Prof. Dr. Muhammad Khurram Khan

Biography

FIET (UK), FBCS (UK), FFTRA (Korea), SMIEEE (USA)​

Editor-in-Chief, Telecommunication Systems (Springer)​

Center of Excellence in Information Assurance (CoEIA)

College of Computer & Information Sciences, Building 31

King Saud University, P.O. Box 92144, Riyadh 11653

Kingdom of Saudi Arabia​


Dr. Muhammad Khurram Khan is currently working as a Full Professor at the Center of Excellence in Information Assurance (CoEIA), King Saud University, Kingdom of Saudi Arabia. He is one of the founding members of CoEIA and has served as the Manager R&D from March 2009 to March 2012. He developed and successfully managed the research program of CoEIA, which transformed the center as one of the best centers of research excellence in Saudi Arabia as well as in the region.

Prof. Khurram is the Editor-in-Chief of a well-esteemed international journal 'Telecommunication Systems' published by Springer-Verlag (since 1993) with an impact factor of 1.542 (JCR 2017). He is the Founding Editor of 'Bahria University Journal of Information & Communication Technology (BUJICT)'.

Furthermore, he is the full-time Editor/Associate Editor of several international journals/magazines, including IEEE Communications Surveys & Tutorials, IEEE Communications Magazine, IEEE Internet of Things Journal, IEEE Transactions on Consumer Electronics, Journal of Network & Computer Applications (Elsevier), IEEE Access, Security & Communication Networks, IEEE Consumer Electronics Magazine, Journal of Medical Systems (Springer), PLOS ONE, Computers & Electrical Engineering (Elsevier), IET Wireless Sensor Systems, Electronic Commerce Research (Springer), Journal of Computing & Informatics, Journal of Information Hiding and Multimedia Signal Processing (JIHMSP), International Journal of Biometrics (Inderscience), etc.

He has also played role of the guest editor of several international ISI-indexed journals of Springer-Verlag and Elsevier Science, etc. Moreover, he is one of the organizing chairs of more than 5 dozen international conferences and member of technical committees of more than 10 dozen international conferences. In addition, he is an active reviewer of many international journals as well as research foundations of Switzerland, Italy, Saudi Arabia and Czech Republic.

Prof. Khurram is an adjunct professor at Fujian University of Technology, China and an honorary Professor at IIIRC, Shenzhen Graduate School, Harbin Institute of Technology, China. He has secured an outstanding leadership award at IEEE international conference on Networks and Systems Security 2009, Australia. He has been included in the Marquis Who's Who in the World 2010 edition. Besides, he has received certificate of appreciation for outstanding contributions in 'Biometrics & Information Security Research' at AIT international Conference, June 2010 at Japan.

He has been awarded a Gold Medal for the 'Best Invention & Innovation Award' at 10th Malaysian Technology Expo 2011, Malaysia. Moreover, his invention recently got a Bronze Medal at '41st International Exhibition of Inventions' at Geneva, Switzerland in April 2013. In addition, he was awarded best paper award from the Journal of Network & Computer Applications (Elsevier) in Dec. 2015.

Prof. Khurram is the recipient of King Saud University Award for Scientific Excellence (Research Productivity) in May 2015. He is also a recipient of King Saud University Award for Scientific Excellence (Inventions, Innovations, and Technology Licensing) in May 2016.

Prof. Khurram has published over 325 research papers in the journals and conferences of international repute. In addition, he is an inventor of 10 US/PCT patents. He has edited 7 books/proceedings published by Springer-Verlag and IEEE. He has secured several national and international research grants in the domain of information security. His research areas of interest are Cybersecurity, digital authentication, biometrics, multimedia security, and technological innovation management. Prof. Khurram has played a leading role in developing 'BS Cybersecurity Degree Program' and 'Higher Diploma in Cybersecurity' at King Saud University.

He is a fellow of the IET (UK), fellow of the BCS (UK), fellow of the FTRA (Korea), senior member of the IEEE (USA), senior member of the IACSIT (Singapore), member of the IEEE Consumer Electronics Society, member of the IEEE Communications Society, member of the IEEE Technical Committee on Security & Privacy, member of the IEEE IoT Community, member of the IEEE Smart Cities Community, and member of the IEEE Cybersecurity Community. He is also the Vice Chair of IEEE Communications Society Saudi Chapter.


Interests

Prof Khurram conducts research in Cybersecurity, Digital Authentication, Biometrics, Multimedia Security, Cloud Computing Security, and Technological Innovation Management.
img01

Cyber Security

Awareness and Education Cybersecurity Ecosystem

img01

Digital Authentication

Identity Management Authentication Protocols Internet of Things

img01

Biometrics

Personal Identification Authentication Protocols Biometrics System Security

img01

Cloud Computing Security

Cloud Authentication
Cloud Data Security
Cloud Privacy

img01

Multimedia Security

Multimedia Forensics
Digital Quran Security
Digital Contents Security

img01

Technological Innovation Management

Open Innovation in GCC
Innovation Ecosystem

Publications

Prof. Khurram has rigorously published research papers in well-esteemed international journals and conferences. A complete list of his publications can be found in the section below:
img01

Patents

My Inventions & Innovations

Publications
img01

Books

My Books and Proceedings

Publications
img01

Editorials

My Editorials in Journals

Publications
img01

Research Papers

My Journal and Conference Papers

Publications

Patents


  1. Systems and Methods Improving Cryptosystems with Biometrics, US Patent Number 9825761, 2017
  2. Face Recognition using Multiresolution Discriminant Analysis, US Patent Number 9355303, 2016
  3. System and Method for Currency Validation, US Patent Number 8931688, 2015
  4. Passive Continuous Authentication Method, US Patent Number 8660322, 2014
  5. One-Time Password Authentication with Infinite Nested Hash Claims, US Patent Number 8683564, 2014
  6. Systems and Methods for Three-Factor Authentication, US Patent Number 8862888, 2014
  7. One-Time Password Authentication with Infinite Nested Hash Chains, PCT Patent No.: PCT/US10/57125, 2010
  8. A Method to Collect Data of Audience Exposure of Smart TV through Smart Phone's App, IPO Application No. 12/2016, 2016
  9. “Internet of Things based Reliable Monitoring System for Oil and Gas Operations”, Saudi Patent Office Application No. 116370689, 2016

Books/Edited Proceedings

  1. J.J.H. Park, H. Jin, Y.S. Jeong, Muhammad Khurram Khan (Eds.), "Advanced Multimedia andUbiquitous Engineering", ISBN 978-981-10-1535-9, July 2016
  2. T.H Kim, A. Stoica, W.C Fang, T. Vasilakos, J.G Villalba, K.P. Arnett, Muhammad Khurram Khan, B. H Kang, "Computer Applications for Security, Control and System Engineering", Communications in Computer and Information Science, ISBN: 978-3-642-35263-8, Springer-Verlag, Dec. 2012
  3. Muhammad Khurram Khan, A. Mirza, K. Alghathbar, "Proceedings of National Workshop on Information Assurance Research" (WIAR), ISBN: 978-3-8007-3432-0, VDE Verlag Germany, April 2012
  4. T.H Kim, H. Adeli, W.C Fang, J.G Villalba, K. P. Arnet, Muhammad Khurram Khan, "Security Technology", Communications in Computer and Information Science, ISBN 978-3-642-27188-5, Springer-Verlag, 2011
  5. T.H Kim, W.C Fang, Muhammad Khurram Khan, K.P. Arnett, H.J Kang, D. Slezak, "Security Technology, Disaster Recovery and Business Continuity", Communications in Computer and Information Science, ISBN: 978-3-642-17609-8, Springer-Verlag, Germany, 2010
  6. T.H Kim, H.K Kim, Muhammad Khurram Khan, A. Kiumi, W.C Fang, D. Slezak, "Advances in Software Engineering", Communications in Computer and Information Science, ISBN: 978-3-642-17577-0, Springer-Verlag, Germany, 2010
  7. C.C Chang, T. Vasilakos, P. Das, T. H. Kim, B.H. Kang, Muhammad Khurram Khan, "Advanced Communication and Networking", Communications in Computer and Information Science, Springer-Verlag, ISBN 978-3-642-13404-3, Germany, June 2010
  8. M. Khalid Anis, Muhammad Khurram Khan, S. Jamal H. Zaidi, Proceedings of 12th IEEE International Multitopic Conference, ISBN: 978-1-4244-2823-6, 2008

Editorials

  1. Muhammad Khurram Khan, “New Strides Towards Success”, Telecommunication Systems, Springer, vol. 67, issue 1, Jan. 2018
  2. L. Kong, K. Ren, Muhammad Khurram Khan, Q. Li, A. Rayes, M. Debbah, Y. Nakamura, "Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2", IEEE Communications Magazine, Vol. 55, Issue 6, June 2017
  3. L. Kong, K. Ren, Muhammad Khurram Khan, Q. Li, A. Rayes, M. Debbah, Y. Nakamura, "Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1", IEEE Communications Magazine, Vol. 55, Issue 3, March 2017
  4. Muhammad Khurram Khan, "Laying the Foundation for a Productive New Year", Telecommunication Systems, Springer, vol. 64, issue 1, Jan. 2017
  5. JF. Wan, Muhammad Khurram Khan, M.K. Qiu, D.Q. Zhang, "Cloud-assisted Industrial Systems and Applications", Mobile Networks and Applications, vol. 21, issue 5, pp. 822-824, Oct. 2016
  6. Muhammad Khurram Khan, "Continuous Improvement: A Goal of New Year", Telecommunication Systems, vol. 61, Issue 1, Jan. 2016
  7. J.J. Park, N. Zhang, N.Y. Yen,Muhammad Khurram Khan, "Advanced Communication Models and Services for Smart World", Modelling and Simulation in Engineering, vol. 2015, Article ID 284394, 2015
  8. Muhammad Khurram Khan, “New Year, New Challenges, New Opportunities, Telecommunication Systems, Springer, vol. 58, issue 1, Jan. 2015
  9. Muhammad Khurram Khan, N. Kumar, S Horng, International Journal Ad Hoc and Ubiquitous Computing, vol. 18, Nos. 1/2, 2015
  10. Muhammad Khurram Khan, Y. Xiang, S.J. Horng, H.H Chen, "Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks", International Journal of Distributed Sensor Networks, vol. 2015, Article ID 958190, 2015
  11. Muhammad Khurram Khan, T. Al-Saud, H. Alkhathlan, H. Derham, "New Reforms of Research, Innovation and Entrepreneurship in the GCC Countries", Innovation: Management, Policy & Practice, 16(2), pp. 174-176, 2014
  12. F. Yu, C.C Chang, Muhammad Khurram Khan,T. Cao, M. Ivanovic, "Recent Advances in Information Security", The Scientific World Journal, Article ID 562492, 2014
  13. Muhammad Khurram Khan, “Message from the New Editor-in-Chief”, Telecommunication Systems, vol. 56, issue 4, pp. 427-427, 2014
  14. Muhammad Khurram Khan, Y. Xiang, S.J Horng, H.H Chen, "Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks", International Journal of Distributed Sensor Networks, vol. 2013, Article ID 956736, 2013
  15. Muhammad Khurram Khan, "High Performance Biometrics Recognition Algorithms and Systems", Future Generation Computer Systems, Elsevier Science, vol. 28, pp. 210-2011, 2012
  16. Muhammad Khurram Khan, "Chaotic Cryptography and Its Applications in Telecommunication Systems", Telecommunication Systems, Springer-Verlag, DOI: 10.1007/s11235-011-9456-x, June 2011
  17. Muhammad Khurram Khan, "Guest Editorial for Special Issue on Biometric Systems and Applications", Telecommunication Systems, Springer-Verlag, Volume 47, Issue 3, pp. 183-184, June 2011
  18. Muhammad Khurram Khan, "Research Advances in Data Hiding for Multimedia Security", Multimedia Tools & Applications, Springer-Verlag, vol. 52, numbers 2-3, pp. 257-261, April 2011
  19. Muhammad Khurram Khan, Mohamed Kamel, Xudong Jiang, "Special issue on: Recent advances and future directions in biometrics personal identification", Journal of Network & Computer Applications, Elsevier Science, vol. 33, issue 3, pp. 205-206, May 2010
  20. Muhammad Khurram Khan, Khaled Alghathbar, "Special Issue- Information Assurance and Security Engineering", IETE Technical Review, vol. 27, issue 3, pp, 201-202, May-June 2010

