Cloud SLAs Management”, Cluster Computing, Springer, vol. 18, Issue 1, pp. 123-133, March 2015 [ISI SCI-E]

105.      E. Ahmed, A. Gani, Muhammad Khurram Khan, R. Buyya, SU Khan, “Seamless Application Execution in Mobile Cloud Computing: Motivation, Taxonomy, and Open Challenges”,  Journal of Network & Computer Applications, Elsevier, March 2015 [ISI SCI-E]

106.    SKH Islam, Muhammad Khurram Khan, MS. Obaidat, Fahad Muhaya, “Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks using Extended Chaotic Maps”, In Press, Wireless Personal Communications, Springer, March 2015 [ISI SCI-E]

107.     X. Li, J. Liao, S. Kumari, W. Liang, F. Wu, Muhammad Khurram Khan, “A New Dynamic ID based User Authentication Scheme using Mobile Device: Cryptanalysis, the Principles and Design”, In Press, Wireless Personal Communications, Springer, Feb. 2015 [ISI SCI-E]

108.   A. Akhunzada, M. Sookhak, Nor Badrul Anuar, A. Gani, E. Ahmed, S. Furnell, A. Hyat, Muhammad Khurram Khan, “Man-At-The-End Attacks: Analysis, Taxonomy, Human Aspects, Motivation and Future Directions”, Journal of Network and Computer Applications, Elsevier, vol. 48, pp. 44-57, February 2015 [ISI SC-E]

109.    H. Debiao, Muhammad Khurram Khan, N. Kumar, "A New Handover Authentication Protocol based on Bilinear Pairing Functions for Wireless Networks"​, International Journal of Ad hoc and Ubiquitous Computing pp. 67-74, vol. 18, nos. 1/2, 2015​. [ISI SCI-E]​

110.    B. Huang, Muhammad Khurram Khan, L. Wu, F. B Muhaya, D. He, “An Efficient Remote User Authentication with Key Agreement Scheme using Elliptic Curve Cryptography”, In Press, Wireless Personal Communications, Springer, Feb. 2015 [ISI SCI-E]

111.    M. Sookhak, A. Akhunzada, A. Sookhak, M. Eslaminejad, A. Gani, Muhammad Khurram Khan, L. Xiong, WX Ming, “Geographic Wormhole Detection in Wireless Sensor Network”, PLOS ONE, vol. 10, issue 1, Jan. 2015 [ISI SCI-E]

112.    D. Mishra, S. Kumari, Muhammad Khurram Khan, S. Mukhopadhya, “An Anonymous Biometric Based Remote User Authenticated Key Agreement Scheme for Multimedia Systems”, Accepted for Publication, International Journal of Communication Systems, Wiley, Jan. 2015 [ISI SCI-E]

113.    X Li, JW Niu, S Kumari, Muhammad Khurram Khan, JG Liao, W Liang, “Design and Analysis of a Chaotic Maps-based Three Party Authenticated Key Agreement Protocol”, Accepted for Publication, Nonlinear Dynamics, Springer, Jan. 2015 [ISI SCI-E]

114.    X. Li, J. Niu, S. Kumari, J.Liao, W. Liang, Muhammad Khurram Khan, "A New Authentication Protocol for Healthcare Application using Wireless Medical Sensor Networks with User Anonymity", Accepted for Publication, Security and Communication Networks, Wiley, Jan. 2015 [ISI SCI-E]

115.    S. Kumari, Muhammad Khurram Khan, "Cryptanalysis and Improvement of ‘A Robust Smart-Card-Based Remote User Password Authentication Scheme’", International Journal of Communication Systems, Wiley, pp. 3939–3955, vol. 27, issue 12, Dec. 2014. [ISI SCI-E]

116.    S. Kumari, Muhammad Khurram Khan, X. LI, "A More Secure Digital Rights Management Authentication Scheme Based on Smart Card, Accepted for Publication, Multimedia Tools and Applications, Springer, Nov. 2014 [ISI SCI-E]

117.     S.J Horng, S.F Tzeng, X.Wang, S. Qiao, X. Gong, Muhammad Khurram Khan, "Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs", vol 79, Issue 2, pp. 1445-1454, Wireless Personal Communications, Springer, November 2014, [ISI SCI-E]

118.     M.H Eldefrawy, Muhammad Khurram Khan, "Banknote Validation Through Embedded RFID Chip and NFC-enabled Smart Phone", In Press, Mathematical Problems in Engineering, Nov. 2014 [ISI SCI-E]

119.     S. J Horng, D. Rosiyadi, P. Fan, X. Wang, Muhammad Khurram Khan, "An Adaptive Watermarking Scheme for e-government Document Images", Multimedia Tools and Applications, Springer-Verlag, vol. 72, issue 3, pp. 3085-3103, Oct. 2014 [ISI SCI-E]  

120.     S.K.H Islam, Muhammad Khurram Khan, A.M. Al-Khouri, “Anonymous and Provably Secure Certificateless Multireceiver Encryption without Bilinear Pairing”, Accepted for Publication, Security and Communication Networks, Wiley, Oct. 2014 [ISI SCI-E]

121.     M. Shookhak, H. Talebian, E. Ahmed, A. Gani, Muhammad Khurram Khan, “A Review on Remote Data Auditing in Single Cloud Server:  Taxonomy and Open Issues”, Journal of Network & Computer Applications, Elsevier, vol 43, pp. 121-141, August 2014 [ISI SCI-E]

122.      SKH Islam, Muhammad Khurram Khan , "Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems, Journal of Medical Systems, Springer, August 2014 [ISI SCI-E]

123.    D. Jia, X. Duan, Muhammad Khurram Khan, "Binary Artificial Bee Colony Optimization Using Bitwise Operation”, Accepted for Publication, Computers & Industrial Engineering, Elsevier, August 2014 [ISI SCI-E]

124.    L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, "Orientation Range of Transposition for Vertical Correlation Suppression of 2DPalmPhasor Code”, Accepted for Publication, Multimedia Tools & Applications, Springer, August 2014 [ISI SCI-E]

125.    S.H Islam, Muhammad Khurram Khan, "Provably Secure and Pairing-free Identity-based Handover Authentication Protocol for Wireless Mobile Networks", Accepted for Publication, International Journal of Communication Systems, Wiley, July 2014 [ISI SCI-E]

126.    Y. Zhang, Muhammad Khurram Khan, J. Chen, D. He, "Provable Secure and Efficient Digital Rights Management Authentication Scheme using Smart Card based on Elliptic Curve Cryptography", Mathematical Problems in Engineering, In Press, July 2014 [ISI SCI-E]

127.    M. Sookhak, A. Akhunzada, A. Gani, Muhammad Khurram, “Towards Dynamic Remote Data Auditing in Computational Clouds”, In Press, Scientific World Journal, May 2014 [ISI SCI-E]

128.    S. Kumari, Muhammad Khurram Khan, X. Li, "An Improved Remote User Authentication Scheme with Key Agreement", In Press, Computers & Electrical Engineering, Elsevier Science, May 2014 [ISI SCI-E]

129.    D. Mishra, S. Mukhopadhyay,  S. Kumari, Muhammad Khurram Khan, "Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce", Journal of Medical Systems, Springer, vol. 38, Issue 5, April 2014 [ISI SCI-E]

