E
Esam Khan
Researcher at Umm al-Qura University
Publications - 28
Citations - 498
Esam Khan is an academic researcher from Umm al-Qura University. The author has contributed to research in topics: Hash function & Hash-based message authentication code. The author has an hindex of 10, co-authored 28 publications receiving 418 citations. Previous affiliations of Esam Khan include University of Victoria & Victoria University, Australia.
Papers
More filters
Journal ArticleDOI
Counting-based secret sharing technique for multimedia applications
TL;DR: This work presented two different modeling variations that are mainly different in the secret-sharing keys generation where both are studied elaborating their pros and cons.
Proceedings ArticleDOI
A geometric-primitives-based compression scheme for testing systems-on-a-chip
TL;DR: A novel and very efficient lossless compression technique for testing systems-on-a-chip based on geometric shapes that exploits reordering of test vectors to minimize the number of shapes needed to encode the test data.
Journal ArticleDOI
Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography
TL;DR: The study modeled the system and implemented it to be tested to explore the relation between security, capacity and data dependency, and the main outcome proved applicability to be adopting 3-LSB approach to give acceptable security with practical capacity preferred.
Journal ArticleDOI
An analytical study of mobile applications for Hajj and Umrah services
TL;DR: This paper presents an analytical study of Hajj-related mobile apps offered by Google Play, and reveals a number of repetitive apps in terms of application names and services.
Journal ArticleDOI
Design and Performance Analysis of a Unified, Reconfigurable HMAC-Hash Unit
TL;DR: This paper applied pipelining and parallelism to the design of the HMAC-hash unit to improve throughput, especially for large message sizes, and achieved higher throughput than engines that integrated three hash functions or more and comparable throughput to those integrated only two hash functions.