Research Papers


Journal Publications


  1. W.Z. Khan, M. Aalsalem, Muhammad Khurram Khan, "Communal Acts of IoT Consumers: A Potential Threat to Security & Privacy", Accepted for Publication, IEEE Transactions on Consumer Electronics, Nov. 2018 [SCI-E]
  2. I. Uddin, M. Guizani, B.S Kim, S. Hassan, Muhammad Khurram Khan, “Trust Management Techniques for the Internet of Things: A Survey”, In Press, IEEE Access, Nov. 2018 [SCI-E]
  3. Q. Feng, D. He, S. Zeadly, Muhammad Khurram Khan, N. Kumar, “A Survey on Privacy Protection in Blockchain Systems”, Accepted for Publication, Journal of Network and Computer Applications, Elsevier, Oct. 2018 [SCI-E]
  4. T. Khan, M. Alam, A. Akhunzada, A. Hur, M. Asif, Muhammad Khurram Khan, “Towards Augmented Proactive Cyber Threat Intelligence”, Accepted for Publication, Journal of Parallel and Distributed Computing, Elsevier, Oct. 2018 [SCI-E]
  5. S. Khatoon, T. Chen, C. C Lee, Muhammad Khurram Khan, “Provable Secure Certificate-based Signature Scheme from Bilinear Pairing”, Accepted for Publication, Applied and Computational Mathematics, September 2018 [SCI-E]
  6. S.M Anwar, M. Majid, A. Qayyum, M. Awais, M. Alnowami, Muhammad Khurram Khan, “Medical Image Analysis using Convolutional Neural Networks: A Review”, Accepted for Publication, Journal of Medical Systems, Springer, September 2018 [SCI-E]
  7. H. J. Syed, A. Gani, F. Nasaruddin, A. Naveed, A.I.A Ahmed, Muhammad Khurram Khan, “CloudProcMon: A Non-Intrusive Cloud Monitoring Framework”, In Press, IEEE Access, August 2018 [SCI-E]
  8. J. Li, K.K. R Choo, W. Zhang, S. Kumari, J. Rodrigues, Muhammad Khurram Khan, D. Hogrefe, "EPA-CPPA: An Efficient, Provably-Secure and Anonymous Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks", In Press, Vehicular Communications, Elsevier, July 2018 [SCI-E]
  9. X. Duan, H. Song, C. Qin, Muhammad Khurram Khan, "Coverless Steganography for Digital Images Based on a Generative Model", CMC-Computers Materials & Continua, Tech Science Press, pp. 483-493, vol. 44, issue 3, June 2018 [SCI-E]
  10. C. Lin, D. He, X. Huang, Muhammad Khurram Khan, K.K.R Choo, “A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-based Identity Management Systems”, In Press, IEEE Access, May 2018 [SCI-E]
  11. Z. Siddiqui, O. Tayan, Muhammad Khurram Khan, "Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols", In Press, IEEE Access, May 2018 [SCI-E]
  12. G. Ahmed, S.I Islam, M. Shahid, A. Akhunzada, S. Jabbar, Muhammad Khurram Khan, M. Riaz, K. Han, “Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare”, In Press, IEEE Access, May 2018 [SCI-E]
  13. M. Aalsalem, W.Z. Khan, W. Gharibi, Muhammad Khurram Khan, Q. Arshad, “Wireless Sensor Networks in Oil and Gas Industry: Recent Advances, Taxonomy, Requirements, and Open Challenges”, In Press, Journal of Network and Computer Applications, Elsevier, April 2018 [SCI-E]
  14. M. Zeeshan, M. Majid, I.F. Nizami, S.M. Anwar, I.U. Din, Muhammad Khurram Khan, "A Newly Developed Ground Truth Dataset for Visual Saliency in Videos", In Press, IEEE Access, April 2018 [SCI-E]
  15. A. Saleem, A. Khan, F. Shahid, M. Alam, Muhammad Khurram Khan, "Recent Advancements in Garbled Computing: How Far Have We Come Towards Achieving Secure, Efficient and Reusable Garbled Circuits", In Press, Journal of Network and Computer Applications, Elsevier, Feb. 2018 [SCI-E]
  16. I. Din, S. Hassan, Muhammad Khurram Khan, M. Guizani, O. Ghazali, A. Habbal, ”Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions”, In Press, IEEE Communication Surveys and Tutorials, Dec. 2017 [SCI-E]
  17. A.S. Abiodun, M.H. Anisi, Muhammad Khurram Khan, “Review on Data Management Methods in Cloud-based Wireless Body Area Networks”, Accepted for Publication, IEEE Consumer Electronics Magazine, Nov. 2017 [SCI-E]
  18. Q. Zheng, X. Wang, Muhammad Khurram Khan, W. Zhang, B. B. Gupta, W. Guo, "A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service", In Press, IEEE Access, Nov. 2017 [SCI-E]
  19. S. Zahra, M. Alam, Q. Javaid, A. Wahid, N. Javed, S.U.R. Malik, Muhammad Khurram Khan, "Fog Computing Over IoT: A Secure Deployment and Formal Verification”, In Press, IEEE Access, Oct. 2017 [SCI-E]
  20. S. Li, N. Zhang, S. Lin, L. Kong, A. Katangur, Muhammad Khurram Khan, M. Ni, G. Zhu, "Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things", Accepted for Publication, IEEE Network, Oct. 2017 [SCI-E]
  21. A.K Das, M. Wazid, N. Kumar, Muhammad Khurram Khan, K.W.R Choo, Y.H Park, "Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment", Accepted for Publication, IEEE Journal of Biomedical and Health Informatics, Sept. 2017 [SCI-E]
  22. S.A. Soleymani, A.H Abdullah, M.H. Anisi, Muhammad Khurram Khan, S. Goudarzi, T. Khodadadi, A. Altameem, "A Secure Trust Model based on Fuzzy Logic in Vehicular Ad Hoc Networks with Fog Computing", Accepted for Publication, IEEE Access, July 2017 [SCI-E]
  23. S. Lin, L. Kong, Q. Gao, Muhammad Khurram Khan, Z. Zhong, X. Jin, P. Zeng, "Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G System", Accepted for Publication, IEEE Wireless Communications, July 2017 [SCI-E]
  24. S.S Anjum, R. M Noor, M. H Anisi, O. Ismail, A. Fazidah, Muhammad Khurram Khan, "Energy Management in RFID-Sensor Networks: Taxonomy and Challenges", Accepted for Publication, IEEE Internet of Things Journal, July 2017 [SCI-E]
  25. S. Challa, M. Wazid, A.K. Das, Muhammad Khurram Khan, "Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions", In Press, IEEE Consumer Electronics Magazine, June 2017 [SCI-E]
  26. S. Khan, A. Gani, A.W.A Wahab, M. Guizani, Muhammad Khurram Khan, "Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art", IEEE Communications Surveys and Tutorials, pp. 303-324, vol .19, issue 1, Feb 2017 [SCI-E]
  27. Z. Liu, X. Huang, Z. Hu, Muhammad Khurram Khan, H. Seo, L. Zhou, "On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age", IEEE Transactions on Dependable and Secure Computing, pp. 237-248, vol. 14, issue 3, May/June 2017 [SCI-E]
  28. M. Wazid, A.K Das, Muhammad Khurram Khan, A. Alghaiheb, N. Kumar, A.V. Vasilakos, Secure Authentication Scheme for Medicine Anti-counterfeiting System in IoT Environment, Accepted for Publication, IEEE Internet of Things Journal, May 2017 [SCI-E]
  29. J. Shuja, S.A Madani, S. Mustafaa, R.W Ahmad, A. Gani, Muhammad Khurram Khan, "Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures", Accepted for Publication, IEEE Access, May 2017 [SCI-E]
  30. S.F Tzeng, S.J Horng, T. Li, X. Wang, P.H. Huang, Muhmmad Khurram Khan, "Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET", IEEE Transactions on Vehicular Technology, vol 66, no. 4, pp. 3235-3248, April 2017 [SCI-E]
  31. W.Z Khan, M.Y. Alsalem, Muhammad Khurram Khan, Q. Arshad, "Antecedents Affecting Consumer Trust Towards Adopting Internet of Things Enabled Products", Accepted for Publication, IEEE Consumer Electronics Magazine, April 2017 [SCI-E]
  32. R. Amin, S. Sherratt, D. Giri, SKH Islam, Muhammad Khurram Khan, "A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices", Accepted for Publication, IEEE Transactions on Consumer Electronics, Feb. 2017 [SCI-E]
  33. A. Akhunzada, Muhammad Khurram Khan, "Towards Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues", Accepted for Publication, IEEE Communications Magazine, Feb. 2017 [SCI-E]
  34. M. Sookhak, F. Yu, Muhammad Khurram Khan, N. Kumar, "Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing", Accepted for Publication, IEEE Vehicular Technology Magazine, Feb. 2017 [SCI-E]
  35. V. Odelu, AK Das, Muhammad Khurram Khan, K.K.R Choo, M. Jo, "Expressive CP-ABE Scheme for Mobile Devices in IoT satisfying Constant-size Keys and Ciphertexts", Accepted for Publication, IEEE Access, Feb. 2017 [SCI-E]
  36. A.S. Abiodun, M.H. Anisi, I. Ali, A. Akhunzada, Muhammad Khurram Khan, "A Novel Data Segregation and Classification Technique to Reduce Power Consumption in Wireless Body Area Networks", Accepted for Publication, IEEE Consumer Electronics Magazine, Feb. 2017 [SCI-E]
  37. L. Kong, Muhammad Khurram Khan, F. Wu, G. Chen, P. Zeng, "Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges", IEEE Communications Magazine, vol. 55, issue 1, pp. 62-68 Jan. 2017 [SCI-E]
  38. D. He, N. Kumar, Muhammad Khurram Khan, L. Wang, J. Shen, Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services, In Press, IEEE Systems Journal, Nov. 2016 [ISI SCI-E]
  39. S. Khan, A. Gani, A.W.A Wahab, A. Abdelaziz, K. Ko, Muhammad Khurram Khan, M. Guizani, "Software Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges", IEEE Network, pp. 6-13, vol. 30, Issue 6, November-December 2016 [ISI SCI-E]
  40. M. Zareei, E.M. Mohamed, M.H. Anisi, CV. Rosales, K. Tsukamoto, Muhammad Khurram Khan "On-demand Hybrid Routing for Cognitive Radio Ad-Hoc Network", IEEE Access, pp. 8294-8302, vol. 4, Dec. 2016 [ISI SCI-E]
  41. S. Khan, A. Gani, A.W.A Wahab, S.Iqbal, A. Abdelaziz, O.A. Mahdi, A.I.A. Ahmed, M. Shiraz, Y. Al-Mayouf, Z. Khan, K. Ko, Muhammad Khurram Khan, V. Chang, "Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis", IEEE Access, Nov. 2016 [ISI SCI-E]
  42. N. Emmanuel, A. Khan, M. Alam, T. Khan, Muhammad Khurram Khan, “Structures and Data Preserving Homomorphic Signatures”, Accepted for Publication, Journal of Network and Computer Applications, Elsevier, Nov. 2017 [ISI SCI-E]
  43. M. Alam, S. Malik, Q. Javed. A. Khan, S.B Khan, A. Anjum, N. Javed, A. Akhunzada, Muhammad Khurram Khan, “Formal Modeling and Verification of Security Controls for Multimedia Systems in the Cloud”, Multimedia Tools and Applications, Springer, pp. 22845-22870, Vol. 76, Issue 21, Nov. 2017 [SCI-E]
  44. S. Aslam, S. Islam, A. Khan, M. Ahmed, A. Akhundzada, Muhammad Khurram Khan, "Information Collection Centric Techniques for Cloud Resource Management: Taxonomy, Analysis and Challenges", In Press, Journal of Network and Computer Applications, Elsevier, Oct. 2017 [ISI SCI-E]
  45. S. Khan, M. Shiraz, L. Boroumand, A. Gani, Muhammad Khurram Khan "Towards Port-Knocking Authentication Methods for Mobile Cloud Computing", In Press, Journal of Network and Computer Applications, Elsevier, August 2017 [ISI SCI-E]
  46. H. J Syed, A. Gani, R. W Ahmed, Muhammad Khurram Khan, A. I. A Ahmed, "Cloud Monitoring: A Review, Taxonomy, and Open Research Issues", Accepted for Publication, Journal of Network and Computer Applications, Elsevier, August 2017 [ISI SCI-E]
  47. X. Li, F. Fu, Muhammad Khurram Khan, L. Xu, J. Shen, M. Jo, "A Secure Chaotic Map-based Remote Authentication Scheme for Telecare Medicine Information Systems", Accepted for Publication, Future Generation Computer Systems, Elsevier, August 2017 [ISI SCI-E]
  48. M. Tahir, A. Khan, A. Hameed, M. Alam, Muhammad Khurram Khan, F. Jabeen, "Towards a Set Aggregation-based Data Integrity Scheme for Smart Grids", In Press, Annals of Telecommunications, Springer, August 2017 [ISI SCI-E]
  49. S. Goudarzi, W.H. Hassan, M.H. Anisi, Muhammad Khurram Khan, S.A. Soleymani, "Intelligent Technique for Seamless Vertical Handover in Vehicular Networks", Accepted for Publication, Mobile Networks and Applications, Springer, August 2017 [ISI SCI-E]
  50. S. Challa, A.K. Das, V. Odelu, N. Kumar, S. Kumari, Muhammad Khurram Khan, A.V. Vasilakos, "An Efficient ECC-based Provably Secure Three-factor User Authentication and Key Agreement Protocol for Wireless Healthcare Sensor Networks", Accepted for Publication, Computers and Electrical Engineering, Elsevier, July 2017 [ISI SCI-E]
  51. R. Amin, S.K.H Islam, P. Vijaykumar, Muhammad Khurram Khan, V. Chang, "A Robust and Efficient Bilinear Pairing based Mutual Authentication and Session Key Verification over Insecure Communication", In Press, Multimedia Tools and Applications, Springer, July 2017
  52. M. Sookhak, F.R Yu, Muhammad Khurram Khan, Y, Xiang, R. Buyya, "Attribute-Based Data Access Control in Mobile Cloud Computing: Taxonomy and Open Issues", Future Generation Computer Systems, Elsevier, vol. 72, Pages 273-287, July 2017 [ISI SCI-E]
  53. S. Anwar, Z. Inayat, M.F. Zolkipli, J.M. Zain, A. Gani, N.B.l Anuar, Muhammad Khurram Khan, V. Chang, "Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey", In Press, Journal of Network and Computer Applications, Elsevier, June 2017 [ISI SCI-E]
  54. M. Ma, D. He, Muhammad Khurram Khan, J. Chen, "Certificateless Searchable Public Key Encryption Scheme for Mobilehealthcare System", In Press, Computers & Electrical Engineering, Elsevier, May 2017 [ISI SCI-E]
  55. Z. Xu, L. Wu, Muhammad Khurram Khan, K.K.R Choo, D. He, "A Secure and Efficient Public Auditing Scheme using RSA Algorithm for Cloud Storage", Accepted for Publication, Supercomputing, Springer, May 2017 [ISI SCI-E]
  56. A.A. Osman, A.T. Fong, A. Gani, S. Khan, Muhammad Khurram Khan, "On Software Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues", The Computer Journal, Oxford University Press, May 2017 [ISI-SCI-E]
  57. R. Amin, SKH Islam, Muhammad Khurram Khan, A. Karati, D. Giri, S. Kumari, "A Two-factor RSA-based Robust Authentication System for Multi-Server Environments", Accepted for Publication, Security and Communication Networks, May 2017 [ISI SCI-E]
  58. Muhammad Khurram Khan, M. Zakariah, H. Malik, KKR Choo, "A Novel Audio Forensic Dataset for Digital Multimedia Forensics", Accepted for Publication, Australian Journal of Forensic Sciences, Feb. 2017 [ISI SCI-E]
  59. M. Luo, Y. Zhang, Muhammad Khurram Khan, D. He, "Secure and Efficient Identity-based Mutual Authentication Scheme with Smart Card Using Elliptic Curve Cryptography, Accepted for Publication, International Journal of Communication Systems, Wiley, April 2017 [ISI SCI-E]
  60. J. Shuja, A. Ghani, K. Ko, K. So, S. Mustafa, S.A. Madani, Muhammad Khurram Khan, "SIMDOM: A Framework for SIMD Instruction Translation and Offloading in Heterogeneous MCC Architectures", Accepted for Publication, Transactions on Emerging Telecommunications Technologies, Wiley, Feb. 2017 [ISI SCI-E]
  61. Z. Xu, L. Wu, D. He, Muhammad Khurram Khan, "Security Analysis of a Publicly Verifiable Data Possession Scheme for Remote Storage", Accepted for Publication, Supercomputing, Springer, April 2017 [ISI SCI-E]
  62. S.A Chaudhry, H. Naqvi, Muhammad Khurram Khan, "An Enhanced Lightweight Anonymous Biometric based Authentication Scheme for TMIS", In Press, Multimedia Tools and Applications, Springer, Feb. 2017 [ISI SCI-E]
  63. R. Amin, P. Mohit, A. Karati, G.P. Biswas, Muhammad Khurram Khan, "A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System", Accpted for Publication, Journal of Medical Systems, Springer, Feb. 2017 [ISI SCI-E]
  64. S. Kumari, A.K Das, X. Li, F. Wu, Muhammad Khurram Khan, Q. Jiang, S.K.H Islam, "A Provably Secure Biometrics-based Authenticated Key Agreement Scheme for Multi-server Environments", In Press, Multimedia Tools and Applications, Springer, Feb. 2017 [ISI SCI-E]
  65. A. Nazir, M. Alam. S.U.R Malik, A. Akhunzada, M.N Cheema, Muhammad Khurram Khan, Y. Xiang, "A High-Level Domain-specific Language for SIEM:Design, Development and Formal Verification", Accepted for Publication, Cluster Computing, Springer, Feb. 2017 [ISI SCI-E]
  66. Z. Inayat, A. Gani, N.B. Anuar, S. Anwar, Muhammad Khurram Khan, "Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions", In Press, Arabian Journal for Science and Engineering, Springer, Jan. 2017 [ISI SCI-E]
  67. M. Luo, Y. Zhang, Muhammad Khurram Khan, D. He, "An Efficient Chaos-based Two-party Key Agreement Protocol with Provable Security", Accepted for Publication, International Journal of Communication Systems, Wiley, Jan. 2017 [ISI SCI-E]
  68. L. Wu, J. Wang, D. He, Muhammad Khurram Khan, "Cryptanalysis of An Identity-based Public Auditing Protocolfor Cloud Storage", Accepted for Publication, Journal of Zhejiang University-Science A, Springer, Jan. 2017 [ISI SCI-E]
  69. M. Zakariah, Muhammad Khurram Khan, O. Tayan, K. Salah, "Digital Quran Computing: Review, Classification, and Trend Analysis", Accepted for Publication, Arabian Journal for Science and Engineering, Springer, Jan. 2017 [ISI SCI-E]
  70. M. Zakariah, Muhammad Khurram Khan, H. Malik, "Digital Multimedia Audio Forensics: Past, Present and Future", Accepted for Publication, Multimedia Tools and Applications, Springer, Dec. 2016 [ISI-SCI-E]
  71. M.H Rehman, L.C Sun, T.Y Wah, Muhammad Khurram Khan, "Towards Next-generation Heterogeneous Mobile Data Stream Mining Applications: Opportunities, Challenges, and Future Research Directions", Accepted for Publication, Journal of Network and Computer Applications, Elsevier, Nov. 2016 [ISI SCI-E]
  72. WZ Khan, MY Aalsalem, Muhammad Khurram Khan, Q. Arshad, "When Social Objects Collaborate: Concepts, Processing Elements, Attacks and Challenges", In Press, Computers and Electrical Engineering, Elsevier, Nov. 2016 [ISI SCI-E]
  73. D. He, H. Wang, Muhammad Khurram Khan, L. Wang, "Lightweight Anonymous Key Distribution Scheme for Smart Grid Using Elliptic Curve Cryptography" IET Communications, vol. 10, issue 14, pp. 1795-1802, 2016 [ISI SCI-E]
  74. X. Li, A.K Sangaiah, S. Kumari, F. Wu, J. Shen, Muhammad Khurram Khan, "An Efficient Authentication and Key Agreement Scheme with User Anonymity for Roaming Service in Smart City", Accepted for Publication, Personal and Ubiquitous Computing, Springer, Nov. 2016 [ISI SCI-E]
  75. F. Wu, L. Xu, S. Kumari, X. Li, Muhammad Khurram Khan, "An Enhanced Mutual Authentication and Key Agreement Scheme for Mobile User Roaming Service in Global Mobility Networks", Accepted for Publication, Annals of Telecommunications, Springer, Oct. 2016 [ISI SCI-E]
  76. T. Maitra, SKH Islam, R. Amin, D. Giri, Muhammad Khurram Khan, N. Kumar, "An Enhanced Multi-server Authentication Protocol using Password and Smart-card: Cryptanalysis and Design", Accepted for Publication, Security and Communication Networks, Sept. 2016 [ISI SCI-E]
  77. I. Khan, S.A Chaudhry, M. Sher, J.I Khan, Muhammad Khurram Khan, "An Anonymous and Provably Secure Biometric based Authentication Scheme Using Chaotic Maps for Accessing Medical Drop Box Data", Accepted for Publication, Journal of Supercomputing, Springer, Sept. 2016 [ISI SCI-E]
  78. S.A Chaudhry, M.T. Khan, Muhammad Khurram Khan, T. Shon, "A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography", Journal of Medical Systems, Springer, vol. 40, Nov. 2016 [ISI SCI-E]
  79. S.A. Chaudhry, I. Khan, A. Irshad, M.U. Ashraf, Muhammad Khurram Khan, H.F Ahmed, "A Provably Secure Anonymous Authentication Scheme for Session Initiation Protocol", Accepted for Publication, Security and Communication Networks, Sept. 2016 [ISI SCI-E]
  80. M. Karuppiah, S. Kumari, X. Li, F. Wu, A.K Das, Muhammad Khurram Khan, R. Saravanan, S. Basu, "A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks", Accepted for Publication, Wireless Personal Communications, Springer, Sept. 2016 [ISI SCI-E]
  81. J. Shuja, A. Gani, MH Rehman, RW Ahmad, E. Ahmed, SA Madani, Muhammad Khurram Khan, "Towards Native Code Offloading based MCC Frameworks for Multimedia Applications: A Survey", Accepted for Publication, Journal of Network and Computer Applications, Elsevier, August 2016 [ISI SCI-E]
  82. R. Amin, SKH Islam, G.P. Biswas, D. Giri, Muhammad Khurram Khan, N. Kumar, "A More Secure and Privacy-aware Anonymous User Authentication Scheme for Distributed Mobile Cloud Computing Environments", Accepted for Publication, Security and Communication Networks, August 2016 [ISI SCI-E]
  83. M. Khattak, MA Ihsan, S. Farooq, JAK Manzoor, M. Alam, Q. Javaid, A. Akhunzada, Muhammad Khurram Khan, "Optimizing SIEM Throughput on the Cloud Using Parallelization", Accepted for Publication, PLOS ONE, August 2016 [ISI SCI-E]
  84. S. Iqbal, MLM Kiah, NB Anuar, S. Khan, Muhammad Khurram Khan, KKR Choo, "On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service", Accepted for Publication, Journal of Network and Computer Applications, Elsevier, August 2016 [ISI SCI-E]
  85. S. Goudarzi, W.H Hassan, M.H. Anisi, A. Soleymani, M. Sookhak, Muhammad Khurram Khan, "ABC-PSO for Vertical Handover in Heterogeneous Wireless Networks", Accepted for Publication, Neurocomputing, Elsevier, Aug. 2016 [ISI SCI-E]
  86. S. Kumari, A.K Das, M. Wazid, X. Li, F. Wu, K.K.R Choo, Muhammad Khurram Khan, "On the Design of a Secure User Authentication and Key Agreement Scheme for Wireless Sensor Networks", Concurrency and Computation: Practice and Experience, Wiley, July 2016 [ISI SCI-E]
  87. S.A Chaudhry, H. Naqvi, K. Mahmood, H.F. Ahmad Muhammad Khurram Khan, "An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography", Accepted for Publication, Wireless Personal Communications, Springer, July 2016 [ISI SCI-E]
  88. M. Liaqat, A. Gani, M.H Anisi, S.H.A Hamid, A. Akhunzada, Muhammad Khurram Khan, R.A Ali, "Distance-based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks, In Press, PLOS ONE, August 2016 [ISI SCI-E]
  89. M. Wazid, A.K Das, S. Kumari, Muhammad Khurram Khan, "Design of Sinkhole Node Detection Mechanism for Hierarchical Wireless Sensor Networks", Accepted for Publication, Security & Communication Networks, August 2016 [ISI SCI-E]