130.    Muhammad Khurram Khan, S. Kumari, "Cryptanalysis and Improvement of ‘An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems’", Security and Communication Networks, John Wiley & Sons, vol. 7, issue 2, pages 399-408, Feb. 2014​. [ISI SCI-E]

131.    D. Mishra, S. Mukhopadhyay, A. Chaturvedi, S. Kumari, Muhammad Khurram Khan, “Cryptanalysis and Improvement of Yan et al.'s Biometric-based Authentication Scheme for Telecare Medicine Information Systems”, Journal of Medical Systems, Springer, vol. 38, issue 24, June 2014 [ISI SCI-E]​​​​ 

132.    Xi Li, J. Niu, Muhammad Khurram Khan, J. Liao, X. Zhao, "Robust three-factor Remote User Authentication Scheme with Key Agreement for Multimedia Systems", In Press, Security and Communication Networks, Wiley, March 2014 [ISI SCI-E]

133.    L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, "Analysis of Correlation of 2DPalmHash Code and Orientation Range Suitable for Transposition", Neurocomputing, Elsevier, vol. 131, issue 5, pp. 377-387​, May 2014 [ISI SCI-E]​ 

134.     F. Kurniawan, M.S. Khalil, Muhammad Khurram Khan, Y. Alginahi, "Two-layer Fragile Watermarking Method Secure with Chaotic-map for Authentication of Digital Holy Quran”, Scientific World Journal, Hindawi, vol. 2014, Article ID 803983, 2014 [ISI SCI-E]

135.     Z. Siddiqui, A.H Abdullah, Muhammad Khurram Khan, Abdullah S.G, "Smart Environment as a Service: Three Factor Cloud based User Authentication for Telecare Medical Information System​", Journal of Medical Systems, Springer, vol.  38, issue 1, Jan. 2014 [ISI SCI-E]

136.     Muhammad Khurram Khan, S. Kumari, "An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks", International Journal of Distributed Sensor Networks, vol. 2014, Article ID 347169​, 2014. [ISI SCI-E] 

137.     D. He, J. Chen, W. Shi, Muhammad Khurram Khan, "On the Security of An Authentication Scheme for Multi-server Architecture", International Journal of Electronic Security and Digital Forensics, vol. 5, no. 3/4, pp. 288-296, 2013.

138.     S. Kumari, Muhammad Khurram Khan, "More Secure Smart Card Based Remote User Password Authentication Scheme with User Anonymity, In Press, Security and Communication Networks, Wiley, Sept. 2013 [ISI SCI-E]

139.     D. He, Muhammad Khurram Khan,  "Cryptanalysis of aKey Agreement Protocol based on Chaotic Hash", International Journal Electronic Security and Digital Forensics, vol. 5, nos. 3/4, pp. 172-177, 2013.

140.     F. Li, M. Fahad, Muhammad Khurram Khan, T. Takagi, “Lattice-based Signcryption”, Concurrency and Computation: Practice and Experience, vol. 25, Issue 14, pp. 2112-2122, Sept. 2013. [ISI SCI-E]

141.     S. Kumari, M.K Gupta, Muhammad Khurram Khan, X. Li, "An Improved Timestamp-bassed Password Authentication Schemem: Comments, Cryptanalysis and Improvement", In Press, Security and Communication Networks, Wiley, Sept. 2013 [ISI SCI-E]

142.     Muhammad Khurram Khan, S. Kumari,  "An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity", BioMed Research International, vol. 2013, Article ID 491289, 2013. [ISI SCI-E]

143.      L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, "A Remote Cancelable Palmprint Authentication Protocol Based on Multi-directional Two-dimensional PalmPhasor-Fusion", In Press, Security and Communication Networks, John-Wiley & Sons, September 2013 [ISI SCI-E]

144.    Muhammad Khurram Khan, S. Kumari, "An Authentication Scheme for Secure Access to Healthcare Services", Journal of Medical Systems, vol. 37, Issue 4, Springer-Verlag, July 2013​​. [ISI SCI-E]​

145.     S. J Horng, D. Rosiyadi, T. Li, T. Takao, M. Guo, Muhammad Khurram Khan, "A Blind Image Copyright Protection Scheme for e-government"​,  Journal of Visual Communication and Image Representation, Elsevier Science, vol. 24, issue 7, pp. 1099-1105, Oct. 2013. [ISI SCI-E]    

146.     S.J Horng, L.Y Hsu, T. Li, S. Qiao, X. Gong, H.H Chou, Muhammad Khurram Khan, "Using Sorted Switching Median Filter to Remove High-Density Impulse Noise", Journal of Visual Communication and Image Representation, vol. 24, Issue 7, pp. 956-967, Elsevier Sciecne, Oct. 2013. [ISI SCI-E]

147.     S.J Horng, S.F Tzeng, P. Fan, X. Wang, T. Li, Muhammad Khurram Khan, “Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles”, KSII Transactions on Internet and Information Systems, vol. 7, issue 6, pp. 1512-1532, June 2013. [ISI SCIE]

148.     S. Kumari, Muhammad Khurram Khan, R. Kumar, "Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'", Journal of Medical Systems, Springer-Verlag, vol. 37, number 4, May 2013. [ISI SCI-E]

149.     Muhammad Khurram Khan, S. Kumari, P. Singh, “Cryptanalysis of an ‘Efficient-Strong Authentication Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks’”, KSII Transactions on Internet and Information Systems, vol. 7, issue 5, pp. 967-979, May. 2013. [ISI SCI-E]​

150.    Muhammad Khurram Khan, S. Kumari, M.K. Gupta, "More Efficient Key-Hash Based Fingerprint Remote Authentication Scheme Using Mobile Device", In Press, Computing, Springer-Verlag, Feb. 2013. [ISI SCI-E] 
 
151.    W. Halboob, A. Mamat, R. Mahmod, K. Alghathbar, Muhammad Khurram Khan, “Trust-based Scalable Access Control Model for Broadcast XML Documents”, Information, vol. 16, no. 3(A), pp. 2075-2086March 2013.  [ISI SCI-E]

152.    D. He, Muhammad Khurram Khan, S. Wu, "On the Security of a RSA-based Certificateless Signature Scheme", International Journal of Network Security, vol.15, no.6, pp.408-410, 2013

153.    M. Mahmud,  M. Mogy,  Muhammad Khurram Khan,  K. Alghathbar, S.S Yeo, "Designing User Profiling Prototype for Identification of Malicious Forums", Information, vol. 16, no. 3(A), pp. 1679-1692, March 2013. [ISI SCI-E] 

154.    X. Li, J. Niu, Muhammad Khurram Khan, J. Liao, "An Enhanced Smart Card based Remote User Password Authentication Scheme", In Press, Journal of Network & Computer Applications, Elsevier Science, Feb. 2013. [ISI SCI-E]

155.     Muhammad Khurram Khan, H.D Biao, “Cryptanalysis of a Certificateless Aggregate Signature Scheme for Mobile Computation”, In Press, Applied Mathematics & Information Sciences, Jan. 2013. [ISI SCI-E]

156.    J. Dongli, X. Duan, Muhammad Khurram Khan, "An Efficient Binary Differential Evolution with Parameter Adaptation", International Journal of Computational Intelligence Systems, pp. 328-336, vol. 6, issue 2, Feb. 2013. [ISI SCI-E] 

157.     X. Li, J. Niu, Muhammad Khurram Khan, Z. Wang, "Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme", Mathematical Problems in Engineering, vol. 2013, page 1-10, 2013 [ISI SCI-E]

158.     M. H. Eldefrawy, Muhammad Khurram Khan, K. Alghathbar, “Dynamic Password Based Remote User Authentication without Time Stamping”, International Journal of Innovative Computing, Information and Control, pp. 33-45, vol. 9, no. 1, January 2013. [ISI SCI-E]

159.    A. Waqar, A. Raza, H. Abbas, Muhammad Khurram Khan, "A Framework for Preservation of Cloud Users' Data Privacy using Dynamic Reconstruction of Metadata"​, Journal of Network & Computer Applications (JNCA), Elsevier Science, vol. 36, Issue 1, pp. 235-248, Jan. 2013. [ISI SCI-E]

160.    Muhammad Bilal khan, Khaled Alghathbar, Muhammad Khurram Khan,  Abdullah AlKelabi,  Abdulaziz AlAjaji, “Cyber Security using Arabic CAPTCHA Scheme”, International Arab Journal of Information Technology, pp. 76-84, vol. 10, issue 1, January 2013. [ISI SCI-E]
 
161.    S.J Horng, D. Rosiyadi, P.Fan, W. Xian, Muhammad Khurram Khan, Y. Pan, “An Efficient Copyright Protection Scheme for E-government Document Images”, IEEE Multimedia, vol. 19, issue 3, pp. 62-73, 2012. [ISI SCI-E] 

162.    Muhammad Khurram Khan, D. He, “A New Dynamic Identity based Authentication Protocol for Multi-server Environment using Elliptic Curve Cryptography”, Security & Communication Networks, John Wiley & Sons, vol. 5, Issue 11, pp. 1260-1266, November 2012. [ISI SCI-E]​

163.     M. Alam, T. Ali, S. Khan, S. Khan, M. Ali, M. Nauman, A. Hayat, Muhammad Khurram Khan, Khaled Alghathbar, “Analysis of Existing Remote Attestation Techniques”, Security & Communication Networks, John Wiley & Sons, pp. 1062-1082, vol. 5, issue 9, September 2012. [ISI SCI-E] 

164.   H.C Li, P.Z Fan, Muhammad Khurram Khan, "Context-adaptive Anisotropic Diffusion for Image Denoising", IET Electronics Letters, vol. 48, Issue 14, pp. 827-829, July 2012. [ISI SCI-E]

165. S.Y Kang, J. Park, Muhammad Khurram Khan, J. Kwak, “Study on the Common Criteria Methodology for Secure Ubiquitous Environment Construction”, Journal of Intelligent Manufacturing, Springer-Verlagvol. 23, no. 4, pp. 933-939, August 2012. [ISI SCI-E] 
 
166.    M.S Khalil, Muhammad Khurram Khan, “Statistical Authentication of Fingerprint”, The Imaging Science Journal, UK, vol.60, no. 3, pp. 165-171, June 2012. [ISI SCI-E]
 
167.  M. H. Eldefrawy, Muhammad Khurram Khan, K. Alghathbar, T. H. Kim, H. Elkamchouchi, “Mobile-OTP: Two-Factor Authentication using Mobile Phones”, Security and Communication Networks, John Wiley & Sons, vol. 5, issue 5, pp. 508-516, May 2012.  [ISI SCI-E] 
 
168.   M.I Razzak, S. A Husain, A.A. Mirza, Muhammad Khurram Khan, “Bio-Inspired Multilayered and Multilanguage Arabic Script Character Recognition System”, International Journal of Innovative Computing, Information and Control, pp. 2681, vol 8, number 4, April 2012. [ISI SCI-E]

169.  Muhammad Imran Razzak, Basem. A. Elmogy, Muhammad Khurram Khan, K. Alghathbar, “Efficient Distributed Face Recognition in Wireless Sensor Network”, International Journal of Innovative Computing, Information and Control, pp. 2811, vol. 8, number 4, April 2012 [ISI SCI-E]
 
170.  M. Farfoura, S.J Horng, J.L Lai, R.S Run, R.J Chen, Muhammad Khurram Khan, “A Blind Reversible Method for Watermarking Relational Databases Based on a Time-stamping Protocol”, Expert Systems with Applications, Elsevier Science, Vol. 39, Issue3, pp. 3185-3196, Feb. 2012. [ISI SCI-E]
 
171.   M Zubair Rafique, Faraz Ahmed, Muhammad Khurram Khan, Muddassar Farooq, “Securing Smart Phones Against Malicious Exploits", Information, vol. 15, no. 2, pp. 903-922, Feb. 2012.  [ISI SCI- E] 
172.   F. Li, Muhammad Khurram Khan, “A Biometric Identity-based Signcryption Scheme”, Future Generation Computer Systems, Elsevier Science, pp. 306-310, vol 28, Issue 1, January 2012. [ISI SCI-E]

173.  Lijun Yan, Jeng-Shyang Pan, Shu-Chuan Chu, Muhammad Khurram Khan, “Adaptively Weighted Sub-directional Two-dimensional Linear Discriminant Analysis for Face Recognition”, Future Generation Computer Systems, Elsevier Science, pp. 232-235, vol 28, Issue 1, January 2012. [ISI SCI-E]
 
174.  F. Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi, “Identity-based online/offline signcryption for low power devices”, Journal of Network and Computer Applications, Elsevier Science, vol. 35, issue 1, pp. 340-347, Jan. 2012. [ISI SCI-E] 
 
175.    M. He, S.J Horng, P. Fan, Muhammad Khurram Khan, R.S Run, J.L Lai, R.J Chen, A. Sutanto, “An Efficient Phishing Webpage Detector”, Expert Systems with Applications, Elsevier Science, Vol. 38, Issue 10, pp. 12018-12027, September 2011. [ISI SCI-E]
 
176.   Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo, “New Robust Protocols for Remote User Authentication and Password Change”, International Journal of Innovative Computing, Information and Control, pp. 5583-5603, Vol. 7, No. 9, Sept. 2011. [ISI SCI-E]
 
177.   S.T Lin, S.J Horng, B.H Lee, P. Fan, Y. Pan, J.L Lai, R.J Chen, Muhammad Khurram Khan, “Application of Grey-relational Analysis to Find the Most Suitable Watermarking Scheme”, International Journal of Innovative Computing, Information and Control, volume 7, Number 9, September 2011. [ISI SCI-E] 
 
178.  Dongli Jia, Guoxin Zheng, Muhammad Khurram Khan, “An Effective Memetic Differential Evolution Algorithm Based on Chaotic Local Search”, Information Sciences, Elsevier Science, vol. 181, Issue  15, pp. 3175-3187, August 2011. [ISI SCI-E]
 
179.   Y.L Huang, S.J Horng, T.W Kao, R.S Run, J.L Lai, R.J Chen, I.H Kuo, Muhammad Khurram Khan, “An Improved Forecasting Model Based on the Weighted Fuzzy Relationship Matrix Combined with a PSO Adaptation for Enrollments”, International Journal of Innovative Computing, Information and Control (IJICIC), vol. 7, number 7, July 2011. [ISI SCI-E] 
 