  90. S. Kumari, L. Xiong, F. Wu, A.K. Das, O Vanga, Muhammad Khurram Khan, "A User Anonymous Mutual Authentication Protocol", Accepted for Publication, KSII Transactions on Internet and Information Systems, July 2016 [ISI SCI-E]
  91. M.Y. Aalsalem, W.Z. Khan, N.M. Saad, M.S. Hossain, M. Atiquzzaman, Muhammad Khurram Khan, A New Random Walk for Replica Detection in WSNs, Accepted for Publication, PLOS ONE, June 2016 [ISI SCI-E]
  92. R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan, N. Kumar, "A Robust and Anonymous Patient Monitoring System using Wireless Medical Sensor Networks", Accepted for Publication, Future Generation Computer Systems, Elsevier, May 2016 [ISI SCI-E]
  93. H. Shen, D. He, Muhammad Khurram Khan, J.H Lee "Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things", Accepted for Publication, Wireless Personal Communications, Springer, May 2016 [ISI SCI-E]
  94. V. Odelu, A.K. Das, Y. S Rao, S. Kumari, Muhammad Khurram Khan, K.K.R Choo, "Pairing-based CP-ABE with Constant-size Ciphertexts and Secret Keys for Cloud Environment", Accepted for Publication, Computer Standards & Interfaces, Elsevier, May 2016 [ISI SCI-E]
  95. M.S. Farash, S.A. Chaudhry, K. Mahmood, Muhammad Khurram Khan, "A Provably Secure RFID Authentication Protocols Based on Elliptic Curve for Healthcare Environments", Accepted for Publication, Journal of Medical Systems, Springer, May 2016 [ISI SCI-E]
  96. S. Kumari, X. Li, F. Wu, A.K. Das, H. Arshad, Muhammad Khurram Khan, "User Friendly Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks using Chaotic Maps", In Press, Future Generation Computer Systems, Elsevier, April 2016 [ISI SCI-E]
  97. F. Wu, L. Xu, S. Kumari, X. Li, A.K. Das, Muhammad Khurram Khan, M. Karuppiah, R. Baliyani, "A Novel and Provable Authentication and Key Agreement Scheme with User Anonymity for Global Mobility Networks", Accepted for Publication, Security and Communication Networks, Wiley, April 2016 [ISI SCI-E]
  98. X. Li, J. Niu, S. Kumari, SKH Islam, F. Wu, Muhammad Khurram Khan, AK Das, "A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security", In Press, Wireless Personal Communications, Springer, April 2016 [ISI SCI-E]
  99. A. Karim, R. Salleh, Muhammad Khurram Khan, A. Siddiqa, K.K.R Choo, "On the Analysis and Detection of Mobile Botnet Applications", Accepted for Publication, Journal of Universal Computer Science, April 2016 [ISI SCI-E]
  100. A. Yousafzai, A. Ghani, R.M Noor, M. Sookhak, R. W Ahmad, M. Shiraz, Muhammad Khurram Khan, "Cloud Resource Allocation Schemes: Review, Taxonomy, and Opportunities", Accepted for Publication, Knowledge and Information Systems, Springer, March 2016 [ISI SCI-E]
  101. SKH Islam, G.P Biswas, M.S Obaidat, Muhammad Khurram Khan, R. Amin, "Provably Secure Pairing-free Identity-based Partially Blind Signature Scheme and its Application in Online e-cash System", Accepted for Publication, The Arabian Journal for Science and Engineering, March 2016 [ISI SCI-E]
  102. Z. Inayat, A. Gani, NB Anuar, Muhammad Khurram Khan, S. Anwar, "Intrusion Response Systems: Foundations, Design, and Challenges", Journal of Network and Computer Applications, Elsevier, pp. 53-74, vol. 62, Feb. 2016 [ISI SCI-E]
  103. SKH Islam, AK Das, Muhammad Khurram Khan, "Design of a Provably Secure Identity-based Digital Multi-signature Scheme using Biometrics and Fuzzy Extractor", Accepted for Publication, Security and Communication Networks, Wiley, Feb. 2016 [ISI SCI-E]
  104. A. Karim, R. Saleh, Muhammad Khurram Khan, "SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications", Accepted for Publication, PLOS ONE, Feb. 2016 [ISI SCI-E]
  105. S. Kumari, Muhammad Khurram Khan, X. Li, F. Wu, "Design of a User Anonymous Password Authentication Scheme without Smart Cards", International Journal of Communication Systems, Wiley, pp. 441-458, vol. 29, issue 3, Feb. 2016 [ISI SC-E]
  106. M. Jahanirada, N.B. Anuara, A. W. A Wahaba, R.M. Noora, M. Sookhak, F.R. YU, J. Abawajy, Muhammad Khurram Khan, "A Cooperative Co-evolutionary Immune System Detection Mechanism (CoCo-ISDM)", Accepted for Publication, Journal of Computer and System Sciences, Elsevier, Feb. 2016 [ISI SCI-E]
  107. Q. Jiang, Muhammad Khurram Khan, X. Lu, J. Ma, D. He, "A Privacy Preserving Three-factor Authentication Protocol for e-Health Clouds", In Press, The Journal of Supercomputing, Jan. 2016 [ISI SCI-E]
  108. R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan, L. Leng, N. Kumar, "Design of Anonymity Preserving Three-Factor Authenticated Key Exchange Protocol for Wireless Sensor Network", In Press, Computer Networks, Elsevier, Jan. 2016 [ISI SCI-E]
  109. W.Z Khan, Muhammad Khurram Khan, F.B Muhaya , M.Y Aalsalem, H.C Chao, A Comprehensive Study of Email Spam Botnet Detection, IEEE Communications Surveys and Tutorials, vol. 17, issue 4, pp. 2271-2295, Nov. 2015 [ISI SCI-E]
  110. A. Akhanzada, E. Ahmed, A. Gani, Muhammad Khurram Khan, M. Imran, S. Guizani, "Securing the Software Defined Networks: Taxonomy, Requirements, and Open Issues", IEEE Communications Magazine, pp. 36-44, vol. 53, issue 4, April 2015 [ISI SCI-E]
  111. P.W Tsai, Muhammad Khurram Khan, J.S Pan, B.Y Liao, "Interactive Artificial Bee Colony Supported Passive Continuous Authentication System", IEEE Systems Journal, vol. 8, no. 2, pp. 395-405, 2014 [ISI SCI-E]
  112. S.J Horng, S.F Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, Muhammad Khurram Khan, "b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET", IEEE Transactions on Information Forensics and Security, vol. 8, issue 11, pp. 1860-1875, Nov. 2013 [ISI SCI-E]
  113. D. He, N. Kumar, Muhammad Khurram Khan, J. H Lee, "Anonymous Two-factor Authentication for Consumer Roaming Service in Global Mobility Networks", IEEE Transactions on Consumer Electronics, vol. 59, no. 4, pp. 811-817, Nov. 2013 [ISI SCI-E]
  114. A. Akhunzadaa, A. Gani, N.B. Anuar, A. Aziz, Muhammad Khurram Khan, A. Hayat, S.U. Khan,"Secure and Dependable Software Defined Networks", In Press, Journal of Network and Computer Applications, Elsevier Science, Dec. 2015 [ISI SCI-E]
  115. R. Amin, SKH Islam , G. P. Biswas, Muhammad Khurram Khan, MS. Obaidat, "Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System", Journal of Medical Systems, Springer, vol. 39, Issue 11, Nov 2015 [ISI SCI-E]
  116. SKH Islam, AK Das, Muhammad Khurram Khan, "A Novel Biometric-based Password Authentication Scheme for Client-server Environment using ECC and Fuzzy Extractor", Accepted for Publication, International Journal of Adhoc and Ubiquitous Computing, Nov. 2015 [ISI SCI-E]
  117. SA Chaudhry, K. Mahmood, H. Naqvi, Muhammad Khurram Khan, "An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems based on Elliptic Curve Cryptography", Journal of Medical Systems, Springer, vol. 39, issue 11, Nov. 2015 [ISI SCI-E]
  118. R. Amin, SK Hafizul Islam, G. P. Biswas, M. K. Khan, X. Li, "Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems", Journal of Medical Systems, Springer, vol. 39, issue 11, Nov. 2015 [ISI SCI-E]
  119. S.J Horng, S.F Tzeng, PH Huang, X. Wang, T. Li, Muhammad Khurram Khan, "An Efficient Certificateless Aggregate Signature with Conditional Privacy-Preserving for Vehicular Sensor Networks", vol. 317, issue 1, pp. 48-66, Information Sciences, Elsevier, Oct. 2015 [ISI SCI-E]
  120. M. Alizadeh, M. Zamani, S. Baharun, A. AbdulManaf, K.Sakurai, H. Anada, H. Keshavarz, S. A Chaudhry, Muhammad Khurram Khan, "Cryptanalysis and Improvement of 'A Secure Password Authentication Mechanism for Seamless Handover in ProxyMobile IPv6 Networks", Accepted for Publication, PLOS ONE, Oct. 2015 [ISI SCI-E]
  121. S. Kumari, F. Wu, X. Li, MS Farash, Qi Jiang, Muhammad Khurram Khan, A.K Das, "Single Round-trip SIP Authentication Scheme with Provable Security for Voice over Internet Protocol using Smart Card, Multimedia Tools and Applications, Springer, vol. 75, Issue 24, pp 17215-17245, December 2016 [ISI SC-IE]
  122. R. Amin, SKH Islam, G. P. Biswas, Muhammad Khurram Khan, N. Kumar, "An Efficient and Practical Smart Card Based Anonymity Preserving UserAuthentication Scheme for TMIS using Elliptic Curve Cryptography", Accepted for Publication, Journal of Medical Systems, Springer, Sept. 2015 [ISI SCI-E]
  123. S. Kumari, L. Xiong, F. Wu, SA. Chaudary, Muhammad Khurram Khan, "An improved smart card based authentication scheme for session initiation protocol", Accepted for Publication, Peer-to-Peer Networking and Applications, Springer, August 2015 [ISI SCI-E]
  124. SKH Islam, MS Farash, G. P. Biswas, Muhammad Khurram Khan, MS Obaidat, "A Pairing-free Certificateless Digital Multisignature Scheme using Elliptic Curve Cryptography", Accepted for Publication, International Journal of Computer Mathematics, Taylor & Francis, August 2015 [ISI SCI-E]
  125. S.K.H Islam, Muhammad Khurram Khan, X. Li, "Security Analysis and Improvement of `A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'", PLOS ONE, August 2015 [ISI SCI-E]
  126. M.S Farash, S.A Chaudhry, M. Hyderi, M.S. Sadough, S. Kumari, Muhammad Khurram Khan, "A Lightweight Anonymous Authentication Scheme for Consumer Roaming in Ubiquitous Networks with Provable Security", Accepted for Publication, International Journal of Communication Systems, Wiley, June 2015 [ISI SCI-E]
  127. S. A Chaudhry, M.S Farash, H. Naqvi, S. Kumari, Muhammad Khurram Khan, "An Enhanced Privacy Preserving Remote User Authentication Scheme with Provable Security", Accepted for Publication, Security and Communication Networks, June 2015 [ISI SCI-E]
  128. Muhammad Khurram Khan, A. Chaturvedi, D. Mishra, Saru Kumari, On the Security Enhancement of Integrated Electronic Patient Records Information Systems, Computer Science and Information Systems, vol. 12, issue 2, June 2015 [ISI SCI-E]
  129. J. Dongli, D. Xintao, Muhammad Khurram Khan, "Modified Artificial Bee Colony Optimization with Block Perturbation Strategy", Engineering Optimization, Taylor & Francis, vol. 47, issue 5, pp. 642-655, May 2015 [ISI SCI-E]
  130. S. Kumari, Muhammad Khurram Khan, M. Atiquzzaman, "User Authentication Schemes for Wireless Sensor Networks: A Review", Ad Hoc Networks, Elsevier, vol. 27, pp.159-194, April 2015 [ISI SCI-E]
  131. Z. Siddiqui, A. Hanan, Muhammad Khurram Khan, A. Alghamdi, "Cryptanalysis and Improvement of 'A Secure Authentication Scheme for Telecare Medical Information System' with Nonce Verification", In Press, Peer-to-Peer Networking and Applications, Springer, April 2015 [ISI SCI-E]
  132. W. Zhang, X. Wang, Muhammad Khurram Khan, "A Virtual Bridge Certificate Authority-based Cross-domain Authentication Mechanism for Distributed Collaborative Manufacturing Systems", Security & Communication Networks, Wiley, pp. 937-951, vol. 8, issue 6, April 2015 [ISI SCI-E]
  133. W. Halboob, H. Abbas, Muhammad Khurram Khan, F.A Khan, M. Pasha, "A Framework to Address Inconstant User Requirements in Cloud SLAs Management", Cluster Computing, Springer, vol. 18, Issue 1, pp. 123-133, March 2015 [ISI SCI-E]
  134. E. Ahmed, A. Gani, Muhammad Khurram Khan, R. Buyya, SU Khan, "Seamless Application Execution in Mobile Cloud Computing: Motivation, Taxonomy, and Open Challenges", Journal of Network & Computer Applications, Elsevier, March 2015 [ISI SCI-E]
  135. SKH Islam, Muhammad Khurram Khan, MS. Obaidat, Fahad Muhaya, "Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks using Extended Chaotic Maps", In Press, Wireless Personal Communications, Springer, March 2015 [ISI SCI-E]
  136. X. Li, J. Liao, S. Kumari, W. Liang, F. Wu, Muhammad Khurram Khan, "A New Dynamic ID based User Authentication Scheme using Mobile Device: Cryptanalysis, the Principles and Design", In Press, Wireless Personal Communications, Springer, Feb. 2015 [ISI SCI-E]
  137. A. Akhunzada, M. Sookhak, Nor Badrul Anuar, A. Gani, E. Ahmed, S. Furnell, A. Hyat, Muhammad Khurram Khan, "Man-At-The-End Attacks: Analysis, Taxonomy, Human Aspects, Motivation and Future Directions", Journal of Network and Computer Applications, Elsevier, vol. 48, pp. 44-57, February 2015 [ISI SC-E]
  138. H. Debiao, Muhammad Khurram Khan, N. Kumar, "A New Handover Authentication Protocol based on Bilinear Pairing Functions for Wireless Networks", International Journal of Ad hoc and Ubiquitous Computing, pp. 67-74, vol. 18, nos. 1/2, 2015. [ISI SCI-E]
  139. B. Huang, Muhammad Khurram Khan, L. Wu, F. B Muhaya, D. He, "An Efficient Remote User Authentication with Key Agreement Scheme using Elliptic Curve Cryptography", In Press, Wireless Personal Communications, Springer, Feb. 2015 [ISI SCI-E]
  140. M. Sookhak, A. Akhunzada, A. Sookhak, M. Eslaminejad, A. Gani, Muhammad Khurram Khan, L. Xiong, WX Ming, "Geographic Wormhole Detection in Wireless Sensor Network", PLOS ONE, vol. 10, issue 1, Jan. 2015 [ISI SCI-E]
  141. D. Mishra, S. Kumari, Muhammad Khurram Khan, S. Mukhopadhya, "An Anonymous Biometric Based Remote User Authenticated Key Agreement Scheme for Multimedia Systems", Accepted for Publication, International Journal of Communication Systems, Wiley, Jan. 2015 [ISI SCI-E]
  142. X Li, JW Niu, S Kumari, Muhammad Khurram Khan, JG Liao, W Liang, "Design and Analysis of a Chaotic Maps-based Three Party Authenticated Key Agreement Protocol", Accepted for Publication, Nonlinear Dynamics, Springer, Jan. 2015 [ISI SCI-E]
  143. X. Li, J. Niu, S. Kumari, J.Liao, W. Liang, Muhammad Khurram Khan, "A New Authentication Protocol for Healthcare Application using Wireless Medical Sensor Networks with User Anonymity", Accepted for Publication, Security and Communication Networks, Wiley, Jan. 2015 [ISI SCI-E]
  144. S. Kumari, Muhammad Khurram Khan, "Cryptanalysis and Improvement of 'A Robust Smart-Card-Based Remote User Password Authentication Scheme'", International Journal of Communication Systems, Wiley, pp. 3939-3955, vol. 27, issue 12, Dec. 2014. [ISI SCI-E]
  145. S. Kumari, Muhammad Khurram Khan, X. LI, "A More Secure Digital Rights Management Authentication Scheme Based on Smart Card, Accepted for Publication, Multimedia Tools and Applications, Springer, Nov. 2014 [ISI SCI-E]
  146. S.J Horng, S.F Tzeng, X.Wang, S. Qiao, X. Gong, Muhammad Khurram Khan, "Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs", vol 79, Issue 2, pp. 1445-1454, Wireless Personal Communications, Springer, November 2014, [ISI SCI-E]
  147. M.H Eldefrawy, Muhammad Khurram Khan, "Banknote Validation Through Embedded RFID Chip and NFC-enabled Smart Phone", In Press, Mathematical Problems in Engineering, Nov. 2014 [ISI SCI-E]
  148. S. J Horng, D. Rosiyadi, P. Fan, X. Wang, Muhammad Khurram Khan, "An Adaptive Watermarking Scheme for e-government Document Images", Multimedia Tools and Applications, Springer-Verlag, vol. 72, issue 3, pp. 3085-3103, Oct. 2014 [ISI SCI-E]
  149. S.K.H Islam, Muhammad Khurram Khan, A.M. Al-Khouri, "Anonymous and Provably Secure Certificateless Multireceiver Encryption without Bilinear Pairing", Accepted for Publication, Security and Communication Networks, Wiley, Oct. 2014 [ISI SCI-E]
  150. M. Shookhak, H. Talebian, E. Ahmed, A. Gani, Muhammad Khurram Khan, "A Review on Remote Data Auditing in Single Cloud Server: Taxonomy and Open Issues", Journal of Network & Computer Applications, Elsevier, vol 43, pp. 121-141, August 2014 [ISI SCI-E]
  151. SKH Islam, Muhammad Khurram Khan , "Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems, Journal of Medical Systems, Springer, August 2014 [ISI SCI-E]
  152. D. Jia, X. Duan, Muhammad Khurram Khan, "Binary Artificial Bee Colony Optimization Using Bitwise Operation", Accepted for Publication, Computers & Industrial Engineering, Elsevier, August 2014 [ISI SCI-E]
  153. L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, "Orientation Range of Transposition for Vertical Correlation Suppression of 2DPalmPhasor Code", Accepted for Publication, Multimedia Tools & Applications, Springer, August 2014 [ISI SCI-E]
  154. S.H Islam, Muhammad Khurram Khan, "Provably Secure and Pairing-free Identity-based Handover Authentication Protocol for Wireless Mobile Networks", Accepted for Publication, International Journal of Communication Systems, Wiley, July 2014 [ISI SCI-E]
  155. Y. Zhang, Muhammad Khurram Khan, J. Chen, D. He, "Provable Secure and Efficient Digital Rights Management Authentication Scheme using Smart Card based on Elliptic Curve Cryptography", Mathematical Problems in Engineering, In Press, July 2014 [ISI SCI-E]
  156. M. Sookhak, A. Akhunzada, A. Gani, Muhammad Khurram, "Towards Dynamic Remote Data Auditing in Computational Clouds", In Press, Scientific World Journal, May 2014 [ISI SCI-E]
  157. S. Kumari, Muhammad Khurram Khan, X. Li, "An Improved Remote User Authentication Scheme with Key Agreement", In Press, Computers & Electrical Engineering, Elsevier Science, May 2014 [ISI SCI-E]
  158. D. Mishra, S. Mukhopadhyay, S. Kumari, Muhammad Khurram Khan, "Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce", Journal of Medical Systems, Springer, vol. 38, Issue 5, April 2014 [ISI SCI-E]
  159. Muhammad Khurram Khan, S. Kumari, "Cryptanalysis and Improvement of 'An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems'", Security and Communication Networks, John Wiley & Sons, vol. 7, issue 2, pages 399-408, Feb. 2014. [ISI SCI-E]
  160. D. Mishra, S. Mukhopadhyay, A. Chaturvedi, S. Kumari, Muhammad Khurram Khan, "Cryptanalysis and Improvement of Yan et al.'s Biometric-based Authentication Scheme for Telecare Medicine Information Systems", Journal of Medical Systems, Springer, vol. 38, issue 24, June 2014 [ISI SCI-E]
  161. Xi Li, J. Niu, Muhammad Khurram Khan, J. Liao, X. Zhao, "Robust three-factor Remote User Authentication Scheme with Key Agreement for Multimedia Systems", In Press, Security and Communication Networks, Wiley, March 2014 [ISI SCI-E]
  162. L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, "Analysis of Correlation of 2DPalmHash Code and Orientation Range Suitable for Transposition", Neurocomputing, Elsevier, vol. 131, issue 5, pp. 377-387, May 2014 [ISI SCI-E]
  163. F. Kurniawan, M.S. Khalil, Muhammad Khurram Khan, Y. Alginahi, "Two-layer Fragile Watermarking Method Secure with Chaotic-map for Authentication of Digital Holy Quran", Scientific World Journal, Hindawi, vol. 2014, Article ID 803983, 2014 [ISI SCI-E]
  164. Z. Siddiqui, A.H Abdullah, Muhammad Khurram Khan, Abdullah S.G, "Smart Environment as a Service: Three Factor Cloud based User Authentication for Telecare Medical Information System", Journal of Medical Systems, Springer, vol. 38, issue 1, Jan. 2014 [ISI SCI-E]
  165. Muhammad Khurram Khan, S. Kumari, "An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks", International Journal of Distributed Sensor Networks, vol. 2014, Article ID 347169, 2014. [ISI SCI-E]
  166. D. He, J. Chen, W. Shi, Muhammad Khurram Khan, "On the Security of An Authentication Scheme for Multi-server Architecture", International Journal of Electronic Security and Digital Forensics, vol. 5, no. 3/4, pp. 288-296, 2013.
  167. S. Kumari, Muhammad Khurram Khan, "More Secure Smart Card Based Remote User Password Authentication Scheme with User Anonymity, In Press, Security and Communication Networks, Wiley, Sept. 2013 [ISI SCI-E]
  168. D. He, Muhammad Khurram Khan, Cryptanalysis of aKey Agreement Protocol based on Chaotic Hash, International Journal Electronic Security and Digital Forensics, vol. 5, nos. 3/4, pp. 172-177, 2013.
  169. F. Li, M. Fahad, Muhammad Khurram Khan, T. Takagi, "Lattice-based Signcryption", Concurrency and Computation: Practice and Experience, vol. 25, Issue 14, pp. 2112-2122, Sept. 2013. [ISI SCI-E]
  170. S. Kumari, M.K Gupta, Muhammad Khurram Khan, X. Li, "An Improved Timestamp-bassed Password Authentication Schemem: Comments, Cryptanalysis and Improvement", In Press, Security and Communication Networks, Wiley, Sept. 2013 [ISI SCI-E]
  171. Muhammad Khurram Khan, S. Kumari, An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity, BioMed Research International, vol. 2013, Article ID 491289, 2013. [ISI SCI-E]
  172. L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, "A Remote Cancelable Palmprint Authentication Protocol Based on Multi-directional Two-dimensional PalmPhasor-Fusion", In Press, Security and Communication Networks, John-Wiley & Sons, September 2013 [ISI SCI-E]
  173. Muhammad Khurram Khan, S. Kumari, "An Authentication Scheme for Secure Access to Healthcare Services", Journal of Medical Systems, vol. 37, Issue 4, Springer-Verlag, July 2013. [ISI SCI-E]
  174. S. J Horng, D. Rosiyadi, T. Li, T. Takao, M. Guo, Muhammad Khurram Khan, "A Blind Image Copyright Protection Scheme for e-government", Journal of Visual Communication and Image Representation, Elsevier Science, vol. 24, issue 7, pp. 1099-1105, Oct. 2013. [ISI SCI-E]