180.   Y.L Huang, S.J Horng, M.X He, P. Fan, T.W Kao, Muhammad Khurram Khan, J.L Lai, I. H Kuo, “A Hybrid Forecasting Model for Enrollments based on Aggregated Fuzzy Time Series and Particle Swarm Optimization”, Expert Systems with Applications, Elsevier Science, vol. 38, Issue 7, pp. 8014-8023, July 2011. [ISI SCI-E]  
 
181.  Dongli Jia, Guoxin Zheng, Bo Yang Qu, Muhammad Khurram Khan, “A Practical Hybrid Particle Swarm Optimization Algorithm for High-dimensional Complex Engineering Problems”, Computers and Industrial Engineering, Elsevier Sciencevol. 61 Issue 4, pp. 1117-1122, ​November, 2011[ISI SCI-E]

182.    Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf , “Multimodal Biometric Recognition based on Fusion of Low Resolution Face and Finger Veins”, Accepted for Publication, International Journal of Innovative Computing, Information and Control (IJICIC), vol. 7, no. 8, pp. 4679-4689, August 2011. [ISI SCI-E]

183.   Muhammad Khurram Khan, Khaled Alghathbar, Jiashu Zhang, “Secure and Tokenless Privacy-Protecting Chaotic Revocable Biometrics Authentication Scheme”, Telecommunication Systems, Springer-Verlagvol. 47, no. 3-4, pp. 227-234, June 2011. [ISI SCI-E] 

184.    F. Li, Muhammad Khurram Khan, “A Survey of Identity-Based Signcryption”, IETE  Technical Review, vol. 28, Issue 3, pp. 265-272, May-June 2011. [ISI SCI-E]
 
185.  Hong Zhao, Hongxia Wang, Muhammad Khurram Khan, “Steganalysis for Palette-based Images using Generalized Difference Image and Color Correlogram”, Signal Processing, Elsevier Science, May 2011. [ISI SCI-E]
 
186.   S.J Horng, W.H Lin, T.W Kao, P. Fan, Muhammad Khurram Khan, “An Efficient Wavelet-tree-based Watermarking Method”, Expert Systems with Applications (ESWA), Elsevier Science, vol. 38, issue 11, pp. 14357-14366, Jan. 2011  [ISI SCI-E] 
  
187.   Mohammad Sayim Khalil, Muhammad Imran Razzak, Muhammad Khurram Khan, “Fingerprint Classification Using PCA, LDA, L-LDA and BPN”, Information, pp.3313-3324, vol.14, no.10, Oct. 2011. [ISI SCI-E]
 
188.   M. He, S.J Horng, P. Fan, Muhammad Khurram Khan, R.S Run, J.L Lai, R.J Chen, “A Fast RFID Tag Identification Algorithm Based on Counter and Stack”, Expert Systems with Applications, Elsevier Science, vol. 38, Issue 6, pp. 6829-6838, June 2011. [ISI SCI-E] 
 
189.    L.Y Hsu, S.J Horng, M.X He, P. Fan, T.W Kao, Muhammad Khurram Khan, R.S Run, J.L Lai, R. J Chen, “Mutual Funds Trading Strategy based on Particle Swarm Optimization”, Expert Systems with Applications, Elsevier Science, vol. 38, Issue 6, pp. 7582-7602, June 2011. [ISI SCI-E]

190.    L.Y Hsu, S.J Horng, P. Fan, Muhammad Khurram Khan, Y.R Wang, R.S Run, J.L Lai, R.J Chen, “MTPSO Algorithm for Solving Planar Graph Coloring Problem”, Expert Systems with Applications, Elsevier Science, vol. 38, Issue 5, pp. 5525-5531, May 2011. [ISI SCI-E]
 
191.   Muhammad Khurram Khan, Jiashu Zhang, Khaled Alghathbar, “Challenge-Response based Biometric Image Scrambling for Secure Personal Identification”, Future Generation Computer Systems (FGCS), Elsevier Science, vol. 27, pp. 411-418, April 2011. [ISI SCI-E]
 
192.  Hong Zhao, Hong-Xia Wang, Muhammad Khurram Khan, “Statistical Analysis of Several Reversible Data Hiding Algorithms”, Journal of Multimedia Tools and Applications (MTAP), Springer-Verlagvol. 52, numbers 2-3, pp. 277-290, April 2011[ISI SCI-E]
 
193.   Muhammad imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Jong Hyuk Park, "Energy Efficient Distributed Face Recognition in Wireless Sensor Network”, Wireless Personal Communications, Springer-Verlag, vol. 60, no. 3, pp. 571-582, 2011. [ISI SCI-E]
 
194.   Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar, “Cryptanalysis and Security Enhancement of a ‘More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme’”, Computer Communications, Elsevier Science, vol. 34, issue 3, pp. 305-309, March 2011. [ISI SCI-E]
 
195.  Bilal Khan, Khaled Alghathbar, Syed Irfan Nabi, Muhammad Khurram Khan,  "Effectiveness of Information Security Awareness Methods based on Psychological Theories", AJBM, vol. 5, issue 26, pp. 10862-10868, Oct. 2011. [ISI SCI-E]
 
196.   S.Y Lin, S.J Horng, T.W Kao, C.S Fahn, P. Fan, Y.H Chen, Muhammad Khurram Khan, A. Bourgeois, T. Terano, “3D Block-Based Medial Axis Transform and Chessboard Distance Transform Based on Dominance”, Image and Vision Computing, Elsevier Science, vol. 29, Issue 4, pp. 272-285, Feb. 2011. [ISI SCI-E]
 
197.   Xianfeng Guo, Jiashu Zhang, Muhammad Khurram Khan, Khaled Alghathbar, “Secure Chaotic Map based Block Cryptosystem with Application on Camera Sensor Networks”, Sensors, vol. 11, issue 2, pp. 1607-1619, Feb. 2011. [ISI SCI-E]

198.    Lu Leng, Jiashu Zhang, Muhammad Khurram Khan, Xi Chen, Ming Ji, Khaled Alghathbar, "Cancelable PalmCode Generated from Randomized Gabor Filters for Palmprint Template Protection", Scientific Research & Essays, vol. 6, number 3, Feb. 2011. [ISI SCI-E]
 
199.   Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yusof, “CSLDA and LDA Fusion based Face Recognition”, Przeglad Elektrotechniczny, vol. 87, Issue 1, pp. 210-214, Jan. 2011. [ISI SCI-E]
 
200.  Zeeshan Shafi Khan, Khalid Rashid, Muhammad Khurram Khan, Muhammad Sher, “An Extended Intrusion Detection and Prevention System for Next Generation Network Application”, Information, vol. 14, no. 1, pp. 135-150, Jan. 2011. [ISI SCI-E]

201.   Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, Khaled Alghathbar, “Analysis of Enterprise Service Buses based on Information Security, Interoperability and High-availability using AHP Method”, International Journal of Physical Sciences, Vol. 6, no. 1, pp. 35-42, Jan. 2011. [ISI SCI-E] 
 
202.  Muhammad Imran Razzak, Syed Afaq Husain, Muhammad Khurram Khan, Muhammad Sher, “Handling Diacritical Marks for Online Arabic Script Based Languages Character Recognition using Fuzzy c-mean Clustering and Relative Position”, Information, vol. 14, no. 1, pp. 157-166, Jan. 2011 [ISI SCI-E]
 
203.  Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo, Cryptanalysis of a Handover Authentication Scheme using Credentials based on Chameleon Hashing, IEICE Transactions on Information and Systems, volume E93-D, number 11, pp. 3400-3402, Dec. 2010. [ISI SCI-E]  
 
204.   Eun-Jun Yoon, Muhammad Khurram Khan,  Kee-Young Yoo, “Improvement of the Efficient Secret Broadcast Scheme”, IEICE Transactions on Information and Systems, volume E93-D, no. 11, pp. 3396-3399, Dec. 2010. [ISI SCI-E]   
 
205.   Lu Leng, Jiashu Zhang, Muhammad Khurram Khan , Xi Chen, Khaled Alghathbar, “Dynamic Weighted Discrimination Power Analysis: a Novel Approach for Face and Palmprint Recognition in DCT Domain”, International Journal of the Physical Sciences, vol. 5, Issue, 17, pp. 2543-2554, Dec. 2010. [ISI SCI-E]
 
206.   A. Rahim, Z.S Khan, F.B Muhaya., M. Sher, Muhammad Khurram Khan, “Information Sharing in Vehicular Adhoc Network”, International Journal of Computers, Communications & Control, vol. 5, issue 5, pp. 892-899, Dec. 2010 [ISI SCI-E] 
 
207. Zeeshan Shafi Khan, Farzana Azam, Khaled Alghathbar, Muhammad Sher, Khalid Rashid,Muhammad Khurram Khan, "Attack Containment in Mobile Ad-hoc Network Through Fair Distribution of Processing Resources", Accepted for PublicationTelecommunication Systems, Springer-Verlag, Dec. 2010 [ISI SCI-E]
 
208.  Xiaomin Wang, Wei Guo, Wenfang Zhang, Muhammad Khurram Khan, Khaled Alghathbar, “Cryptanalysis and Improvement on a Parallel Keyed Hash Function based on Chaotic Neural Network”, In Press, Telecommunication Systems, Springer-Verlag, October 2010. [ISI SCI-E] 
 
209.   Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Eun-suk Cho, “Broadcast Authentication for Wireless Sensor Network using Nested Hashing and Chinese Remainder Theorem”, Journal of Sensors, vol. 10, issue 9, pp. 8683-8695, September 2010. [ISI SCI-E] 
 
210.  Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee, “Chaos-based Secure Satellite Imagery Cryptosystem”, Journal of Computer and Mathematics with Applications (CMA), Elsevier Science, vol. 60, number 2, pp. 326-337, July 2010. [ISI SCI-E] 
 
211.  M. Nauman, T. Ali, M. Alam, Muhammad  Khurram  Khan, Khaled Alghathbar, “Information Flow Analysis of UCON”, International Journal of Physical Sciences, vol. 5, number 6, pp. 865-875, June 2010. [ISI SCI-E]
 
212.  Muhammad Khurram Khan, Ling Xie, Jiashu Zhang, “Chaos and NDFT-based Concealing of Fingerprint-biometric Data into Audio Signals for Trustworthy Person Authentication”, Digital Signal Processing (DSP), Elsevier Science, volume 20, issue 1, pp. 179-190, January 2010. [ISI SCI-E] 

213.  Muhammad Khurram Khan, Khaled Alghathbar, “Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’”, Journal of Sensors, Vol. 10, Issue 3, pp. 2450-2459, March 2010. [ISI SCI-E] 
 
214.  Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, Muhammad Khurram Khan, Kevin Octavius Sentosa, “Performance Evaluation of Score Level Fusion in Multimodal Biometric Systems”, Pattern Recognition, Elsevier Science, vol. 43, issue 5, pp. 1789-1800, May 2010. [ISI SCI-E] 
 
215.  Mohammed S. Khalil, D. Muhammad, Muhammad Khurram Khan, Qais AL-Nuzaili, “Fingerprint Verification using Statistical Descriptors”, Digital Signal Processing (DSP), Elsevier Science, vol. 20, issue 4, pp. 1264-1273, July 2010[ISI SCI-E] 
 
216.  Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Bin Abdullah, Mohammad Yazid Bin Idris, “Intrinsic Authentication of Multimedia Objects using Biometric Data Manipulation”, In Press, International Arab Journal of Information Technology (IAJIT), May 2010. [ISI SCI-E] 
 
217.  Bilal Khan, Muhammad Khurram Khan, Khaled S. Alghathbar, “Biometrics and Identity Management for Homeland Security Applications in Saudi Arabia”, AJBM, vol. 4, no. 15, pp. 3296-3306, Nov. 2010. [ISI SSCI] 
 
218.   Mohammed S. Khalil, Dzulkifli Muhammad, Muhammad Khurram Khan, Khaled Alghathbar, “Singular Points Detection using Fingerprint Orientation Field Reliability”, International Journal of Physical Sciences, vol. 5, issue 4, pp. 352-357, April 2010. [ISI SCI-E]  
 
219.  Muhammad Khurram Khan, “Fingerprint Biometric-based Self and Deniable Authentication Schemes for the Electronic World”, IETE Technical Review, vol. 26, issue 3, pp. 191-195, May-June, 2009. [ISI SCI-E] 
 
220.  Muhammad Khurram Khan, Jiashu Zhang, “Multimodal Face and Fingerprint Biometrics Authentication on Space-Limited Tokens”, Neurocomputing, Elsevier Science, vol. 71, issues 13-15, pp. 3026-3031, August 2008. [ISI SCI-E] 
 
221.   Muhammad Khurram Khan, Jiashu Zhang, Xiaomin Wang, “Chaotic Hash-based Fingerprint Biometric Remote User Authentication Scheme on Mobile Devices”, Chaos, Solitons, and Fractals, Elsevier Science, UK, vol. 35, issue 3, pp. 519-524, February 2008. [ISI SCI-E] 
 
222.   Muhammad Khurram Khan, Jiashu Zhang, Lei Tian, “Chaotic Secure Content-based Hidden Transmission of Biometric Templates”, Chaos, Solitons and Fractals, Elsevier Science, UK, vol. 32, no. 5, pp. 1749-1759, June 2007.  [ISI SCI-E] 
 
223.  Muhammad Khurram Khan, Jiashu Zhang, “Improving the Security of ‘A Flexible Biometrics Remote User Authentication Scheme’”, Computer Standards and Interfaces (CSI), Elsevier Science, UK, vol. 29, issue 1, pp. 84-87, January 2007. [ISI SCI-E] 
 
224.  Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhammad Khurram Khan, “Cryptanalysis and Improvement on Two Efficient Remote User Authentication Schemes Using Smart Cards”, Computer Standards and Interfaces (CSI), Elsevier Science UK, vol. 29, issue 5, pp. 507-512, July 2007. [ISI SCI-E] 

225.  Muhammad Khurram Khan, Jiashu Zhang, “Pointing a Finger towards Standardized and Automated Biometrics”, IEEE Multimedia, vol. 13, issue 4, pp. 73-75, October, 2006. [ISI SCI-E] 
 
226.   Muhammad Khurram Khan, Jiashu Zhang, “Tamper Proof Identity Verification for Intelligent Transportation Systems”, IEEE Pervasive Computing, vol. 5, no. 4, pp. 67, 2006. [ISI SCI-E] 
 
227.  Muhammad Babar Khan, Muhammad Khurram Khan, Jiashu Zhang, Dianye Zhang, “A New Multimodal Biometric Security System for Intelligent Transportation Systems (ITS)”, GESTS International Transactions on Computer Science and Engineering, vol. 35, no.1, 2006.
 