  175. S.J Horng, L.Y Hsu, T. Li, S. Qiao, X. Gong, H.H Chou, Muhammad Khurram Khan, "Using Sorted Switching Median Filter to Remove High-Density Impulse Noise", Journal of Visual Communication and Image Representation, vol. 24, Issue 7, pp. 956-967, Elsevier Sciecne, Oct. 2013. [ISI SCI-E]
  176. S.J Horng, S.F Tzeng, P. Fan, X. Wang, T. Li, Muhammad Khurram Khan, "Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles", KSII Transactions on Internet and Information Systems, vol. 7, issue 6, pp. 1512-1532, June 2013. [ISI SCIE]
  177. S. Kumari, Muhammad Khurram Khan, R. Kumar, "Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'", Journal of Medical Systems, Springer-Verlag, vol. 37, number 4, May 2013. [ISI SCI-E]
  178. Muhammad Khurram Khan, S. Kumari, P. Singh, "Cryptanalysis of an 'Efficient-Strong Authentication Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'", KSII Transactions on Internet and Information Systems, vol. 7, issue 5, pp. 967-979, May. 2013. [ISI SCI-E]
  179. Muhammad Khurram Khan, S. Kumari, M.K. Gupta, "More Efficient Key-Hash Based Fingerprint Remote Authentication Scheme Using Mobile Device", In Press, Computing, Springer-Verlag, Feb. 2013. [ISI SCI-E]
  180. W. Halboob, A. Mamat, R. Mahmod, K. Alghathbar, Muhammad Khurram Khan, "Trust-based Scalable Access Control Model for Broadcast XML Documents", Information, vol. 16, no. 3(A), pp. 2075-2086, March 2013. [ISI SCI-E]
  181. D. He, Muhammad Khurram Khan, S. Wu, "On the Security of a RSA-based Certificateless Signature Scheme", International Journal of Network Security, vol.15, no.6, pp.408-410, 2013
  182. M. Mahmud, M. Mogy, Muhammad Khurram Khan, K. Alghathbar, S.S Yeo, "Designing User Profiling Prototype for Identification of Malicious Forums", Information, vol. 16, no. 3(A), pp. 1679-1692, March 2013. [ISI SCI-E]
  183. X. Li, J. Niu, Muhammad Khurram Khan, J. Liao, "An Enhanced Smart Card based Remote User Password Authentication Scheme", In Press, Journal of Network & Computer Applications, Elsevier Science, Feb. 2013. [ISI SCI-E]
  184. Muhammad Khurram Khan, H.D Biao, "Cryptanalysis of a Certificateless Aggregate Signature Scheme for Mobile Computation", In Press, Applied Mathematics & Information Sciences, Jan. 2013. [ISI SCI-E]
  185. J. Dongli, X. Duan, Muhammad Khurram Khan, "An Efficient Binary Differential Evolution with Parameter Adaptation", International Journal of Computational Intelligence Systems, pp. 328-336, vol. 6, issue 2, Feb. 2013. [ISI SCI-E]
  186. X. Li, J. Niu, Muhammad Khurram Khan, Z. Wang, "Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme", Mathematical Problems in Engineering, vol. 2013, page 1-10, 2013 [ISI SCI-E]
  187. M. H. Eldefrawy, Muhammad Khurram Khan, K. Alghathbar, "Dynamic Password Based Remote User Authentication without Time Stamping", International Journal of Innovative Computing, Information and Control, pp. 33-45, vol. 9, no. 1, January 2013. [ISI SCI-E]
  188. A. Waqar, A. Raza, H. Abbas, Muhammad Khurram Khan, "A Framework for Preservation of Cloud Users' Data Privacy using Dynamic Reconstruction of Metadata", Journal of Network & Computer Applications (JNCA), Elsevier Science, vol. 36, Issue 1, pp. 235-248, Jan. 2013. [ISI SCI-E]
  189. Muhammad Bilal khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah AlKelabi, Abdulaziz AlAjaji, "Cyber Security using Arabic CAPTCHA Scheme", International Arab Journal of Information Technology, pp. 76-84, vol. 10, issue 1, January 2013. [ISI SCI-E]
  190. S.J Horng, D. Rosiyadi, P.Fan, W. Xian, Muhammad Khurram Khan, Y. Pan, "An Efficient Copyright Protection Scheme for E-government Document Images", IEEE Multimedia, vol. 19, issue 3, pp. 62-73, 2012. [ISI SCI-E]
  191. Muhammad Khurram Khan, D. He, "A New Dynamic Identity based Authentication Protocol for Multi-server Environment using Elliptic Curve Cryptography", Security & Communication Networks, John Wiley & Sons, vol. 5, Issue 11, pp. 1260-1266, November 2012. [ISI SCI-E]
  192. M. Alam, T. Ali, S. Khan, S. Khan, M. Ali, M. Nauman, A. Hayat, Muhammad Khurram Khan, Khaled Alghathbar, "Analysis of Existing Remote Attestation Techniques", Security & Communication Networks, John Wiley & Sons, pp. 1062-1082, vol. 5, issue 9, September 2012. [ISI SCI-E]
  193. H.C Li, P.Z Fan, Muhammad Khurram Khan, "Context-adaptive Anisotropic Diffusion for Image Denoising", IET Electronics Letters, vol. 48, Issue 14, pp. 827-829, July 2012. [ISI SCI-E]
  194. S.Y Kang, J. Park, Muhammad Khurram Khan, J. Kwak, "Study on the Common Criteria Methodology for Secure Ubiquitous Environment Construction", Journal of Intelligent Manufacturing, Springer-Verlag, vol. 23, no. 4, pp. 933-939, August 2012. [ISI SCI-E]
  195. M.S Khalil, Muhammad Khurram Khan, "Statistical Authentication of Fingerprint", The Imaging Science Journal, UK, vol.60, no. 3, pp. 165-171, June 2012. [ISI SCI-E]
  196. M. H. Eldefrawy, Muhammad Khurram Khan, K. Alghathbar, T. H. Kim, H. Elkamchouchi, "Mobile-OTP: Two-Factor Authentication using Mobile Phones", Security and Communication Networks, John Wiley & Sons, vol. 5, issue 5, pp. 508-516, May 2012. [ISI SCI-E]
  197. M.I Razzak, S. A Husain, A.A. Mirza, Muhammad Khurram Khan, "Bio-Inspired Multilayered and Multilanguage Arabic Script Character Recognition System", International Journal of Innovative Computing, Information and Control, pp. 2681, vol 8, number 4, April 2012. [ISI SCI-E]
  198. Muhammad Imran Razzak, Basem. A. Elmogy, Muhammad Khurram Khan, K. Alghathbar, "Efficient Distributed Face Recognition in Wireless Sensor Network", International Journal of Innovative Computing, Information and Control, pp. 2811, vol. 8, number 4, April 2012 [ISI SCI-E]
  199. M. Farfoura, S.J Horng, J.L Lai, R.S Run, R.J Chen, Muhammad Khurram Khan, "A Blind Reversible Method for Watermarking Relational Databases Based on a Time-stamping Protocol", Expert Systems with Applications, Elsevier Science, Vol. 39, Issue3, pp. 3185-3196, Feb. 2012. [ISI SCI-E]
  200. M Zubair Rafique, Faraz Ahmed, Muhammad Khurram Khan, Muddassar Farooq, "Securing Smart Phones Against Malicious Exploits", Information, vol. 15, no. 2, pp. 903-922, Feb. 2012. [ISI SCI- E]
  201. F. Li, Muhammad Khurram Khan, "A Biometric Identity-based Signcryption Scheme", Future Generation Computer Systems, Elsevier Science, pp. 306-310, vol 28, Issue 1, January 2012. [ISI SCI-E]
  202. Lijun Yan, Jeng-Shyang Pan, Shu-Chuan Chu, Muhammad Khurram Khan, "Adaptively Weighted Sub-directional Two-dimensional Linear Discriminant Analysis for Face Recognition", Future Generation Computer Systems, Elsevier Science, pp. 232-235, vol 28, Issue 1, January 2012. [ISI SCI-E]
  203. F. Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi, "Identity-based online/offline signcryption for low power devices", Journal of Network and Computer Applications, Elsevier Science, vol. 35, issue 1, pp. 340-347, Jan. 2012. [ISI SCI-E]
  204. M. He, S.J Horng, P. Fan, Muhammad Khurram Khan, R.S Run, J.L Lai, R.J Chen, A. Sutanto, "An Efficient Phishing Webpage Detector", Expert Systems with Applications, Elsevier Science, Vol. 38, Issue 10, pp. 12018-12027, September 2011. [ISI SCI-E]
  205. Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo, "New Robust Protocols for Remote User Authentication and Password Change", International Journal of Innovative Computing, Information and Control, pp. 5583-5603, Vol. 7, No. 9, Sept. 2011. [ISI SCI-E]
  206. S.T Lin, S.J Horng, B.H Lee, P. Fan, Y. Pan, J.L Lai, R.J Chen, Muhammad Khurram Khan, "Application of Grey-relational Analysis to Find the Most Suitable Watermarking Scheme", International Journal of Innovative Computing, Information and Control, volume 7, Number 9, September 2011. [ISI SCI-E]
  207. Dongli Jia, Guoxin Zheng, Muhammad Khurram Khan, "An Effective Memetic Differential Evolution Algorithm Based on Chaotic Local Search", Information Sciences, Elsevier Science, vol. 181, Issue 15, pp. 3175-3187, August 2011. [ISI SCI-E]
  208. Y.L Huang, S.J Horng, T.W Kao, R.S Run, J.L Lai, R.J Chen, I.H Kuo, Muhammad Khurram Khan, "An Improved Forecasting Model Based on the Weighted Fuzzy Relationship Matrix Combined with a PSO Adaptation for Enrollments", International Journal of Innovative Computing, Information and Control (IJICIC), vol. 7, number 7, July 2011. [ISI SCI-E]
  209. Y.L Huang, S.J Horng, M.X He, P. Fan, T.W Kao, Muhammad Khurram Khan, J.L Lai, I. H Kuo, "A Hybrid Forecasting Model for Enrollments based on Aggregated Fuzzy Time Series and Particle Swarm Optimization", Expert Systems with Applications, Elsevier Science, vol. 38, Issue 7, pp. 8014-8023, July 2011. [ISI SCI-E]
  210. Dongli Jia, Guoxin Zheng, Bo Yang Qu, Muhammad Khurram Khan, "A Practical Hybrid Particle Swarm Optimization Algorithm for High-dimensional Complex Engineering Problems", Computers and Industrial Engineering, Elsevier Science, vol. 61 Issue 4, pp. 1117-1122, November, 2011. [ISI SCI-E]
  211. Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf , "Multimodal Biometric Recognition based on Fusion of Low Resolution Face and Finger Veins", Accepted for Publication, International Journal of Innovative Computing, Information and Control (IJICIC), vol. 7, no. 8, pp. 4679-4689, August 2011. [ISI SCI-E]
  212. Muhammad Khurram Khan, Khaled Alghathbar, Jiashu Zhang, "Secure and Tokenless Privacy-Protecting Chaotic Revocable Biometrics Authentication Scheme", Telecommunication Systems, Springer-Verlag, vol. 47, no. 3-4, pp. 227-234, June 2011. [ISI SCI-E]
  213. F. Li, Muhammad Khurram Khan, "A Survey of Identity-Based Signcryption", IETE Technical Review, vol. 28, Issue 3, pp. 265-272, May-June 2011. [ISI SCI-E]
  214. Hong Zhao, Hongxia Wang, Muhammad Khurram Khan, "Steganalysis for Palette-based Images using Generalized Difference Image and Color Correlogram", Signal Processing, Elsevier Science, May 2011. [ISI SCI-E]
  215. S.J Horng, W.H Lin, T.W Kao, P. Fan, Muhammad Khurram Khan, "An Efficient Wavelet-tree-based Watermarking Method", Expert Systems with Applications (ESWA), Elsevier Science, vol. 38, issue 11, pp. 14357-14366, Jan. 2011. [ISI SCI-E]
  216. Mohammad Sayim Khalil, Muhammad Imran Razzak, Muhammad Khurram Khan, "Fingerprint Classification Using PCA, LDA, L-LDA and BPN", Information, pp.3313-3324, vol.14, no.10, Oct. 2011. [ISI SCI-E]
  217. M. He, S.J Horng, P. Fan, Muhammad Khurram Khan, R.S Run, J.L Lai, R.J Chen, "A Fast RFID Tag Identification Algorithm Based on Counter and Stack", Expert Systems with Applications, Elsevier Science, vol. 38, Issue 6, pp. 6829-6838, June 2011. [ISI SCI-E]
  218. L.Y Hsu, S.J Horng, M.X He, P. Fan, T.W Kao, Muhammad Khurram Khan, R.S Run, J.L Lai, R. J Chen, "Mutual Funds Trading Strategy based on Particle Swarm Optimization", Expert Systems with Applications, Elsevier Science, vol. 38, Issue 6, pp. 7582-7602, June 2011. [ISI SCI-E]
  219. L.Y Hsu, S.J Horng, P. Fan, Muhammad Khurram Khan, Y.R Wang, R.S Run, J.L Lai, R.J Chen, "MTPSO Algorithm for Solving Planar Graph Coloring Problem", Expert Systems with Applications, Elsevier Science, vol. 38, Issue 5, pp. 5525-5531, May 2011. [ISI SCI-E]
  220. Muhammad Khurram Khan, Jiashu Zhang, Khaled Alghathbar, "Challenge-Response based Biometric Image Scrambling for Secure Personal Identification", Future Generation Computer Systems (FGCS), Elsevier Science, vol. 27, pp. 411-418, April 2011. [ISI SCI-E]
  221. Hong Zhao, Hong-Xia Wang, Muhammad Khurram Khan, "Statistical Analysis of Several Reversible Data Hiding Algorithms", Journal of Multimedia Tools and Applications (MTAP), Springer-Verlag, vol. 52, numbers 2-3, pp. 277-290, April 2011. [ISI SCI-E]
  222. Muhammad imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Jong Hyuk Park, "Energy Efficient Distributed Face Recognition in Wireless Sensor Network", Wireless Personal Communications, Springer-Verlag, vol. 60, no. 3, pp. 571-582, 2011. [ISI SCI-E]
  223. Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar, "Cryptanalysis and Security Enhancement of a 'More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme'", Computer Communications, Elsevier Science, vol. 34, issue 3, pp. 305-309, March 2011. [ISI SCI-E]
  224. Bilal Khan, Khaled Alghathbar, Syed Irfan Nabi, Muhammad Khurram Khan, Effectiveness of Information Security Awareness Methods based on Psychological Theories, AJBM, vol. 5, issue 26, pp. 10862-10868, Oct. 2011. [ISI SCI-E]
  225. S.Y Lin, S.J Horng, T.W Kao, C.S Fahn, P. Fan, Y.H Chen, Muhammad Khurram Khan, A. Bourgeois, T. Terano, "3D Block-Based Medial Axis Transform and Chessboard Distance Transform Based on Dominance", Image and Vision Computing, Elsevier Science, vol. 29, Issue 4, pp. 272-285, Feb. 2011. [ISI SCI-E]
  226. Xianfeng Guo, Jiashu Zhang, Muhammad Khurram Khan, Khaled Alghathbar, "Secure Chaotic Map based Block Cryptosystem with Application on Camera Sensor Networks", Sensors, vol. 11, issue 2, pp. 1607-1619, Feb. 2011. [ISI SCI-E]
  227. Lu Leng, Jiashu Zhang, Muhammad Khurram Khan, Xi Chen, Ming Ji, Khaled Alghathbar, "Cancelable PalmCode Generated from Randomized Gabor Filters for Palmprint Template Protection", Scientific Research & Essays, vol. 6, number 3, Feb. 2011. [ISI SCI-E]
  228. Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yusof, "CSLDA and LDA Fusion based Face Recognition", Przeglad Elektrotechniczny, vol. 87, Issue 1, pp. 210-214, Jan. 2011. [ISI SCI-E]
  229. Zeeshan Shafi Khan, Khalid Rashid, Muhammad Khurram Khan, Muhammad Sher, "An Extended Intrusion Detection and Prevention System for Next Generation Network Application", Information, vol. 14, no. 1, pp. 135-150, Jan. 2011. [ISI SCI-E]
  230. Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, Khaled Alghathbar, "Analysis of Enterprise Service Buses based on Information Security, Interoperability and High-availability using AHP Method", International Journal of Physical Sciences, Vol. 6, no. 1, pp. 35-42, Jan. 2011. [ISI SCI-E]
  231. Muhammad Imran Razzak, Syed Afaq Husain, Muhammad Khurram Khan, Muhammad Sher, "Handling Diacritical Marks for Online Arabic Script Based Languages Character Recognition using Fuzzy c-mean Clustering and Relative Position", Information, vol. 14, no. 1, pp. 157-166, Jan. 2011 [ISI SCI-E]
  232. Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo, Cryptanalysis of a Handover Authentication Scheme using Credentials based on Chameleon Hashing, IEICE Transactions on Information and Systems, volume E93-D, number 11, pp. 3400-3402, Dec. 2010. [ISI SCI-E]
  233. Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo, "Improvement of the Efficient Secret Broadcast Scheme", IEICE Transactions on Information and Systems, volume E93-D, no. 11, pp. 3396-3399, Dec. 2010. [ISI SCI-E]
  234. Lu Leng, Jiashu Zhang, Muhammad Khurram Khan , Xi Chen, Khaled Alghathbar, "Dynamic Weighted Discrimination Power Analysis: a Novel Approach for Face and Palmprint Recognition in DCT Domain", International Journal of the Physical Sciences, vol. 5, Issue, 17, pp. 2543-2554, Dec. 2010. [ISI SCI-E]
  235. A. Rahim, Z.S Khan, F.B Muhaya., M. Sher, Muhammad Khurram Khan, "Information Sharing in Vehicular Adhoc Network", International Journal of Computers, Communications & Control, vol. 5, issue 5, pp. 892-899, Dec. 2010 [ISI SCI-E]
  236. Zeeshan Shafi Khan, Farzana Azam, Khaled Alghathbar, Muhammad Sher, Khalid Rashid,Muhammad Khurram Khan, "Attack Containment in Mobile Ad-hoc Network Through Fair Distribution of Processing Resources", Accepted for Publication, Telecommunication Systems, Springer-Verlag, Dec. 2010 [ISI SCI-E]
  237. Xiaomin Wang, Wei Guo, Wenfang Zhang, Muhammad Khurram Khan, Khaled Alghathbar, "Cryptanalysis and Improvement on a Parallel Keyed Hash Function based on Chaotic Neural Network", In Press, Telecommunication Systems, Springer-Verlag, October 2010. [ISI SCI-E]
  238. Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Eun-suk Cho, "Broadcast Authentication for Wireless Sensor Network using Nested Hashing and Chinese Remainder Theorem", Journal of Sensors, vol. 10, issue 9, pp. 8683-8695, September 2010. [ISI SCI-E]
  239. Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee, "Chaos-based Secure Satellite Imagery Cryptosystem", Journal of Computer and Mathematics with Applications (CMA), Elsevier Science, vol. 60, number 2, pp. 326-337, July 2010. [ISI SCI-E]
  240. M. Nauman, T. Ali, M. Alam, Muhammad Khurram Khan, Khaled Alghathbar, "Information Flow Analysis of UCON", International Journal of Physical Sciences, vol. 5, number 6, pp. 865-875, June 2010. [ISI SCI-E]
  241. Muhammad Khurram Khan, Ling Xie, Jiashu Zhang, "Chaos and NDFT-based Concealing of Fingerprint-biometric Data into Audio Signals for Trustworthy Person Authentication", Digital Signal Processing (DSP), Elsevier Science, volume 20, issue 1, pp. 179-190, January 2010. [ISI SCI-E]
  242. Muhammad Khurram Khan, Khaled Alghathbar, "Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'", Journal of Sensors, Vol. 10, Issue 3, pp. 2450-2459, March 2010. [ISI SCI-E]
  243. Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, Muhammad Khurram Khan, Kevin Octavius Sentosa, "Performance Evaluation of Score Level Fusion in Multimodal Biometric Systems", Pattern Recognition, Elsevier Science, vol. 43, issue 5, pp. 1789-1800, May 2010. [ISI SCI-E]
  244. Mohammed S. Khalil, D. Muhammad, Muhammad Khurram Khan, Qais AL-Nuzaili, "Fingerprint Verification using Statistical Descriptors", Digital Signal Processing (DSP), Elsevier Science, vol. 20, issue 4, pp. 1264-1273, July 2010. [ISI SCI-E]
  245. Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Bin Abdullah, Mohammad Yazid Bin Idris, "Intrinsic Authentication of Multimedia Objects using Biometric Data Manipulation", In Press, International Arab Journal of Information Technology (IAJIT), May 2010. [ISI SCI-E]
  246. Bilal Khan, Muhammad Khurram Khan, Khaled S. Alghathbar, "Biometrics and Identity Management for Homeland Security Applications in Saudi Arabia", AJBM, vol. 4, no. 15, pp. 3296-3306, Nov. 2010. [ISI SSCI]
  247. Mohammed S. Khalil, Dzulkifli Muhammad, Muhammad Khurram Khan, Khaled Alghathbar, "Singular Points Detection using Fingerprint Orientation Field Reliability", International Journal of Physical Sciences, vol. 5, issue 4, pp. 352-357, April 2010. [ISI SCI-E]
  248. Muhammad Khurram Khan, "Fingerprint Biometric-based Self and Deniable Authentication Schemes for the Electronic World", IETE Technical Review, vol. 26, issue 3, pp. 191-195, May-June, 2009. [ISI SCI-E]
  249. Muhammad Khurram Khan, Jiashu Zhang, "Multimodal Face and Fingerprint Biometrics Authentication on Space-Limited Tokens", Neurocomputing, Elsevier Science, vol. 71, issues 13-15, pp. 3026-3031, August 2008. [ISI SCI-E]
  250. Muhammad Khurram Khan, Jiashu Zhang, Xiaomin Wang, "Chaotic Hash-based Fingerprint Biometric Remote User Authentication Scheme on Mobile Devices", Chaos, Solitons, and Fractals, Elsevier Science, UK, vol. 35, issue 3, pp. 519-524, February 2008. [ISI SCI-E]
  251. Muhammad Khurram Khan, Jiashu Zhang, Lei Tian, "Chaotic Secure Content-based Hidden Transmission of Biometric Templates", Chaos, Solitons and Fractals, Elsevier Science, UK, vol. 32, no. 5, pp. 1749-1759, June 2007. [ISI SCI-E]
  252. Muhammad Khurram Khan, Jiashu Zhang, "Improving the Security of 'A Flexible Biometrics Remote User Authentication Scheme'", Computer Standards and Interfaces (CSI), Elsevier Science, UK, vol. 29, issue 1, pp. 84-87, January 2007. [ISI SCI-E]
  253. Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhammad Khurram Khan, "Cryptanalysis and Improvement on Two Efficient Remote User Authentication Schemes Using Smart Cards", Computer Standards and Interfaces (CSI), Elsevier Science UK, vol. 29, issue 5, pp. 507-512, July 2007. [ISI SCI-E]
  254. Muhammad Khurram Khan, Jiashu Zhang, "Pointing a Finger towards Standardized and Automated Biometrics", IEEE Multimedia, vol. 13, issue 4, pp. 73-75, October, 2006. [ISI SCI-E]
  255. Muhammad Khurram Khan, Jiashu Zhang, "Tamper Proof Identity Verification for Intelligent Transportation Systems", IEEE Pervasive Computing, vol. 5, no. 4, pp. 67, 2006. [ISI SCI-E]
  256. Muhammad Babar Khan, Muhammad Khurram Khan, Jiashu Zhang, Dianye Zhang, "A New Multimodal Biometric Security System for Intelligent Transportation Systems (ITS)", GESTS International Transactions on Computer Science and Engineering, vol. 35, no.1, 2006.
  257. Muhammad Khurram Khan, Jiashu Zhang, "Cryptanalysis and Comments on a Dynamic Id-based Authentication Scheme", International Journal of Computer Science and Network Security, vol. 5, no. 11, Nov. 2005.
  258. Jia Dong Li, Muhammad Khurram Khan, Zhang Jiashu, "New Iris Localization Method Based on Chaos Genetic Algorithms", Journal of Southwest Jiaotong University, vol. 13, no.1, pp. 35-38, May 2005.
  259. Muhammad Khurram Khan, Zhang Jiashu, "Enhancing the Security of Biometric Templates for Trust Worthy Person Authentication", International Transaction on Computer Science & Engineering, vol. 6, no.1, pp. 166-176, May 2005. [Invited Paper].

  260. Conference Publications


  261. W.Z. Khan, M.Y Aalsalem, Muhammad Khurram Khan, "Five Acts of Consumer Behavior: A Potential Future Threat to Internet of Things Security and Privacy", Accepted for Publication at 36th IEEE International Conference on Consumer Electronics (ICCE'18), Jan. 2018, Las Vegas, USA
  262. Muhammad Khurram Khan, Z. Siddiqui, O. Tayan, "A Secure Framework for Digital Quran Certification", 35th IEEE International Conference on Consumer Electronics (ICCE'17), Jan. 2017, Las Vegas, USA
  263. M. Alizadeh, M.H Tadayony, K. Sakuraiz, S. Baharun, H. Anada, M. Zamani, A. Zeki, S.A Chaudhry, Muhammad Khurram Khan, "Comments and Improvements of " HOTA: Handover Optimized Ticket-Based Authentication in Network-Based Mobility Management", 20th IEEE International Conference on Innovations in Clouds, Internet and Networks (ICIN'17), 7-9 March 2017, Paris, France
  264. W.Z Khan, M. Alsalem, S. Sohrab, M. Atiquzzaman, Muhammad Khurram Khan, "A Reliable Internet of Things Architecture for Oil and Gas Industry", 19th IEEE International Conference on Advanced Communications Technology (ICACT'17), 19-22 Feb. 2017, Phoenix Park, PyeongChang, Korea
  265. Y. Cao, X.Y. Liu, L. Kong, M.Y Wu, Muhammad Khurram Khan, "EHR: Routing Protocol for Energy Harvesting Wireless Sensor Networks", 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS'16), 13-16 Dec. 2016, Wuhan, China
  266. W.Z Khan, M.Y Aalsalem, Muhammad Khurram Khan, Q. Arshad, "Enabling Consumer Trust upon Acceptance of IoT Technologies through Security and Privacy Model", 11th International Conference on Future Information Technology (FutureTech'16), April 2016, Beijing, China
  267. A. Aburumman, W.J Seo, R. Islam, Muhammad Khurram Khan, K. K.R. Choo, "A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering", SecureComm 2015, LNICST 164, pp. 1-16, 2015, USA
  268. R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan, "An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insecure Networks", International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2015), June 8-9, 2015, London, UK
  269. F. Kurniawan, M.S Khalil, Muhammad Khurram Khan, H. Malik, "Dual-Microphone Forensics of Identical Model Based on Signal Analysis", ICIST 2015, Turkey, March 2015
  270. F. Kurniawan, M.S Khalil, Muhammad Khurram Khan, Y. Alginahi, "DWT+LSB-based Fragile Watermarking Method For Quran Images", IEEE International Symposium on Biometrics & Security Technologies (ISBAST 2014), 26-27 August 2014, Kuala Lumpur, Malaysia
  271. Muhammad Khurram , S. Kumari, X. Wang, R. Kumar, "Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme", 12th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2014), August 24-27, 2014, Dalian, China
  272. S. Kumari, Muhammad Khurram Khan, X. Li, R. Kumar, "Notes on A Password-Based Remote User Authentication Scheme without Smart Card", IEEE International Symposium on Biometrics & Security Technologies (ISBAST 2014), 26-27 August 2014, Kuala Lumpur, Malaysia
  273. X. Li, Muhammad Khurram Khan, S. Kumari, "Cryptanalysis of a Robust Smart Card Authentication Scheme for Multi-server Architecture", IEEE International Symposium on Biometrics & Security Technologies (ISBAST 2014), 26-27 August 2014, Kuala Lumpur, Malaysia
  274. A. Derhab, A. Bouras, F.B. Muhaya, Muhammad Khurram Khan, Y. Xiang, "Spam Trapping System: Novel Security Framework to Fight against Spam Botnets", 21st IEEE International Conference on Telecommunications, 5-7 May 2014, Lisbon, Portugal
  275. L. Leng, G. Liu, M. Li, Muhammad Khurram Khan, A. Al-Khouri, "Logical Conjunction of Triple-perpendicular-directional Translation Residual for Contactless Palmprint Preprocessing", 11th IEEE International Conference on Information Technology: New Generations, 7-9 April 2014, Las Vegas, USA
  276. M.H Eldefrawy, Muhammad Khurram Khan, H. Elkamchouchi, "The Use of Two Authentication Factors to Enhancethe Security of Mass Storage Devices", 11th IEEE International Conference on Information Technology: New Generations, 7-9 April 2014, Las Vegas, USA
  277. F. Kurniawan, M.S Khalil, Muhammad Khurram Khan, Y.M Alginahi, "Exploiting Digital Watermarking to Preserve Integrityof the Digital Holy Quran Images", International Conference on Advances in Information Technology for the Holy Quran and Its Sciences, Dec. 20-25, 2013, KSA
  278. Muhammad Khurram Khan, D. He, "Cryptanalysis of 'An Improved Remote Password Authentication Scheme with Smartcard', 12th IEEE International Conference Trustcom, July 2013, Australia
  279. Muhammad Khurram Khan, S. Kumari, MK Gupta, "Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device", 6th International Conference on Brain Inspired Cognitive Systems (BICS'13), June 2013, Beijing, China
  280. X. Li, J. Niu, Muhammad Khurram Khan, J. Liao, "Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards", IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), 2-5 July 2013, Chengdu, China.
  281. S. Kumari, Muhammad Khurram Khan, F.B Muhaya, R. Kumar, "Cryptanalysis of 'A Robust Smart-Card-Based Remote User Password Authentication Scheme'", IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), 2-5 July 2013, Chengdu, China.
  282. X. Li, J. Niu, Muhammad Khurram Khan, J. Liao, "Robust biometric based three-factor remote user authentication scheme with key agreement", IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), 2-5 July 2013, Chengdu, China.
  283. F. Kurniawan, M.S. Khalil, Muhammad Khurram Khan, "Core-point Detection on Camera-base Fingerprint Image", IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), 2-5 July 2013, Chengdu, China
  284. L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, "Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code", IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), 2-5 July 2013, Chengdu, China.
  285. F. Kurniawan, Mohammed S. Khalil, Muhammad Khurram Khan, Y.M Alginahi, "Authentication and Tamper Detection of Digital Holy Quran Images", IEEE International Symposium on Biometrics & Security Technologies (IEEE ISBAST'13), July, Chengdu, China
  286. M. H. Eldefrawy, Muhammad Khurram Khan, "Detecting Counterfeit-Money using RFID-enabled Mobile Devices", 7th International Conference for Internet Technology and Secured Transactions (ICITST'12), London, UK, Dec. 2012
  287. Muhammad Khurram Khan, S. Kumari, M. Gupta , "Further Cryptanalysis of 'A Remote Authentication Scheme Using Mobile Device'", 8th International Conference on Information Assurance & Security (IAS'12), Brazil, Nov. 2012.
  288. Muhammad Khurram Khan, H.D Biao, "Weaknesses of 'Security Analysis and Enhancement for Three-party Password-based Authenticated Key Exchange Protocol'", 6th International Conference on Network and Systems Security (NSS'12), LNCS 7646, Springer-Verlag, pp. 530-536, Nov. 2012.
  289. Lu Leng, Shuai Zhang, Xue Bi, Muhammad Khurram Khan, "Two-Dimensional Cancelable Biometric Scheme", ICWAPR'12, China, July 2012.
  290. Mohammed Saeed Alkatheiri, M.H. Eldefrawy, Muhammad Khurram Khan, "BAN Logic Based Security Proof for Mobile OTP Authentication Scheme", 7th International Conference on Future Information Technology (FutureTech'12), Vancouver, Canada, June 2012
  291. S. Kumari, M. Gupta, Muhammad Khurram Khan, "Cryptanalysis of 'An Improved Timestamp-based Remote User Authentication Scheme", IEEE QR2MSE'12, China, June 2012.
  292. M. H. Eldefrawy, K. Alghathbar, Muhammad Khurram Khan, "Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes", International Symposium on Biometrics and Security Technologies (ISBAST'12), March 2012, Taipei, Taiwan.
  293. Muhammad Khurram Khan, Pei-Wei Tsai, J.S Pan, B.Y Liao, "Biometric Driven Initiative System for Passive Continuous Authentication", 7th IEEE International conference on Information Assurance and Security (IAS), Malaysia, Dec. 2011.
  294. Fahad B. M, Muhammad Khurram Khan, Y. Xiang, "Polymorphic Malware Detection Using Hierarchical Hidden Markov Model", 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'11), 24-26 October 2011, Melbourne, Australia.
  295. Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, "Information Security Awareness Campaign: An Alternate Approach", 5th International conference on Information Security and Assurance (ISA'11), Czech Republic, May 2011.
  296. M. Zubair Rafique, Nasser Alrayes, Muhammad Khurram Khan, "Application of Evolutionary Algorithms in Detecting SMS Spam at Access Layer", 16th Genetic and Evolutionary Computing Conference, 12-16 July, 2011, Dublin, Ireland. (Nominated for the best paper award)
  297. Lu Leng, Jiashu Zhang, Gao Chen, Muhammad Khurram Khan, Khaled Alghathbar, "Two-directional Two-dimensional Random Projection and Its Variations for Face and Palmprint Recognition", 11th International Conference on Computational Science and Its Applications (ICCSA'11), LNCS, vol. 6786, pp. 458-470, 20-23 June 2011, Spain.
  298. M. Zubair Rafique, Muddassar Farooq, Muhammad Khurram Khan and Khaled Alghathbar, "A Framework for Detecting Malformed SMS Attack", IEEE/FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011), 28-30 June, 2011, Greece.
  299. L. Leng, J. Zang, G. Chen, Muhammad Khurram Khan, P. Bai, "Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion", 8th IEEE/FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011), 28-30 June, 2011, Greece.
  300. Mohammed S. Khalil, Muhammad Khurram Khan, "Co-occurrence Matrix Features for Fingerprint Verification", IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), Jun 24-26,2011, Xiamen, China.
  301. M. Zubair Rafique, Muddassar Farooq, Muhammad Khurram Khan and Khaled Alghathbar, Embedding High Capacity Covert Channels in Short Message Service (SMS), IEEE/FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011), 28-30 June, 2011, Greece.
  302. Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, "OTP-Based Two-Factor Authentication Using Mobile Phones", 8th IEEE International Conference on Information Technology: New Generations (ITNG'11), April 11-13, 2011, Las Vegas, USA.
  303. M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar, "Securing IP-Multimedia Subsystem (IMS) Against Anomalous Message Exploits by using Machine Learning Algorithms", 8th IEEE International Conference on Information Technology: New Generations (ITNG'11), April 11-13, 2011, Las Vegas, USA.
  304. Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, Hassan Elkamchouchi, "Secure Instant Messaging Protocol for Centralized Communication Group", 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), February 2011, Paris, France.
  305. Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, "Qualified Analysis b/w ESB(s) using Analytical Hierarchy Process (AHP) Method", IEEE International Conference on Intelligent Systems, Modelling and Simulation, pp. 100-104, January 2011, Malaysia.
  306. L. Leng, J. Zhang, J. Xu, Muhammad Khurram Khan, Khaled Alghathbar, "Dynamic Weighted discrimination Power Analysis in DCT Domain for Face and Palmprint Recognition", IEEE International Conference on ICT Convergence (ICTC'10), pp. 467-471, November, 2010, South Korea
  307. Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, "Contactless Biometrics in Wireless Sensor Network: A Survey", 3rd International Conference on Security Technologies (SecTech'10), CCIS, Springer-Verlag, vol. 122, pp. 236-243, Dec. 2010.
  308. Muhammad Imran Razzak, Muhammad Khurram Khan, KhaledAlghathabar, "Bio-Inspired Hybrid Face Recognition System for Small Sample Size and Large Datset", 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), October 2010, Darmstadt, Germany.
  309. Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, "One-Time Password System with Infinite Nested Hash Chains, Accepted at 3rd International Conference on Security Technologies (SecTech'10), December 2010, South Korea.
  310. Muhammad Bilal khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah AlKelabi, Abdulaziz AlAjaji, "Using Arabic CAPTCHA for Cyber Security", 3rd International Conference on Security Technologies (SecTech'10), CCIS, Springer-Verlag, vol. 122, pp. 8-17, Dec 2010, South Korea
  311. Leng Lu, Zhang, J.S, Muhammad Khurram Khan, Bi, X, Ji, M, "Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection", 25th International Conference on Image and Vision Computing (IVCNZ), Nov. 2010, New Zealand.
  312. Muhammad Khurram Khan, Khaled Alghathbar, "Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'", 4th International Conference on Information Security and Assurance (ISA'10), Lecture Notes in Computer Science, vol. 6059, pp. 55-60, June 2010, (Acceptance rate 10%. Only 30 papers were selected out of 300 submissions), Japan.
  313. Bilal Khan, Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, "Security Analysis of Firewall Rule Sets in Computer Networks", 4th International Conference on Emerging Security Information, Systems and Technologies (Securware'10), Italy
  314. Mohammed S. Khalil, Dzulkifli Muhammad, Muhammad Khurram Khan, Khaled Alghathbar, "Fingerprint Verification Based on Statistical Analysis", 5th International Conference on Future Information Technology (FutureTech'10), 21-23 May 2010, Korea
  315. Muhammad Imran, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf, "Face Recognition using Layered Linear Discriminant Analysis and Small Subspace", 10th IEEE International Conference on Computer & Information Technology (CIT'10), pp. 1407-1412, June/July 2010, Bradford, UK.
  316. M. H Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, "A Key Agreement Algorithm with Rekeying for Wireless Sensor Networks using Public Key Cryptography", 4th IEEE International Conference on Anti -counterfeiting, Security, and Identification in Communication (ASID'10), China, June 2010.
  317. Muhammad Khurram Khan, "Enhancing the Security of a 'More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme'", IEEE 3rd International Conference on Network and System Security (NSS), pp. 420-424, Oct. 2009, Australia.
  318. Mohammed S. Khalil, Dzulkifli Muhammad, Muhammad Khurram Khan, Qais AL-Nuzaili "Fingerprint Verification using Fingerprint Texture", 9th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) , UAE, Dec. 14-17, 2009.
  319. Hong Zhao, Hong-Xia Wang, Muhammad Khurram Khan, "Difference Histogram Analysis of Several Reversible Data Hiding Schemes", IEEE PrimeAsia'09, Shanghai, China, 2009.
  320. Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan, "Modified AES using Chaotic Key Generator for Satellite Imagery", ICIC 2009, Lecture Notes in Computer Science (LNCS), Springer-Verlag, pp. 1014-1024, vol. 5754, 2009.
  321. Maqsood Mahmud, Hanif Ullah, Muhammad Khurram Khan, Khaled Alghathbar "Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding)", BSBT 2009, CCIS, Springer-Verlag, pp. 97-107, vol. 57, 2009.
  322. A. Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan, "Bio-Chaotic Stream Cipher-Based Iris Image Encryption", TrustCom'09, 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-09), Canada, 2009.
  323. Muhammad Usama Khanzada, Muhammad Khurram Khan, "Satellite Imagery Security Application (SISA)", 12th IEEE International Multitopic Conference INMIC, pp. 232-238, 23-24 December 2008.
  324. Muhammad Khurram Khan, "An Efficient and Secure Remote Mutual Authentication Scheme with Smart Cards", IEEE International Symposium on Biometrics & Security Technologies (ISBAST), 23-24 April, 2008.
  325. Muhammad Usama Khanzada, Muhammad Khurram Khan, "Classical and Chaotic Encryption Techniques for the Security of Satellite Images", IEEE International Symposium on Biometrics & Security Technologies (ISBAST), 23-24 April, 2008.
  326. Muhammad Khurram Khan, "Cryptanalysis and Security Enhancement of Two Password Authentication Schemes with Smart Cards", 11th IEEE International Conference on INMIC'07, December 2007.
  327. Muhammad Khurram Khan, Jiashu Zhang, "An Intelligent Fingerprint-Biometric Image Scrambling Scheme", ICIC 2007, Lecture Notes in Computer Science (LNCS), Springer-Verlag Germany, pp. 1141-1151, vol. 4682, August 2007.
  328. Muhammad Khurram Khan, Ling Xie, Jiashu Zhang, "Robust Hiding of Fingerprint Biometric Data into Audio Signals", ICB 2007, Lecture Notes in Computer Science (LNCS), Springer-Verlag Germany, pp. 702-712, vol. 4642, August, 2007.
  329. Muhammad Khurram Khan, "Further Cryptanalysis of 'A User Friendly Remote User Authentication Scheme with Smart Cards'", IEEE Conference Proceedings on ICIET'07, July 2007.
  330. Muhammad Khurram Khan, Jiashu Zhang, "Implementing Templates Security in Remote Biometric Authentication Systems", IEEE Conf. Proceedings on CIS'06, China, pp. 1397-1400, Nov. 2006.
  331. Muhammad Khurram Khan, Jiashu Zhang, "Investigation on Pseudorandom Properties of Chaotic Stream Ciphers", IEEE Conf. Proceedings on ICEIS'06, pp. 289-293, April 2006.
  332. Muhammad Babar Khan, Muhammad Khurram Khan, Jiashu Zhang, Zhang Dianye, "Enhancing the Security of Intelligent Transportation Systems (ITS) using Iris/Finger-based Multimodal Biometrics", IEEE Conf. Proceedings on ICEIS'06, pp. 79-84, April 2006.
  333. Xiaomin Wang, Jiashu Zhang, Wenfang Zhang, Muhammad Khurram Khan, "Security Improvement on the Timestamp-based Password Authentication Scheme Using Smart Cards", IEEE Conf. Proceedings on ICEIS'06, pp. 140-142, April 2006.
  334. Muhammad Khurram Khan, Jiashu Zhang, "An Efficient and Practical Fingerprint-based Remote User Authentication Scheme with Smart Cards", ISPEC'06, Lecture Notes in Computer Science, Springer-Verlag Germany, pp. 260-268, vol. 3903, April 2006. [ISI SCI-E]
  335. Muhammad Khurram Khan, Jiashu Zhang, "Enhancing the Transmission Security of Content-based `Hidden Biometric Data", ISNN'06, Lecture Notes in Computer Science (LNCS), Springer-Verlag, pp. 214-223, vol. 3973, May 2006. [Invited paper] [ISI SCI-E]
  336. Muhammad Khurram Khan, Jiashu Zhang, "Strong Authentication of Remote Users over Insecure Networks by Using Fingerprint-biometric and Smart Cards", Biometric Technology for Human Identification III, SPIE Defense and Security Symposium, Proc. SPIE Vol. 6202, April 2006, Florida, USA.
  337. Muhammad Khurram Khan, Jiashu Zhang, "Security Analysis of 'An Improved Low Computation Cost User Authentication Scheme for Mobile Communication", IEEE INMIC'05, 2005.
  338. Muhammad Babar Khan, Muhammad Khurram Khan, Jiashu Zhang, Dianye Zhang, "Implementing Biometric Security in Intelligent Transportation Systems", IEEE INMIC'05, 2005.
  339. Muhammad Khurram Khan, Zhang Jiashu, "Securing Biometric Templates for Reliable Identity Authentication", ICIC'05, Lecture Notes in Computer Science (LNCS), part II, no. 3645, pp. 723-732, Springer-Verlag Germany, August 2005. [Invited paper] [ISI SCI-E].
  340. Muhammad Khurram Khan, Zhang Jiashu, Lei Tian, "Protecting Biometric Data for Personal Identification", Sinobiometrics'04, Lecture Notes in Computer Science (LNCS), Springer-Verlag Germany, pp. 629-638, vol. 3383, Dec. 2004. [ISI SCI-E].
  341. Muhammad Khurram Khan, Zhang Jiashu, "Biometrics: An Emerging Technology for Security", Second International Workshop on Frontiers of Information Technology, Dec. 2004.
  342. Muhammad Khurram Khan, Zhang Jiashu, Shi-Jinn Horng, "An Effective Iris Recognition System for Identification of Humans", IEEE INMIC'04, pp.114-117, Dec. 2004.
  343. Muhammad Khurram Khan, "Multimodal Biometrics: A More Secure Way against Intruders", First International Workshop on Frontiers of Information Technology, Dec. 2003.