228.  Muhammad Khurram Khan, Jiashu Zhang, “Cryptanalysis and Comments on a Dynamic Id-based Authentication Scheme”, International Journal of Computer Science and Network Security, vol. 5, no. 11, Nov. 2005. 
 
229.   Jia Dong Li, Muhammad Khurram Khan, Zhang Jiashu, “New Iris Localization Method Based on Chaos Genetic Algorithms”, Journal of Southwest Jiaotong University, vol. 13, no.1, pp. 35-38, May 2005. 
 
230.   Muhammad Khurram Khan, Zhang Jiashu, “Enhancing the Security of Biometric Templates for Trust Worthy Person Authentication”, International Transaction on Computer Science & Engineering, vol. 6, no.1, pp. 166-176, May 2005. [Invited Paper]. 
 

CONF​ERENCE PUBLICATIONS

231. Muhammad Khurram Khan, Z. Siddiqui, O. Tayan, "A Secure Framework for Digital Quran Certification", 35th IEEE International Conference on Consumer Electronics (ICCE'17), Jan. 2017, Las Vegas, USA

232. M. Alizadeh, M.H Tadayony, K. Sakuraiz, S. Baharun, H. Anada, M. Zamani, A. Zeki, S.A Chaudhry, Muhammad Khurram Khan, "Comments and Improvements of " HOTA: Handover Optimized Ticket-Based Authentication in Network-Based Mobility Management", 20th IEEE International Conference on Innovations in Clouds, Internet and Networks (ICIN'17),  7-9 March 2017, Paris, France

233. W.Z Khan, M. Alsalem, S. Sohrab, M. Atiquzzaman, Muhammad Khurram Khan, "A Reliable Internet of Things Architecture for Oil and Gas Industry", 19th IEEE International Conference on Advanced Communications Technology (ICACT'17), 19-22 Feb. 2017, Phoenix Park, PyeongChang, Korea

234. Y. Cao, X.Y. Liu, L. Kong, M.Y Wu, Muhammad Khurram Khan, "EHR: Routing Protocol for Energy Harvesting Wireless Sensor Networks", 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS'16), 13-16 Dec. 2016, Wuhan, China

235. W.Z Khan, M.Y Aalsalem, Muhammad Khurram Khan, Q. Arshad, "Enabling Consumer Trust upon Acceptance of IoT Technologies through Security and Privacy Model", 11th International Conference on Future Information Technology (FutureTech'16), April 2016, Beijing, China

236.  A. Aburumman, W.J Seo, R. Islam, Muhammad Khurram Khan, K. K.R. Choo, “A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering”, SecureComm 2015, LNICST 164, pp. 1-16, 2015, USA​

237. R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan, “An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insecure Networks”, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2015), June 8-9, 2015, London, UK

238.  F. Kurniawan, M.S Khalil, Muhammad Khurram Khan, H. Malik, "Dual-Microphone Forensics of Identical Model Based on Signal Analysis", ICIST 2015, Turkey, March 2015

239. F. Kurniawan, M.S Khalil, Muhammad Khurram Khan, Y. Alginahi, "DWT+LSB-based Fragile Watermarking Method For Quran Images", IEEE International Symposium on Biometrics & Security Technologies (ISBAST 2014), 26-27 August 2014, Kuala Lumpur, Malaysia

240.  Muhammad Khurram , S. Kumari, X. Wang, R. Kumar, "Security Issues of Chen et al.’s Dynamic ID-based Authentication Scheme", 12th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2014), August 24-27, 2014, Dalian, China​

241.  S. Kumari, Muhammad Khurram Khan, X. Li, R. Kumar, "Notes on A Password-Based Remote User Authentication Scheme without Smart Card", IEEE International Symposium on Biometrics & Security Technologies (ISBAST 2014), 26-27 August 2014, Kuala Lumpur, Malaysia

242. X. Li, Muhammad Khurram Khan, S. Kumari, "Cryptanalysis of a Robust Smart Card Authentication Scheme for Multi-server Architecture", IEEE International Symposium on Biometrics & Security Technologies (ISBAST 2014), 26-27 August 2014, Kuala Lumpur, Malaysia

243. A. Derhab, A. Bouras, F.B. Muhaya, Muhammad Khurram Khan, Y. Xiang, "Spam Trapping System: Novel Security Framework to Fight against Spam Botnets", 21st IEEE International Conference on Telecommunications, 5-7 May 2014, Lisbon, Portugal​​

244. L. Leng, G. Liu, M. Li, Muhammad Khurram Khan, A. Al-Khouri, "Logical Conjunction of Triple-perpendicular-directional Translation Residual for Contactless Palmprint Preprocessing", 11th IEEE International Conference on Information Technology: New Generations, 7-9 April 2014, Las Vegas, USA

245. M.H Eldefrawy, Muhammad Khurram Khan, H. Elkamchouchi, "The Use of Two Authentication Factors to Enhancethe Security of Mass Storage Devices", 11th IEEE International Conference on Information Technology: New Generations, 7-9 April 2014, Las Vegas, USA  

246. F. Kurniawan, M.S Khalil, Muhammad Khurram Khan, Y.M Alginahi, "Exploiting Digital Watermarking to Preserve Integrityof the Digital Holy Quran Images", International Conference on Advances in Information Technology for the Holy Quran and Its SciencesDec. 20-25, 2013, KSA
247. Muhammad Khurram Khan, D. He, “Cryptanalysis of ‘An Improved Remote Password Authentication Scheme with Smartcard’, 12th IEEE International Conference Trustcom, July 2013, Australia

248. Muhammad Khurram Khan, S. Kumari, MK Gupta, "Cryptanalysis of Truong et al.’s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device", 6th International Conference on Brain Inspired Cognitive Systems (BICS'13), June 2013, Beijing, China

249.  X. Li, J. Niu, Muhammad Khurram Khan, J. Liao, “Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards”, IEEE International Symposium on Biometrics & Security Technologies (ISBAST’13), 2-5 July 2013, Chengdu, China.

250.  S. Kumari, Muhammad Khurram Khan, F.B Muhaya, R. Kumar, “Cryptanalysis of ‘A Robust Smart-Card-Based Remote User Password Authentication Scheme’”, IEEE International Symposium on Biometrics & Security Technologies (ISBAST’13), 2-5 July 2013, Chengdu, China.

251.  X. Li, J. Niu, Muhammad Khurram Khan, J. Liao, “Robust biometric based three-factor remote user authentication scheme with key agreement”, IEEE International Symposium on Biometrics & Security Technologies (ISBAST’13), 2-5 July 2013, Chengdu, China.

252. F. Kurniawan, M.S. Khalil, Muhammad Khurram Khan, “Core-point Detection on Camera-base Fingerprint Image”, IEEE International Symposium on Biometrics & Security Technologies (ISBAST’13), 2-5 July 2013, Chengdu, China ​

253.  L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, “Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code”, IEEE International Symposium on Biometrics & Security Technologies (ISBAST’13), 2-5 July 2013, Chengdu, China.