Services

Prof. Khurram is very active in professional services and scholarly activities. He is on the editorial board of several prestigious journals indexed by Thomson Reuters. He is one of the organising chairs of dozens of international conferences. In addition, he has very active participation on the technical program committees of dozens of international conferences. Furthermore, he is an active reviewer of tens of international journals.
img01

Professional Services

Scientific & Scholarly Activities

Professional Services
img01

Administrative Services

Institutional Leadership

Administrative Services
img01

Prospective Students & Collaboration

My Research Network

Prospective Students

Professional Services

Prof. Khurram believes in professionalism and he is eager to lead and participate in professional services and scholarly activities for the advancement of scientific and technological research.
img01

Editorial Board

My Editorial Role

Professional Services
img01

Guest Editor

My Special Issues

Professional Services
img01

Conference Chairs

My Role as Conference Organizer

Professional Services
img01

Program Committee Member

My Role in Conference Programs

Professional Services
img01

Journals Reviewer

My Role as a Reviewer

Professional Services

Editorial Board


  • Editor-in-Chief, Telecommunication Systems, Springer-Verlag [SCI-E, Impact Factor 1.542]
  • Associate Editor, IEEE Communications Surveys & Tutorials [SCI-E, Impact Factor 20.23]
  • Associate Editor, IEEE Communications Magazine [SCI-E, Impact Factor 9.27]
  • Associate Editor, IEEE Internet of Things Journal (IEEE IoT-J) [SCI-E, Impact Factor 5.863]
  • Editor, Journal of Network and Computer Applications (JNCA), Elsevier Science (Since July 2010) [SCI-E, Impact Factor 3.991]
  • Associate Editor, IEEE Transactions on Consumer Electronics [SCI-E, Impact Factor 1.802]
  • Associate Editor, IEEE Access Journal (Since May 2013) [SCI-E, Impact Factor 3.557]
  • Associate Editor, IEEE Consumer Electronics Magazine [SCI-E, Impact Factor 1.434]
  • Editorial Advisory Board, Journal of Cyber Security Technology, Taylor & Francis (Since April 2018)
  • Associate Editor, Journal of Medical Systems, Springer-Verlag (Since March 2014) [SCI-E Impact Factor 2.456]
  • Editor, Scientific World Journal (Sept. 2013-Aug. 2016) [SCI-E Impact Factor 1.219]
  • Editor, PLOS ONE Journal, USA (Since April 2013) [SCI-E Impact Factor 2.766]
  • Associate Editor, Electronic Commerce Research Journal, Springer-Verlag (Since Jan. 2012) [SSCI, Impact Factor 1.489]
  • Associate Editor, Security and Communication Networks, (Since May 2010) [SCI-E, Impact Factor 1.067]
  • Associate Editor, IET Wireless Sensor Systems, UK (Since March 2015)
  • Senior Editor, Human-Centric Computing and Information Sciences, Springer (Since Jan. 2018) [SCI-E Impact Factor 1.967]
  • Senior Editor, Journal of Information Processing Systems, Korea Information Processing Society (Since Aug. 2016) [ISI ESCI]
  • Editor, Journal of Information Security and Cybercrimes Research, Naif Arab University of Security Sciences, Saudi Arabia (Since 2017)
  • Associate Editor, Telecommunication Systems, Springer-Verlag (From 27 Jan. 2011 till April 2014) [ISI SCI-E]
  • Associate Editor, Computers and Electrical Engineering, Elsevier Science (Jan. 2011-July 2014) [ISI SCI-E]
  • Guest Handling Editor, Journal of Computing and Informatics, (Since Sept. 2012) [SCI-E, Impact Factor 0.524]
  • Editorial Board, International Journal of Biometrics (IJBM), Inderscience Publishers (Since June 2010)
  • Editorial Board, Journal of Chaos, Hindawi Publishing Corporation (Jan. 2013-Aug. 2016)
  • Associate Editor, Journal of Information Hiding and Multimedia Signal Processing (JIHMSP)
  • Editor, International Journal of Chaotic Computing, Infonomics Society UK (Since 28 Jan. 2011)
  • Consulting Editor, Journal of Physical & Information Sciences (JPIS) (Since October 2010)
  • Editorial Advisory Board, Journal of Independent Studies and Research-Computing (JISR)

Guest Editor


  • Guest Editor of Special Issue on Artificial Intelligence-based Information Security, Computers & Electrical Engineering, Elsevier, 2019 [SCI-E]
  • Guest Editor of Special Issue on "Recent Advances in Information Security", Computer Science and Information Systems, 2018 [SCI-E]
  • Guest Editor of Special Issue on Recent Advances in Industrial Internet of Things, Journal of Advances in Mechanical Engineering, Sage Publications, 2018 [SCI-E]
  • Guest Editor of Special Issue on Cyber Security Threats and Defense Advances, IEEE Transactions on Emerging Topics in Computing, 2017-2018 [SCI-E]
  • Guest Editor of Special Issue on "Recent Advances in Trust and Security in Wireless Sensor Networks", International Journal of Distributed Sensor Networks, May 2017 [SCI-E]
  • Guest Editor of Special Issue on "Sustainable Incentive Mechanisms for Mobile Crowdsensing", IEEE Communications Magazine, March 2016 [SCI-E]
  • Guest Editor of "Science, Technology and Innovation Reforms for Sustainable Development of the GCC Countries", Sustainability, MDPI, March 2016 [SCI-E]
  • Guest Editor of Special Issue on "Special Issue on Cloudified 5G Networks, Industrial Systems and Applications", ACM/Springer Mobile Networks & Applications (MONET), Springer, 2016 [SCI-E]
  • Guest Editor for Special Issue on "Advanced Communication Models and Services for Smart World", Modeling and Simulation in Engineering, 2015
  • Guest Editor of Yearly Special Issue on 'Trust, Security & Privacy in Distributed Wireless Sensor Networks', International Journal of Distributed Wireless Sensor Networks, Hindawi, 2014 [SCIE]
  • Guest Editor of Special Issue on Recent Advances in Information Security', The Scientific World Journal, Hindawi, 2014 [SCIE]
  • Guest Editor of Special Issue on 'Security Aspects in Pervasive & Ubiquitous Computing', International Journal of Adhoc & Ubiquitous Computing, Inderscience, 2014 [SCIE]
  • Guest Editor of Special Issue on 'Trust, Security & Privacy in Distributed Wireless Sensor Networks', International Journal of Distributed Wireless Sensor Networks, Hindawi, 2013 [SCIE]
  • Guest Editor of Special Issue on 'Research, Innovation and Entrepreneurship Reforms in Gulf Cooperation Council Countries', Innovation Management Policy & Practice (IMPP), Australia, 2014 [SSCI]
  • Guest Editor of Special issue on 'Chaotic Cryptography and its Applications in Telecommunication Systems', Telecommunication Systems (Springer-Verlag Germany), vol. 52, no. 2, 2013 [SCI-E]
  • Guest Editor of Special issue on 'High Performance Biometrics Recognition Algorithms and Systems, Future Generation Computer Systems, Elsevier Science, Vol. 28, Issue 1, Jan. 2012 [SCI-E]
  • Guest Editor of Special issue on 'Data Hiding for Multimedia Security' in the Journal of Multimedia Tools and Applications (Springer-Verlag Germany), Vol. 52, Issue 2-3, April 2011 [SCI-E]
  • Guest Editor of Special issue on 'Biometrics Systems and Applications' in the Journal of Telecommunication Systems (Springer-Verlag Germany), Vol 47, Issue 3-4, Aug. 2011 [ISI SCI-E]
  • Guest Editor of Special issue on 'Recent Advances in Biometrics Identification' in the Journal of Network and Computer Applications (Elsevier Science), Vol. 33, number 3, May 2010 [ISI SCI-E]
  • Guest Editor of Special issue on 'Information Assurance and Security Engineering' in the IETE Technical Review, Vol 27, Issue 23, 2010 [ISI SCI-E]
  • Founding Editor of 'Bahria University Journal of Information & Communication Technology' (BUJICT) (From 2008 un till 2010)

Conference Chairs


  • Program Vice Chair for the 13th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2018), 17-19 Dec., 2018, Okinawa, Japan
  • Publicity Co-Chair for the 12th International Conference on Future Generation Communication and Networking (FGCN’18), 20-22 December, 2018, South Korea [Link]
  • International Advisory Board Member for the 6th IEEE International Conference on Computer, Control, Informatics and its Applications (IC3INA’18), 1-2 November 2018, Tangerang, Indonesia [Link]
  • Publicity Co-Chair for the IEEE Middle East & North Africa Communications Conference (MENACOMM’18), April 18-20, 2018, Jounieh, Lebanon [Link]
  • Program Chair for the World Congress on Information Technology Applications and Services (World IT Congress 2018), Feb. 20-22, 2018, Jeju, Korea
  • Publicity Chair for the International Conference on Ubiquitous Business and Wireless Communication & Networks 2018 (UBWCN 2018), 20-21 Jan 2018, Bali, Indonesia
  • International Advisor for the Global Conference on Information Technology, Computing, and Applications (Global IT 2018), Jan. 15-17, 2018, Manila, Philippines
  • Program Co-Chair for the 18th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’17), Taipei, Taiwan, 18-20 Dec. 2017 [Link]
  • Program Chair for the Third IEEE International Workshop on Trust and Security in Wireless Sensor Networks, 1-4 August 2017, Sydney, Australia [Link]
  • International Advisor for the IEEE International Conference on Consumer Electronics-Taiwan, 12-14 June 2017, Taipei, Taiwan [Link]
  • Founder and Organizer of the Cybersecurity Capacity and Capability Building Workshop, 15 March 2017, Riyadh, Saudi Arabia
  • Session Chair (Sensors & MEMS) at the 35th IEEE International Conference on Consumer Electronics (ICCE'17), Las Vegas, USA, 8-10 Jan. 2017 [Link]
  • Publication Chair for the 10th International Conference on Provable Security (ProvSec'16), Nanjing, China, 10-12 November 2016 [Link]
  • The General Co-Chair for the 11th International Conference on Green, Pervasive and Cloud Computing (GPC-2016) May 6-8, 2016, Xi'an, China [Link]
  • The General Co-Chair for the 11th International Conference on Future Information Technology (FutureTech2016), April 20-22, 2016, Beijing, China [Link]
  • Program Co-Chair, IEEE International Workshop on Trust and Security in Wireless Sensor Networks in conjunction with IEEE TrustCom-15, August 20-22, 2015, Helsinki, Finland [Link]
  • General Co-Chair for the IEEE International Symposium on Biometrics & Security Technologies (ISBAST'14), Kuala Lumpur, Malaysia, August 2014
  • Publicity Chair for the 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, October 15-17, 2014 [Link]
  • Workshops Co-Chair for the 12th IEEE International Conference on Pervasive Intelligence and Computing (PICom'14), August 24-27, 2014, Dalian, China [Link]
  • Program Chair for the 9th International Conference on Future Information Technology, Zhangjiajie, China, May 29-31, 2014 [Link]
  • Program Co-Chair for the 6th FTRA International Symposium on Advances in Computing, Communications, Security, and Applications (ACSA'14), South Korea, April 2014
  • Publicity Co-Chair for the International Workshop on Advanced Multimedia Computing (AMC'14), April 23-25, 2014, Incheon, Korea [Link]
  • Invited Sessions Chair for the 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'13), Beijing, China, Oct 16-18, 2013 [Link]
  • Program Co-Chair for the 3rd International Conference on Frontier Computing - Theory, Technologies and Applications (FC 2013), Gwangju, South Korea, Sept. 4-6, 2013 [Link]
  • Publication Chair for the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), Melbourne, Australia, 16-18 July, 2013 [Link]
  • Workshop Co-Chair for the 11th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA'13), Australia, 16-18 July, 2013 [Link]
  • Steering Committee Chair for the IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), Chengdu, China, 2-5 July 2013 [Link]
  • Program Chair for the 7th International Conference on Information Security and Assurance, Cebu, Philippines, April 26-28, 2013 [Link]
  • Publicity Co-Chair for the 7th International Conference on Frontier of Computer Science and Technology (FCST-12), Suzhou, China, 21-23 November 2012 [Link]
  • Publicity Co-Chair for the 12th International Conference on Algorithms and Architectures for Paralell Processing, (ICA3PP'12), Fukuoka, Japan, 4-7 September 2012 [Link]
  • Workshop Co-Chair for the 9th International Conference on Secure and Trust Computing, Data Management, and Applications (STA 2012), 23-25 August 2012, Yantai, China [Link]
  • Program Vice Chair for the 7th International Conference on Future Information Technology (FutureTech 2012), Vancouver, Canada, 26-28 June 2012 [Link]
  • Program Chair for the 6th International Conference on Information Security & Assurance (ISA'12), Shanghai, China, 28-30 April 2012 [Link]
  • Steering Committee Chair for the IEEE International Symposium on Biometrics & Security Technologies (IEEE ISBAST'12), Taipei, Taiwan, 26-29 March 2012 [Link]
  • Program Co-Chair for the 4th International Conference on Security Technology (SecTech'11), Jeju Island, South Korea, 8-10 Dec. 2011 [Link]
  • Publicity Co-Chair for the 5th International Conference on Future Generation Communication and Networking (FGCN'11), Dec. 2011 [Link]
  • Publicity Co-Chair for the 4th International Conference on Bio-Science and Bio-Technology (BSBT'11), Jeju Island, Dec. 2011 [Link]
  • Publicity Co-Chair for the 4th International Conference on Signal Processing, Image Processing and Pattern Recognition (SIP'11), South Korea, Dec. 2011 [Link]
  • Program Co-Chair for the 4th International Conference on Advanced Software Engineering & Its Applications (ASEA'11), Korea, Dec. 2011 [Link]
  • International Advisory Board for the 3rd International Conference on Advanced Science and Technology (AST'11), 27-29 September 2011 [Link]
  • General Co-Chair for the International Symposium on Embedded and Pervasive Systems (EPS 2011), Melbourne, Australia, Oct 24-26 [Link]
  • Program Co-Chair for the Second International Symposium on Mobile and Wireless Network Security (MWNS'11), Changsha, China, Nov. 2011 [Link]
  • Workshop Co-Chair for the 11th International Conference on Algorithms and Architectures for Paralell Processing, (ICA3PP'11), Melbourne, Australia, Oct. 2011 [Link]
  • Workshop Management Chair for the 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'11), Melbourne, Australia, Oct. 2011 [Link]
  • Program Co-Chair for the 3rd International Conference on Advanced Communication and Networking (ACN'11), August 2011, Czech Republic [Link]
  • Workshop Management Co-Chair for the 5th International Conference on Information Security and Assurance (ISA'11), 15-17 August 2011, Czech Republic [Link]
  • International Liaison Co-Chair for the 8th International Conference on Secure and Trust Computing, Data Management, and Applications (STA 2011), June 2011, Greece [Link]
  • Publicity Co-Chair for the 5th International Conference on Multimedia and Ubiquitous Engineering (MUE 2011), June 2011, Crete, Greece [Link]
  • Publication Chair for the International Conference on Robot, Vision and Signal Processing (RVSP), November 21-23, 2011, Taiwan [Link]
  • Workshop Co-Chair for International Conference on Ubiquitous Computing and Multimedia Applications (UCMA 2011) , 13-15 April, 2011, Daejeon, Korea [Link]
  • Program Co-Chair for the 3rd International Conference on Security Technology (SecTech'10), Jeju Island, South Korea, 13-15 Dec. 2010 [Link]
  • Publicity Co-Chair for the 3rd International Conference on Signal Processing, Image Processing and Pattern Recognition (SIP'10), Soth Korea, 13-15 Dec. 2010 [Link]
  • Publicity Co-Chair for the 4th International Conference on Future Generation Communication and Networking (FGCN'10), Dec. 2010 [Link]
  • Program Co-Chair for the 3rd International Conference on Advanced Software Engineering & Its Applications (ASEA'10), Korea, 13-15 Dec. 2010 [Link]
  • Publicity Co-Chair for the 3rd International Conference on Bio-Science and Bio-Technology (BSBT'10), Jeju Island, 13-15 Dec. 2010 [Link]
  • Publicity Co-Chair for the 4th International Conference on Network and System Security (NSS'10), Melbourne, Australia, 1-3 September 2010 [Link]
  • Publicity Co-Chair for the 4th International Conference on Multimedia & Ubiquitous Engineering (MUE'10), Cebu, Philippines, 11-13 August 2010 [Link]
  • Publicity Co-Chair for the 6th International Conference on Intelligent Computing (ICIC'10), Changsha, China, 18-21 August 2010 [Link]
  • Program Co-Chair for the 2nd International Conference on Advanced Communication and Networking (ACN'10), June 2010 [Link]
  • Workshop/Session Management Co-Chair for the 4th International Conference on Information Security and Assurance (ISA 2010), Japan, 2010 [Link]
  • International Advisory Board for the 2nd International Conference on Advanced Science and Technology (AST'10), June 2010 [Link]
  • Publicity Co-Chair for the International Conference on Ubiquitous Computing and Multimedia Applications (UCMA'10), 2010 [Link]
  • General Co-Chair for the International Workshop on 'Frontiers of Information Assurance & Security' (FIAS'09) in conjunction with 3rd IEEE International Conference on Network and System Security (NSS'09), Australia, 19-21 October, 2009 [Link]
  • Publicity Co-Chair for the International Conference on Security Technology (SecTech'09), South Korea, 10-12 Dec. 2009 [Link]
  • Publicity Co-Chair for the 5th IEEE International Conference on Intelligent Computing (ICIC'09), South Korea, 16-19 Sept. 2009 [Link]
  • Program Chair and Publication Chair for the 12th IEEE International Multi topic Conference (IEEE INMIC'08), 23-24 December, 2008
  • Program and Organizing Chair for the IEEE International Symposium on Biometrics & Security Technologies (IEEE ISBAST'08), Bahria University, Pakistan
  • Session Chair at 10th National Conference on Management, Computer, Social Sciences, and Economics, SZABIST, Karachi, 15 December, 2007 [Link]
  • Session Chair at IEEE International Conference on Intelligent Computing 2007 (ICIC'07) Qingdao, China, 21-24 August, 2007 [Link]
  • Session Chair at IEEE International Conference on Intelligent Computing 2006 (ICIC'06) Kunming, China, 16-19 August, 2006 [Link]

Program Committee Member


  • Program Committee Member for the 15th International Conference on Artificial Intelligence Applications and Innovations (AIAI'19), 24-26 May 2019, Crete, Greece [Link]
  • Program Committee Member for the 14th International Conference on Information Assurance and Security, 13-15 Dec. 2018, Porto, Portugal
  • Program Committee Member for the 17th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2018), Melbourne, Australia [Link]
  • Program Committee Member for the 18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP’18), 15-17 November 2018, Guangzhou, China [Link]
  • Program Committee Member for the 12th IEEE International Conference on Anti-Counterfeiting, Security, and Identification (ASID'18), 9-11 November, 2018, Xiamen, China [Link]
  • Program Committee Member for the First International Conference on Frontiers in Cyber Security (FCS 2018), 5-7 November, 2018, Chengdu, China [Link]
  • Program Committee Member for the 19th International Conference on Engineering Applications of Neural Networks (EANN 2018), 3-5 September 2018, Bristol, UK [Link]
  • Program Committee Member for the 18th IEEE International Conference on Computer and Information Technology (CIT'18), 30 July-03 August, 2018, Halifax, Canada [Link]
  • Program Committee Member for the EAI International Conference on on Smart Grid and Internet of Things, July 11-13, 2018, Canada [Link]
  • Program Committee Member for the 8th IEEE International Conference on Innovations in Intelligent Systems and Applications (INISTA’18), 3-5 July, 2018, Thessaloniki, Greece [Link]
  • Program Committee Member for the 20th IEEE International Conference on High Performance Computing and Communications (HPCC'18), 28-30 June 2018, Exeter, UK [Link]
  • Program Committee Member for the International Conference on Information Society and Smart Cities (ISC 2018), Oxford, United Kingdom [Link]
  • Program Committee Member for the 14th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI 2018), 25-27 May 2018, Rhodes, Greece [Link]
  • Program Committee Member of the International Workshop on Communication, Computing, and Networking in Cyber Physical Systems, IEEE International Conference on Communications (ICC’18), 20-24 May 2018, Kansas, USA [Link]
  • Program Committee Member for the 1st Workshop on Digital Forensics and Software (DFS’8) in conjunction with 5th Symposium on Data Mining Applications (SDMA’18), March 21-22, 2018, Prince Sultan University, Riyadh Saudi Arabia [Link]
  • Program Committee Member for the Global Conference on Information Technology, Computing, and Applications (Global IT 2018), January 15-17, 2018, Manila, Philippines [Link]
  • Program Committee Member for the 11th IEEE International Conference on Open Source Systems (ICOSST’17), 18-20 Dec. 2017, Lahore, Pakistan [Link]
  • Program Committee Member for the 3rd International Symposium on Security and Privacy in Social Networks and Big Data, 13-15 December 2017, Melbourne, Australia [Link]
  • Program Committee Member for the 16th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2017), December 12-15, 2017, Guangzhou, China [Link]
  • Program Committee Member for the 4th EAI International Conference on Safety and Security in Internet of Things, Nov. 6-7, 2017, Valencia, Spain [Link]
  • Program Committee Member for the 18th International Conference on Engineering Applications of Neural Networks (EANN'2017), August 25-27, 2017, Athens, Greece [Link]
  • Program Committee Member for the 13th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI 2017), 19-20 August 2017, Melbourne, Australia [Link]
  • Program Committee Member for the Third IEEE International Workshop on Trust and Security in Wireless Sensor Networks, 1-4 August 2017, Sydney, Australia [Link]
  • Program Committee Member for the EAI International Conference on Smart Grid Assisted Internet of Things, July 11-13, 2017, Ontario, Canada [Link]
  • Program Committee Member for the IEEE International Conference on Innovations in Intelligent Systems and Applications (INISTA'17), 3-5 July 2017, Gdynia, Poland [Link]
  • Program Committee Member for the 11th International Conference on Frontier of Computer Science and Technology (FCST'17), 21-23 June 2017, Exeter, UK [Link]
  • Program Committee Member for the 16th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 14-16 Dec. 2016, Granada, Spain [Link]
  • Program Committee Member for the 15th International Conference on Ubiquitous Computing and Communications (IUCC'16), 14-16 Dec. 2016, Granada, Spain [Link]
  • Program Committee Member for the 16th IEEE International Conference on Computer and Information Technology (CIT'16), Fiji, 8-10 December 2016 [Link]
  • Program Committee Member for 6th International Symposium on Cloud and Services Computing, Fiji, 8-10 December 2016 [Link]
  • Program Committee Member for 3rd International Conference on Internet of Vehicles (IoV'16), Fiji, 8-10 December 2016 [Link]
  • Program Committee Member for 2nd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2016), Fiji, 8-10 December 2016 [Link]
  • Program Committee Member for 10th IEEE International Conference on Open Source Systems & Technologies, 15-17 Nov. 2016, Pakistan [Link]
  • Program Committee Member for the IEEE International Workshop on Cloud-based Networks and Applications (CloudNA), 41st IEEE Conference on Local Computer Networks, 7-10 November 2016, Dubai, UAE [Link]
  • Program Committee Member for 10th International Conference on Anti-counterfeiting, Security, and Identification (ASID'16), 23-25 Sept. 2016, Xiamen, China [Link]
  • Program Committee Member for the 12th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI 2016), Thessaloniki, Greece, 16-18 Sept. 2016 [Link]
  • Program Committee Member for the 4th IEEE International Conference on Cloud Computing and Intelligent Systems, August 17-19, 2016, Beijing [Link]
  • Program Committee Member for the International Workshop on Cyber Security and Digital Investigation (CSDI 2016), The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016), August 15-18, 2016, Montreal, Canada [Link]
  • Program Committee Member for the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'16), 23-26 August, Tianjin, China [Link]
  • Program Committee Member for the 13th International Conferenceon Image Analysis and Recognition (ICIAR 2016), July 13-15, 2016, Povoa de Varzim, Portugal [Link]
  • Program Committee Member for the 13th IEEE International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR'16), 10-13 July 2016, Jeju Island, South Korea [Link]
  • Program Committee Member for the IEEE International Instrumentation and Measurement Technology Conference, May 23-26, 2016, Taipei, Taiwan [Link]
  • Program Committee Member for the 8th Asian Conference on Intelligent Information and Database Systems (ACIIDS'16), 14-16 April 2016, Da Nang, Vietnam [Link]
  • Program Committee Member for the International Conference on Internet of things and Cloud Computing (ICC'16), March 22-23 2016, Cambridge, United Kingdom [Link]
  • Program Committee Member for the 3rd International Conference on Computing, Management and Telecommunications (ComManTel'15), DaNang, Vietnan, Dec. 28-30, 2015 [Link]
  • Program Committee Member for the International Conference on Internet of Vehicles (IOV'15), Chengdu, China, Dec. 19-21, 2015 [Link]
  • Program Committee Member for the International Symposium on Cloud and Service Computing (SC2'15), Chengdu, China, Dec. 19-21, 2015 [Link]
  • Publicity Co-Chair for the 9th International Conference on Future Generation Communication and Networking (FGCN'15), Nov. 25-28, 2015, JeJu, Korea [Link]
  • Program Committee Member for the 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP'15), November 18-20, Zhangjiajie, China, 2015 [Link]
  • Program Committee Member for the 9th International Conference on Network and System Security (NSS'15), November 3-5, 2015, New York, USA [Link]
  • Program Committee Member for the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC'15), 26-18 October 2015, Liverpool, UK [Link]
  • Program Committee Member for the 4th International Conference on Connected Vehicles & Expo (ICCVE'15), October 19-23, 2015, Shenzhen, China [Link]
  • Program Committee Member for the International Conference on E-mobility and Emerging Vehicular Technology, October 13, 2015 Slovakia [Link]
  • Program Committee Member for the 7th International Conference on Evolving Internet, October 11-15, 2015, St. Julians, Malta [Link]
  • Program Committee Member for the International Conference on Advanced Technologies for Communications (ATC'15), Ho Chi Minh, Vietnam, Oct. 14-16, 2015 [Link]
  • Program Committee Member for the 11th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'15), September 23-25, 2015, Adelaide, Australia [Link]
  • Program Committee Member for the 11th International Conference on Artificial Intelligence Applications and Innovations, Bayonne/Biarritz, France, September 14-17, 2015 [Link]
  • Program Committee Member for the 2nd NAFOSTED Conference on Information and Computer Science (NICS), Sept. 16-18, 2015, Ho Chi Minh City, Vietnam [Link]
  • Program Committee Member for the 9th International Conference on Frontier of Computer Science and Technology (FCST'15), August 26-28, 2015, Dalian, China [Link]
  • Program Committee Member for the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'15), Helsinki, Finland, 20-22 August, 2015 [Link]
  • Program Committee Member for 12th International Conferenceon Image Analysis and Recognition (ICIAR'15), July 22-24, 2015, Niagara Falls, Canada [Link]
  • Program Committee Member for the International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS 2015) in conjunction with ANT 2015, June 2015, London, UK, staff.iium.edu.my/sakib/spins15/
  • Program Committee Member for the 2nd IEEE International Conference on Cybernetics, Gdynia Poland, 24-26 June 2015 [Link]
  • Program Committee Member for the 4th International Conference on Informatics, Electronics & Vision (ICIEV'15), 15-18 June, 2015, Fukuoka, Japan [Link]
  • Program Committee Member for the International Instrumentation and Measurement Technology Conference (I2MTC), May 11-14 2015, Pisa, Italy [Link]
  • Program Committee Member for the 7th Asian Conference on Intelligent Information and Database Systems, 23-25 March 2015, Bali, Indonesia [Link]
  • Program Committee Member for the 10th International Conference on Information Assurance and Security (IAS 2014), 27-30 November, Okinawa, Japan [Link]
  • Program Committee Member for 8th International Conference on Anti-counterfeiting, Security, and Identification (ASID'14), Nov. 2014, Macau [Link]
  • Program Committee Member for the 3rd International Conference on Connected Vehicles & Expo (ICCVE 2014), November 3-7, 2014, Vienna, Austria [Link]
  • Program Committee Member for the International Conference on Advanced Cloud and Green Computing (Clogreen'14), 6-8 Nov. 2014, Morocco [Link]
  • Program Committee Member for the 11th International Conferenceon Image Analysis and Recognition (ICIAR'14), October 22-24, 2014, Algarve, Portugal [Link]
  • Program Committee Member for the 7th International Conference on Advanced Technologies for Communications (ATC'14), Oct. 15-17, 2014, Hanoi, Vietnam [Link]
  • Program Committee Member for the International Workshop onbReliability of eHealth Information Systems, 16th International Confernce on E-Health Networking, Application & Services (Healthcom'14), October 15-18, 2014, Brazil
  • Program Committee Member for the 10th International Conference on Artificial Intelligence Applications and Innovations (AIAI 2014), Island of Rhodes, Greece, September 19-21, 2014 [Link]
  • Program Committee Member for the 4th International Symposium on Cloud and Services Computing, Beijing, China, Sept. 1-2, 2014 [Link]
  • Program Committee Member for the 22nd International Conference on Pattern Recognition (ICPR'14), 24-28 August 2014, Stockholm, Sweden [Link]
  • Program Committee Member for the 6th International Symposium on Cyberspace Safety and Security (CSS2014), August 20-22, 2014, Paris, France [Link]
  • Program Committee Member for 14th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP'14), 24-27 August 2014, Dalian, China [Link]
  • Program Committee Member for the 16th IEEE International Conference on High Performance Computing and Communications (HPCC'14), 20-22 August 2014, Paris, France [Link]
  • Program Committee Member for the 5th International Conference on Communications and Electronics (ICCE'14), July 30-1 August 2014, Da Nang, Vietnam [Link]
  • Program Committee Member for the 13th International Conference on Intelligent Software Methodologies, Tools, and Techniques (SOMET'14), September 22-24, 2014, Malaysia [Link]
  • Program Committee Member for the 12th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA'14), Sept. 2014, Milan, Italy [Link]
  • Program Committee Member for the 6th International Conference on Evolving Internet (INTERNET'14), June 22-26, 2014, Seville, Spain [Link]
  • Program Committee Member for the 3rd IEEE/ASE International Conference on Cyber Security, Stanford, USA, 27-31 May , 2014 [Link]
  • Program Committee Member for the International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS 2014) in conjunction with ANT 2014, June 2-5, 2014, Hasselt, Belgium [Link]
  • Program Committee Member for the 6th Asian Conference on Intelligent Information and Database Systems, April 7-9, 2014, Thailand [Link]
  • Program Committee Member for the 8th International Conference for Internet Technology and Secured Transactions (ICITST'13), 9-12 December 2013, London, UK [Link]
  • Program Committee Member for the World Congress on Internet Security (WorldCIS'13), 9-12 December 2013, London, UK [Link]
  • Program Committee Member for the International Conference on Connected Vehicles & Expo (ICCVE'13), December 2-6, 2013, Las Vegas, USA [Link]
  • Program Committee Member for the 9th International Conference on Informatoin Assurance and Security (IAS'13), 4-6 December 2013, Tunis, Tunsia [Link]
  • Program Committee MEmber for the 2nd International Conference on Convergence and its Application (ICCA 2013), 29-29 November 2013, Jeju Island, Korea [Link]
  • Program Committee Member for the 8th International Conference on Body Area Networks (BodyNets'13), Sept 30-October 2, 2013, Boston, USA [Link]
  • Program Committee Member for the 5th International Symposium on Cyberspace Safety & Security, Nov. 13-15, 2013, Zhangjiajie, China [Link]
  • Program Committee Member for the 15th IEEE International Conference on High Performance Computing (HPCC'13), Nov. 13-15, China [Link]
  • Program Committee Member for 7th International Conference on Anti-counterfeiting, Security, and Identification (ASID'13), Oct. 25-27 2013, Shanghai [Link]
  • Program Committee Member for the 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'13), Beijing, China, Oct 16-18, 2013 [Link]
  • Program Committee Member for the 4th International Conference on Emerging Intelligent Data and Web Technologies, Sept. 9 - 11, 2013Xi'an, China [Link]
  • Program Committee Member for the 13th International Conference on ITS Telecommunications (ITST'13), October 16-18 2013, Tampere, Finland [Link]
  • Program Committee Member for the 7th International Conference on Genetic and Evolutionary Computing (ICGEC-2013), August 25-27, 2013, Prague, Czech Republic [Link]
  • Program Committee Member for the 9th International Conference on Intelligent Computing (ICIC'13), July 28-31, 2013, Nanning, China [Link]
  • Program Committee Member for the 5th International Conference on Evolving Internet, 21-26 July 2013, Nice, France [Link]
  • Program Committee Member for the 11th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA'13), Australia, 16-18 July, 2013 [Link]
  • Program Committee Member for the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), Melbourne, Australia, 16-18 July, 2013 [Link]
  • Program Committee Member for the 10th International Conference on Image Analysis and Recognition (ICIAR'13), 26-28 June 2013, Portugal [Link]
  • Program Committee Member for the International Workshop on Parallel and Mobile Computing in Future Networks (PMCFN'13) In Conjunction with the 13th International Conference on Computational Science and Its Applications (ICCSA 2013), June 24-27, 2013, Vietnam [Link]
  • Program Committee Member for the 6th IAPR International Conference on Biometrics (ICB'13), June 4-7 2013, Madrid, Spain [Link]
  • Program Committee Member for the 6th International Conference on Cryptology in Africa (AfricaCrypt'13), 22-24 June 2013, Cairo, Egypt [Link]
  • Program Committee Member for the 7th International Conference on Network and System Security (NSS'13), 3-4 June 2013, Madrid, Spain [Link]
  • Program Committe Member for the 5th International Conference on Intelligent Information And Database Systems (ACIIDS'13), Kulala Lumpur, Malaysia, 18-20 March 2013 [Link]
  • Program Committee Member for the International Conference on Connected Vehicles & Expo (ICCVE 2012), December 12-16, 2012, Beijing, China [Link]
  • Program Committee Member for the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 12-13 December 2012, Melbourne, Australia [Link]
  • Program Committee Member for the IEEE Asia Pacific Cloud Computing Congress, 14-17 November 2012, China [Link]
  • Program Committee Member for the 8th International Conference on Informatoin Assurance and Security (IAS'12), 21-23 November, Sao Carlos, Brazil [Link]
  • Program Committee Member for the 21st International Conference on Pattern Recognition (ICPR 2012), 11-15 November 2012, Tsukuba Science City, Japan [Link]
  • Program Committee Member for the 5th International Conference on Internet and Distributed Computing Systems (IDCS 2012), 21-23 November 2012, Fujian, China [Link]
  • Program Committee Member for 6th International Conference on Anti-counterfeiting, Security, and Identification (ASID'12), August 24-26, 2012, Taipei, Taiwan [Link]
  • Program Committee Member for the 6th International Conference on Genetic and Evolutionary Computing (ICGEC-2012), August 25-28, 2012, Kitakyushu, Japan [Link]
  • Program Committee Member for the 7th Asia Pacific International Conference on Information Science and Technology (APIC-IST 2012) , 4-7 July 2012, Jeju Island, Korea [Link]
  • Program Committee Member for the 10th IEEE International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR'12), 15-18 July 2011, Xian, China [Link]
  • Program Committee Member for the 14th IEEE International Conference on High Performance Computing and Communications (HPCC'12), 25-27 June 2012, Liverpool, UK [Link]
  • Program Committee Member for the 4th International Conference on Evolving Internet (INTERNET'12), June 24-29, 2012, Venice, Italy.
  • Program Committee Member for the 9th International Conference on Image Analysis and Recognition (ICIAR'12), 25-27 June 2012, Portugal [Link]
  • Program Committee Member for the 6th International Conference on Network and System Security (NSS'12), 21-23 November 2012, Fujian, China [Link]
  • Program Committee Member for 8th International Conference on Intelligent Computing (ICIC'12), 25-29 July, 2012, Huangshan, China [Link]
  • Program Committee Member for 6th International Conference on Information Technology and Secured Transactions (ICITST'11), 11-14 December 2011, Abu Dhahi, UAE [Link]
  • Program Committee Member for 14th International Multitopic Conference (INMIC), 22-24 December 2011, Karachi [Link]
  • Program Committee Member for 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP'11), 24-26 October 2011, Melbourne, Australia [Link]
  • Program Committee Member for 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (IIH-MSP 2011), 14-16 October 2011, Dalian, China [Link]
  • Program Committee Member the 5th International Conference on Network and System Security (NSS'11), September 2011, Milan, Italy [Link]
  • Program Committee Member the 3rd International Conference on Computational Collective Intelligence, Technologies and Applications (ICCCI'11), 21-23 September 2011, Gdynia, Poland [Link]
  • Program Committee Member for the 5th International Conference on Genetic and Evolutionary Computing (ICGEC'11), 29 August- 1 September 2011, Kitakyushu, Japan [Link]
  • Program Committee Member for 11th IEEE International Conference on Scalable Computing and Communications (ScalCom'11), 21 August- 2 September, 2011, Cyprus
  • Program Committee Member for 5th International Conference on Anti-Counterfeiting, Security and Identification in Communication (ASID 2011), 24-26 June 2011, Xiamen, China [Link]
  • Program Committee Member for 8th International Conference on Image Analysis and Recognition (ICIAR'11), 22 June- 24 June, 2011, Canada [Link]
  • Program Committee Member for 7th International Conference on Intelligent Computing (ICIC'11), 11-14 August, 2011, Zhengzhou, China [Link]
  • Program Committee Member for the 9th IEEE International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR'11), 10-13 July 2011, Guilin, China [Link]
  • Program Committee Member for 12th IEEE International Conference on High Performance Computing and Communications (HPCC'10), 1-3 September 2010, Melbourne, Australia [Link]
  • Program Committee Member for 2nd Workshop on RFID/USN Security and Cryptography (RISC'10), 9-10 November 2010, London UK [Link]
  • Program Committee Member for First International Conference on Networking and Computing (ICNC'10), 17-19 November 2010, Higashi Hiroshima, Japan [Link]
  • Program Committee Member for 2nd International Conference on Computational Collective Intelligence--Technology and Applications (ICCCI 2010), 10-12 November 2010, Taiwan [Link]
  • Program Committee Member for International Conference on Multimedia Information Networking and Security (MINES 2010), 4-6 November 2010, Nanjing, China [Link]
  • Program Committee Member for 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (IIH-MSP 2010), 15-17 October 2010, Darmstadt, Germany [Link]
  • Program Committee Member for Networking and Electronic Commerce Research Conference 2010 (NAEC 2010), October 7-10, 2010, Riva del Garda, Italy [Link]
  • Program Committee Member for 4th International Conference on Anti-Counterfeiting, Security and Identification in Communication (ASID 2010), 18-20 July 2010, Chengdu, China [Link]
  • Program Committee Member for the 20th International Conference on Pattern Recognition (ICPR), 23-26 August 2010, Turkey [Link]
  • Program Committee Member for the 7th International Conference on Image Analysis and Recognition (ICIAR'10), 21-23 June 2010, Portugal [Link]
  • Program Committee Member for the 10th IEEE International Conference on Scalable Computing and Communications (IEEE Scalcom'10), 29 June-01 July 2010 Bradford, UK [Link]
  • Program Committee Member for the 6th International Conference on Intelligent Computing (ICIC'10), 18-21 August 2010, China [Link]
  • Program Committee Member for the 8th IEEE International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR'10), 11-14 July 2010, Qingdao, China [Link]
  • Program Committee Member for the 8th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA'10), 16-19 May 2010, Tunisia [Link]
  • Program Committee member for the 5th IEEE International Conference on Intelligent Computing (ICIC'09), South Korea, 16-19 Sept. 2009 [Link]
  • Program Committee Member for the 10th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'09), 8-11 December 2009, Hiroshima, Japan [Link]
  • Program Committee Member for the 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09), 11-12 December 2009, Jeju Island, Korea [Link]
  • Program Committee member for the 1st International Workshop on RFID Security and Cryptography (RISC'09), 10 November 2009, United Kingdom [Link]
  • Program Committee Member for the IEEE International Conference on Scalable Computing and Communications (IEEE Scalcom'09), 25-27 September 2009, Dalian, China
  • Program Committee Member for the IEEE International Conference on Wavelet Analysis and Pattern Recognition (IEEE ICWAPR'09), 12-15 July 2009, Hebei, China
  • Program Committee Member for the 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS'08), 8-10 December 2008, Melbourne, Australia
  • Program Committee Member for the 10th IEEE International Conference on High Performance Computing and Communications (HPCC-08), 25-27 Sept. 2008, Dalian, China
  • Program Committee Member for the IEEE International Conference on Wavelet Analysis and Pattern Recognition (IEEE ICWAPR'08), 30-31 August 2008, Hong Kong
  • Program Committee member for the IEEE International Conference on Intelligent Computing (ICIC'08), Shanghai, China, 2008 [Link]
  • Program Committee member for the First International Conference on Information Technology and Knowledge Management (IT&KM), SZABIST, Islamabad, Pakistan, March, 2008.
  • Program Committee member for the IEEE International Conference on Intelligent Computing (ICIC'07), Qingdao, China, 2007 [Link]
  • Program Committee member for the IEEE International Conference on Intelligent Computing (ICIC'06), Kunming, China, August, 2006