254. F. Kurniawan, Mohammed S. Khalil, Muhammad Khurram Khan, Y.M Alginahi, "Authentication and Tamper Detection of Digital Holy Quran Images", IEEE International Symposium on Biometrics & Security Technologies (IEEE ISBAST'13), July, Chengdu, China

255. M. H. Eldefrawy, Muhammad Khurram Khan, “Detecting Counterfeit-Money using RFID-enabled Mobile Devices”, 7th International Conference for Internet Technology and Secured Transactions (ICITST'12), London, UK, Dec. 2012 ​

256. Muhammad Khurram Khan, S. Kumari, M. Gupta , "Further Cryptanalysis of ‘A Remote Authentication Scheme Using Mobile Device’", 8th International Conference on Information Assurance & Security (IAS'12), Brazil, Nov. 2012.

257.  Muhammad Khurram Khan, H.D Biao, "Weaknesses of 'Security Analysis and Enhancement for Three-party Password-based Authenticated Key Exchange Protocol'”6th International Conference on Network and Systems Security (NSS'12), LNCS 7646, Springer-Verlag, pp. 530-536, Nov. 2012.

258. Lu Leng, Shuai Zhang, Xue Bi, Muhammad Khurram Khan, “Two-Dimensional Cancelable Biometric Scheme”, ICWAPR’12, China, July 2012.

259.  Mohammed Saeed Alkatheiri, M.H. Eldefrawy, Muhammad Khurram Khan, “BAN Logic Based Security Proof for Mobile OTP Authentication Scheme”, 7th International Conference on Future Information Technology (FutureTech’12), Vancouver, Canada, June 2012
 
260.  S. Kumari, M. Gupta, Muhammad Khurram Khan, “Cryptanalysis of ‘An Improved Timestamp-based Remote User Authentication Scheme”, IEEE QR2MSE’12, China, June 2012.
 
261. M. H. Eldefrawy, K. Alghathbar, Muhammad Khurram Khan, “Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes”,  International Symposium on Biometrics and Security Technologies (ISBAST'12), March 2012, Taipei, Taiwan.

262.  Muhammad Khurram Khan, Pei-Wei Tsai, J.S Pan, B.Y Liao, “Biometric Driven Initiative System for Passive Continuous Authentication”, 7th IEEE International conference on Information Assurance and Security (IAS), Malaysia, Dec. 2011.

263.  Fahad B. M, Muhammad Khurram Khan, Y. Xiang, "Polymorphic Malware Detection Using Hierarchical Hidden Markov Model", 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'11), 24-26 October 2011, Melbourne, Australia.
 
264.  Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, "Information Security Awareness Campaign: An Alternate Approach", 5th International conference on Information Security and Assurance (ISA’11), Czech Republic, May 2011.
 
265.  M. Zubair Rafique, Nasser Alrayes, Muhammad Khurram Khan, “Application of Evolutionary Algorithms in Detecting SMS Spam at Access Layer”, 16th Genetic and Evolutionary Computing Conference, 12-16 July, 2011, Dublin, Ireland. (Nominated for the best paper award)
 
266. Lu Leng, Jiashu Zhang, Gao Chen, Muhammad Khurram Khan, Khaled Alghathbar, “Two-directional Two-dimensional  Random Projection and Its Variations for Face and Palmprint Recognition”, 11th International Conference on Computational Science and Its Applications (ICCSA’11), LNCS, vol. 6786, pp. 458-470, 20-23 June 2011, Spain.
 
267.  M. Zubair Rafique, Muddassar Farooq, Muhammad Khurram Khan and Khaled Alghathbar, “A Framework for Detecting Malformed SMS Attack”, IEEE/FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011), 28-30 June, 2011, Greece.
 
268.  L. Leng, J. Zang, G. Chen, Muhammad Khurram Khan, P. Bai, “Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion”, 8th IEEE/FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011), 28-30 June, 2011, Greece.
 
269. Mohammed S. Khalil, Muhammad Khurram Khan, “Co-occurrence Matrix Features for Fingerprint Verification”, IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), Jun 24-26,2011, Xiamen, China.
 
270.  M. Zubair Rafique, Muddassar Farooq, Muhammad Khurram Khan and Khaled Alghathbar,  “Embedding High Capacity Covert Channels in Short Message Service (SMS)”, IEEE/FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011),  28-30 June, 2011, Greece. 
 
271.  Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, “OTP-Based Two-Factor Authentication Using Mobile Phones”, 8th IEEE International Conference on Information Technology: New Generations (ITNG’11), April 11-13, 2011, Las Vegas, USA.
 
272. M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar, “Securing IP-Multimedia Subsystem (IMS) Against Anomalous Message Exploits by using Machine Learning Algorithms”, 8th IEEE International Conference on Information Technology: New Generations (ITNG’11), April 11-13, 2011, Las Vegas, USA.
 
273. Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, Hassan Elkamchouchi, “Secure Instant Messaging Protocol for Centralized Communication Group”, 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), February 2011, Paris, France.
 
274.  Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, “Qualified Analysis b/w ESB(s) using Analytical Hierarchy Process (AHP) Method”, IEEE International Conference on Intelligent Systems, Modelling and Simulation, pp. 100-104, January 2011, Malaysia.
 
275.   L. Leng, J. Zhang, J. Xu, Muhammad Khurram Khan, Khaled Alghathbar, “Dynamic Weighted discrimination Power Analysis in DCT Domain for Face and Palmprint Recognition”, IEEE International Conference on ICT Convergence (ICTC’10), pp. 467-471, November, 2010, South Korea
 
276. Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, “Contactless Biometrics in Wireless Sensor Network: A Survey”, 3rd  International Conference on Security Technologies (SecTech’10), CCIS, Springer-Verlag, vol. 122, pp. 236-243, Dec. 2010.
 
277. Muhammad Imran Razzak, Muhammad Khurram Khan, KhaledAlghathabar, "Bio-Inspired Hybrid Face Recognition System for Small Sample Size and Large Datset", 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), October 2010, Darmstadt, Germany.
 
278. Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, “One-Time Password System with Infinite Nested Hash Chains, Accepted at 3rd International Conference on Security Technologies (SecTech’10), December 2010, South Korea.
 
279.  Muhammad Bilal khan, Khaled Alghathbar, Muhammad Khurram Khan,  Abdullah AlKelabi,  Abdulaziz AlAjaji, “Using Arabic CAPTCHA for Cyber Security”, 3rd  International Conference on Security Technologies (SecTech’10), CCIS, Springer-Verlag, vol. 122, pp. 8-17Dec 2010, South Korea
 
280. Leng Lu, Zhang, J.S, Muhammad Khurram Khan, Bi, X, Ji, M, “Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection”, 25th International Conference on Image and Vision Computing (IVCNZ), Nov. 2010, New Zealand.
 
281. Muhammad Khurram Khan, Khaled Alghathbar, “Security Analysis of ‘Two-Factor User Authentication in Wireless Sensor Networks’”, 4th International Conference on Information Security and Assurance (ISA’10)Lecture Notes in Computer Science, vol. 6059, pp. 55-60, June 2010, (Acceptance rate 10%. Only 30 papers were selected out of 300 submissions), Japan. 

282. Bilal Khan, Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, “Security Analysis of Firewall Rule Sets in Computer Networks”, 4th International Conference on Emerging Security Information, Systems and Technologies (Securware’10), Italy 
 
283.  Mohammed S. Khalil, Dzulkifli Muhammad, Muhammad Khurram Khan, Khaled Alghathbar, “Fingerprint Verification Based on Statistical Analysis”, 5th International Conference on Future Information Technology (FutureTech'10), 21-23 May 2010, Korea
 
284. Muhammad Imran, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf, "Face Recognition using Layered Linear Discriminant Analysis and Small Subspace", 10th IEEE International Conference on Computer & Information Technology (CIT’10), pp. 1407-1412, June/July 2010, Bradford, UK.
 
285.  M. H Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, "A Key Agreement Algorithm with Rekeying for Wireless Sensor Networks using Public Key Cryptography", 4th IEEE International Conference on Anti -counterfeiting, Security, and Identification in Communication (ASID’10), China, June 2010.
 
286.  Muhammad Khurram Khan, “Enhancing the Security of a ‘More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme’”, IEEE 3rd International Conference on Network and System Security (NSS), pp. 420-424, Oct. 2009, Australia. 
 
287. Mohammed S. Khalil, Dzulkifli Muhammad, Muhammad Khurram Khan, Qais AL-Nuzaili “Fingerprint Verification using Fingerprint Texture”, 9th  IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) , UAE, Dec. 14-17, 2009. 
 
288.  Hong Zhao, Hong-Xia Wang, Muhammad Khurram Khan, “Difference Histogram Analysis of Several Reversible Data Hiding Schemes”, IEEE PrimeAsia’09, Shanghai, China, 2009. 
 
289. Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan, “Modified AES using Chaotic Key Generator for Satellite Imagery”, ICIC 2009, Lecture Notes in Computer Science (LNCS), Springer-Verlag, pp. 1014-1024, vol. 5754, 2009.
 
290.  Maqsood Mahmud, Hanif Ullah, Muhammad Khurram Khan, Khaled Alghathbar “Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding)”, BSBT 2009, CCIS, Springer-Verlag, pp. 97-107, vol. 57, 2009.
 
291.  A. Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan, “Bio-Chaotic Stream Cipher-Based Iris Image Encryption”, TrustCom'09, 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-09), Canada, 2009.
 
292. Muhammad Usama Khanzada, Muhammad Khurram Khan, “Satellite Imagery Security Application (SISA)”, 12th IEEE International Multitopic Conference INMIC, pp. 232-238, 23-24 December 2008.
 
293.  Muhammad Khurram Khan, “An Efficient and Secure Remote Mutual Authentication Scheme with Smart Cards”, IEEE International Symposium on Biometrics & Security Technologies (ISBAST), 23-24 April, 2008. 

294.  Muhammad Usama Khanzada, Muhammad Khurram Khan, “Classical and Chaotic Encryption Techniques for the Security of Satellite Images”, IEEE International Symposium on Biometrics & Security Technologies (ISBAST), 23-24 April, 2008. 
 
295. Muhammad Khurram Khan, “Cryptanalysis and Security Enhancement of Two Password Authentication Schemes with Smart Cards”, 11th IEEE International Conference on INMIC’07, December 2007. 
 
296. Muhammad Khurram Khan, Jiashu Zhang, “An Intelligent Fingerprint-Biometric Image Scrambling Scheme”, ICIC 2007, Lecture Notes in Computer Science (LNCS), Springer-Verlag Germany, pp. 1141-1151, vol. 4682, August 2007.
 
297.  Muhammad Khurram Khan, Ling Xie, Jiashu Zhang, “Robust Hiding of Fingerprint Biometric Data into Audio Signals”, ICB 2007, Lecture Notes in Computer Science (LNCS), Springer-Verlag Germany, pp. 702-712, vol. 4642, August, 2007.
 
298. Muhammad Khurram Khan, “Further Cryptanalysis of ‘A User Friendly Remote User Authentication Scheme with Smart Cards’”, IEEE Conference Proceedings on ICIET’07, July 2007. 

299. Muhammad Khurram Khan, Jiashu Zhang, “Implementing Templates Security in Remote Biometric Authentication Systems”, IEEE Conf. Proceedings on CIS’06, China, pp. 1397-1400, Nov. 2006. 

300. Muhammad Khurram Khan, Jiashu Zhang, “Investigation on Pseudorandom Properties of Chaotic Stream Ciphers”, IEEE Conf. Proceedings on ICEIS’06, pp. 289-293, April 2006.
 
301. Muhammad Babar Khan, Muhammad Khurram Khan, Jiashu Zhang, Zhang Dianye, “Enhancing the Security of Intelligent Transportation Systems (ITS) using Iris/Finger-based Multimodal Biometrics”, IEEE Conf. Proceedings on ICEIS’06, pp. 79-84, April 2006.
 
302. Xiaomin Wang, Jiashu Zhang, Wenfang Zhang, Muhammad Khurram Khan, “Security Improvement on the Timestamp-based Password Authentication Scheme Using Smart Cards”, IEEE Conf. Proceedings on ICEIS’06, pp. 140-142, April 2006.
 
303. Muhammad Khurram Khan, Jiashu Zhang, “An Efficient and Practical Fingerprint-based Remote User Authentication Scheme with Smart Cards”, ISPEC’06, Lecture Notes in Computer Science, Springer-Verlag Germany, pp. 260-268, vol. 3903, April 2006. [ISI SCI-E]
 
304.  Muhammad Khurram Khan, Jiashu Zhang, “Enhancing the Transmission Security of Content-based `Hidden Biometric Data”, ISNN’06, Lecture Notes in Computer Science (LNCS), Springer-Verlag, pp. 214-223, vol. 3973,  May 2006. [Invited paper] [ISI SCI-E] 

305. Muhammad Khurram Khan, Jiashu Zhang, “Strong Authentication of Remote Users over Insecure Networks by Using Fingerprint-biometric and Smart Cards”, Biometric Technology for Human Identification III, SPIE Defense and Security Symposium, Proc. SPIE Vol. 6202, April 2006, Florida, USA.  
 
306. Muhammad Khurram Khan, Jiashu Zhang, “Security Analysis of ‘An Improved Low Computation Cost User Authentication Scheme for Mobile Communication”, IEEE INMIC’05, 2005.
 
307. Muhammad Babar Khan, Muhammad Khurram Khan, Jiashu Zhang, Dianye Zhang, “Implementing Biometric Security in Intelligent Transportation Systems”, IEEE INMIC’05, 2005.
 
308. Muhammad Khurram Khan, Zhang Jiashu, “Securing Biometric Templates for Reliable Identity Authentication”, ICIC’05, Lecture Notes in Computer Science (LNCS), part II, no. 3645, pp. 723-732, Springer-Verlag Germany, August 2005. [Invited paper] [ISI SCI-E].
 
309. Muhammad Khurram Khan, Zhang Jiashu, Lei Tian, “Protecting Biometric Data for Personal Identification”, Sinobiometrics’04, Lecture Notes in Computer Science (LNCS), Springer-Verlag Germany, pp. 629-638, vol. 3383, Dec. 2004. [ISI SCI-E].
 
310. Muhammad Khurram Khan, Zhang Jiashu, “Biometrics: An Emerging Technology for Security”, Second International Workshop on Frontiers of Information Technology, Dec. 2004.
 
311. Muhammad Khurram Khan, Zhang Jiashu, Shi-Jinn Horng, “An Effective Iris Recognition System for Identification of Humans”, IEEE INMIC’04, pp.114-117, Dec. 2004.
 
312. Muhammad Khurram Khan, “Multimodal Biometrics: A More Secure Way against Intruders”, First International Workshop on Frontiers of Information Technology, Dec. 2003.​​​​​​​
​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​