Journals Reviewer


  • Reviewer for the IEEE Potentials, USA (Since May, 2006)
  • Reviewer for the Neurocomputing, Elsevier Science UK (Since June, 2006)
  • Reviewer for the Journal of Applied Sciences, (Since May, 2007)
  • Reviewer for the Journal of Wireless Communications and Mobile Computing, John Wiley & Sons Ltd, UK, (Since February 2008)
  • Reviewer for the IETE Technical Review, (Since February 2009)
  • Reviewer for the IEEE Trans on Systems, Man and Cybernetics (Part B), USA (Since Sept. 2006)
  • Reviewer for the IEEE Trans on Systems, Man and Cybernetics (Part C), USA (Since March, 2009)
  • Reviewer for the Computers & Electrical Engineering, Elsevier Science Since (March, 2009)
  • Reviewer for the Journal of Digital Signal Processing (DSP), Elsevier Science (Since June, 2009)
  • Reviewer for the Journal of Telecommunication Systems (Springer-Verlag) (Since July, 2009)
  • Reviewer for the IEEE Trans on Computers, USA (Since June, 2009)
  • Reviewer for the Journal of Multimedia Tools and Applications (Springer-Verlag) (Since June, 2009)
  • Reviewer for the Journal of Zhenjiang University Science-A, Springer-Verlag (Since January 2010)
  • Reviewer for the International Journal of Computer Mathematics, Taylor & Francis (Since Feb. 2010)
  • Reviewer for the Journal of Security and Communication Networks, John Wiley & Sons (Since March 2010)
  • Reviewer for the Journal of Systems and Software, Elsevier Science (Since March 2010)
  • Reviewer for the Journal of Sensors, (Since April 2010)
  • Reviewer for the Journal of Machine Vision and Applications, Springer Verlag (Since May 2010)
  • Reviewer for the Arab Journal for Science & Engineering, KFUPM (Since June 2010)
  • Reviewer for the Journal of Expert Systems, Wiley-Blackwell (Since June 2010)
  • Reviewer for the IET Electronics Letters (Since July 2010)
  • Reviewer for the International Journal of Bio-Inspired Computation, Inderscience Publishers, (Since August 2010)
  • Reviewer for the IET Information Security (Since August 2010)
  • Reviewer for the Journal of Computer Science & Technology (JCST), Springer-Verlag (Since October 2010)
  • Reviewer for the IEEE Trans on Dependable and Secure Computing, USA (Since Jan. 2011)
  • Reviewer for the Arab Journal of Science & Engineering (Since Dec. 2011)
  • Reviewer for the IEEE Communication Letters, USA (Since Jan. 2012)
  • Reviewer for the Information Processing Letters, Elsevier Science (Since March 2012)
  • Reviewer for the IEEE Systems Journal (Since June 2012)
  • Reviewer for the Autosoft Journal (Since July 2012)
  • Reviewer for the Signal Processing, Elsevier Science (Since August 2012)​
  • Reviewer for the KSII Transactions on Internet and Information Systems​ (Since Nov. 2012)
  • Reviewer for the IEEE Wireless Communication Letters (Since Dec. 2012)
  • Reviewer for the International Journal of Communication Systems (Since Jan. 2013)
  • Reviewer for the Journal of King Saud University-Computer & Information Sciences (Since March. 2013)
  • Reviewer for the IEEE Transactions on Instrumentation and Measurement (Since July 2013)
  • Reviewer for the Chinese Physics B (Since Nov. 2013)​​​​​​​​​​​​
  • Reviewer for the IEEE Transactions on Information Forensics & Security (Since Feb. 2015)
  • Reviewer for the Real Time Imaging Journal, Springer (June 2016)​
  • Reviewer for the IEEE Journal of Biomedical and Health Informatics (Nov. 2016)
  • Reviewer for the IET Biometrics (Nov. 2017)
  • Reviewer for the Journal of Ambient Intelligence and Humanized Computing (Nov. 2017)
  • Reviewer for the ACM Transactions on Spatial Algorithms and Systems (Jan. 2018)
  • Reviewer for the Optics and Laser Technology, Elsevier (April 2018)

Institutional And Admi​nistrative Services


  • Funding Proposal Reviewer for the Swiss National Science Foundation (SNSF), Switzerland, 2018
  • Registered Reviewer for the National Committee of Research Guarantors, Italian Ministry of Education, Universities and Research (MIUR), 2018
  • Member of the Expert Group on Digital Transformation for the Arab Federation for Digital Economy, Sept. 2018
  • Reviewer for the Revised Curriculum of BS (Computer Science) Program, King Faisal University, Saudi Arabia (May 2018)
  • Funding Proposal Reviewer for the Effat University, Saudi Arabia (Since 2018)
  • Vice Chair, IEEE Communications Society Saudi Chapter, (Since Nov. 2017)
  • Reviewer of Scientific Proposals, Czech Science Foundation, Czech Republic, 2017
  • Lead the Team for Developing BS Cybersecurity Degree Program for the College of Community and Applied Sciences, King Saud University, Kingdom of Saudi Arabia (2015-2016)
  • Research & Development Manager, Center of Excellence in Information Assurance (CoEIA), King Saud University, Kingdom of Saudi Arabia (February 2009- March 2012)
  • Adjunct professor at Fujian University of Technology, China (Since 2015)
  • King Saud University Journals Publications Unit Committee Member (Since Feb. 2016)
  • Scientific Council Member of 'IT Research Center for The Holy Quran and its Sciences (NOOR ITRC)', Taibah University, Madinah, Saudi Arabia (Since Nov. 2015)
  • Member of Scientific Committee, Center of Excellence in Information Assurance, King Saud University, Saudi Arabia (2009-2012)
  • Honorary Professor, Harbin Institute of Technology, Shenzhen Graduate School, China (Since May 2010 Till Now)
  • Reviewing Borad of KACST Scientific & Research Proposals, Saudi Arabia (Since 2011- Till now)
  • Member of the External Projects Evaluation Committee of CoEIA, King Saud University (Since Jan. 2010)
  • Regional Director of Saudi Arabia for Science & Engineering Support Society (SERSC), Korea
  • Regional Director for Europe & Middle East, Future Technology Research Association (FTRA), South Korea
  • Subject Group Leader (SGL) for Software Engineering Programme, Bahria University (Since 2007-2009)
  • Member Board of Studies (BoS), Dept. of Computer Science & Engineering, Bahria University (Since 2007-2009)
  • Member of Post Graduate Committee, Dept. of Computer Science & Engineering, Bahria University (Since 2008-2009)
  • MS/PhD Computer Science & Engineering Program Coordinator, Bahria University (Since 2007-2009)

Prospective Students & Collaboration


I am always looking for talented, smart and hardworking students, researchers and collaborators.If your research interests are similiar to mine, you are welcome to discuss ideas for supervision, collaboration or joint professional & academic activities etc.

We have a strong research group with several full-time/part-time researchers, students and faculty members who are passionate for their contributions to the academia and society. We are currently focusing on digital authentication, multimedia security, biometrics security, and cloud computing security. If you have some novel and innovative ideas and would like to join our group, please feel free to contact me through my email for further discussions.


I have been fortunate to work with some of the following students, researchers, and collaborators:


  • Dr. Maqsood Mahmud (Accomplished PhD in April 2013 from UTM, Malaysia)
  • Dr. Zeeshan Siddiqui (Accomplished PhD in Feb. 2015 from UTM, Malaysia)
  • Dr. Hong Zhao (Accomplished PhD UMICH USA & Southwest Jiaotong University, China)
  • Mehdi Sookhak (PhD from University of Malaya, Currently Postdoc at Carleton, Canada)
  • Ejaz Ahmed (PhD from University of Malaya, Malaysia)
  • Fajri Kurniawan (RA at CoEIA, Saudi Arabia)
  • Suleman Iqbal (PhD Student at University of Malaya, Malaysia)
  • Adnan Akhunzada (PhD student at University of Malaya, Malaysia)
  • Junaid Shuja (PhD student at University of Malaya, Malaysia)
  • Suleman Khan (PhD student at University of Malaya, Malaysia)
  • Zubair Rafique (Former at CoEIA, Saudi Arabia, Currently in Spain)
  • Hanifullah (Full-time Researcher at CoEIA, Saudi Arabia)
  • Muhammad Usama Khanzada (PMC Chair for IT Security, Saudi Arabia)
  • Dr. Lu Leng (Currently doing Postdoc at Yonsei University, Korea)
  • Muhammad Bilal Khan (Currently Pursuing PhD in Korea, Former RA at CoEIA)
  • Dr. S. Kumari (Accomplished PhD in Jan 2013)
  • Dr. Dhreendra Mishra (Assistant Professor in India, Accomplished PhD in 2013)
  • Dr. AK Das (IIIT, Hyderabad)
  • Dr. Mohamed Eldefrawy (Full-time Researcher at CoEIA, Saudi Arabia)
  • Dr. Muhammad Imran Razzaq (Associate Professor in Saudi Arabia, Former RA at CoEIA)
  • Dr. Zeeshan Shafi Khan (Assistant Professor at Qasim University, Former RA At CoEIA)
  • Dr. Haider Abbass (Assistant Professor at CoEIA, Saudi Arabia)
  • Dr. Mohamed Sayim Khalil (Assistant Professor at CoEIA, Saudi Arabia)
  • Dr. Hafizul Islam (Assistant Professor in India)
  • Dr. Jiadong Li (Associate Professor in China)
  • Prof. Wang Xiaomin (Southwest Jiaotong University, China)
  • Dr. Li Xiong (Huanan University, China)
  • Dr. Masoom Alam (Comsats, Pakistan)
  • Dr. Hafiz Malik (University of Michigan-Dearborn USA)
  • Dr. Andrew Teoh (Yonsei University, Korea)
  • Dr. D. He (Wuhan University of Technology, China)
  • Prof. Yang Xiang (Deakin University, Australia)

Speeches

  • Invited Speech on "Ensuring the Cybersecurity of Smart Cities: Key Challenges and Solutions", The 3rd National Computing Colleges Conference, King Khaled University, Saudi Arabia,8-9 October 2018
  • Keynote Speech on "Security, Privacy and Trust in the Internet of Things", 11th International Symposium on Information Processing, Shanghai, China, 22-23 September 2018
  • Keynote Speech on “Cybersecurity of Smart Cities: Challenges, Threats and Issues”, 3rd Cloud Computing and Internet of Things Conference (CCIOTC’18), Chengdu, China, 23-25 July 2018
  • Invited Lecture on “Academic Writing and Publishing”, Summer School organized by the ACM Special Interest Group on Knowledge Discovery and Data Mining (SIGKDD), China, 23 July 2018
  • Keynote Speech on "Cybersecurity Threats and Challenges for Smart Cities", 10th IEEE International Conference on Communication Software and Networks (IEEE ICCSN’18), Chengdu, China, 6-9 July 2018
  • Invited Lecture on “Cybersecurity of Smart Cities: Challenges, Threats and Opportunities”, School of Information Science & Technology, Southwest Jiaotong University, China, 9 July 2018
  • Invited at the Workshop on ‘Data Protection, Privacy and the GDPR: Is the GCC Ready?’ Organized by the Royal Institute of International Affairs (Chatham House), London, UK, 31 May 2018
  • Keynote Speech on "Smart Cities in the Cyberspace: Challenges and Solution", 21st National Computer Conference (Sponsored by the IEEE And Saudi Computer Society), 25-26 April 2018, Riyadh, Saudi Arabia
  • Keynote Speech on "Redefining Digital Trust in the Internet of Things Era" at the workshop on Cybersecurity: Future Challenges and Network Defenses, King Saud University, Saudi Arabia, 12 March 2018
  • Keynote Speech on "An Inventor's Case between Patenting and Publishing" at the Workshop on 'The Importance of Patents in Promoting Scientific Publishing', King Salman Entrepreneurship Institute, King Saud University, Riyadh, 6 March 2018
  • Invited Lecture on "Modern Landscape of Scientific Publishing", Scientific Research Forum (Organized by Deanship of Scientific Research), College of Pharmacy, King Saud University, Saudi Arabia, 21 Feb. 2018
  • Invited Lecture on "Modern Landscape of Scientific Publishing", Scientific Research Forum (Organized by Deanship of Scientific Research), College of Engineering, King Saud University, Saudi Arabia, 19 Feb. 2018
  • Invited Lecture on "Modern Landscape of Scientific Publishing", Scientific Research Forum (Organized by Deanship of Scientific Research), College of Dentistry, King Saud University, Saudi Arabia, 19 Feb. 2018
  • Invited Lecture on "Modern Landscape of Scientific Publishing", Scientific Research Forum (Organized by Deanship of Scientific Research), College of Medicine, King Saud University, Saudi Arabia, 18 Feb. 2018
  • Keynote Speech on “Establishing Trust in IoT: Challenges and Solutions”, 1st Saudi International Exhibition and Conference on Internet of Things, Riyadh, Saudi Arabia, 28-30 Jan. 2018
  • Invited Global Webinar on “Building Digital Trust in the Internet of Things Ecosystem”, IEEE Communications Society Saudi Chapter, 25 Jan. 2018
  • Keynote Speech on “Security Privacy and Trust in the Internet of Things” at 18th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'17), Taipei, Taiwan, 18-20 Dec. 2017
  • Invited at Workshop on Cybersecurity of the Sustainable Energy Sector in the GCC, Organized by Chatham House (UK) and ITU Arab Regional Cybersecurity Center (ITU ARCC), Muscat, Oman, 11 Dec. 2017
  • Invited at International Symposium on Regional Security and Transnational Crime, Investigation Bureau, Ministry of Justice, Taipei, Taiwan, 31 Oct.- 1 Nov. 2017
  • Panelist in the Session "C4I Solutions for Combatting Cyber-Terrorism and Managing Crisis" at the International Conference on C4I Solutions, 17-19 October 2017, King Saud University, Riyadh, Saudi Arabia, http://www.c4iconf.com
  • Invited Lecture on "Establishing Consumer Trust in The Internet of Things Enabled Products", Southwest Jiaotong University, 25 July 2017, China
  • Invited Lecture on "Emerging Dynamics of Modern Scientific Publishing", Southwest Jiaotong University, 23 July 2017, China
  • Invited Lecture on "Writing and Publishing High Impact Research Papers", King Abdulaziz City for Science and Technology (KACST), 16 May 2017, Riyadh, Saudi Arabia
  • Keynote Speech on "Building Consumer Trust in Adopting IoT Enabled Products", International Conference for Information and Network Security, 2-3 May 2017, Naif Arab University for Security Sciences, Saudi Arabia
  • Keynote Speech on "The New Dynamics of Scientific Publishing", 29 March 2017, 4th General & Applied Sciences Forum, Prince Sultan University, Riyadh, Saudi Arabia
  • Invited Lecture on "Contributions of CoEIA in Cybersecurity Research, Innovation and Education", Cybersecurity Capacity and Capability Building Workshop, 15 March 2017, King Saud University, Saudi Arabia
  • Invited Lecture on "Choosing Research Topics and Writing Research Papers", College of Computer & Information Sciences, King Saud University, 14 Feb. 2017, Saudi Arabia
  • Invited Guest Speaker Lecture on "The New Dynamics of Scientific Publishing", King Faisal Specialist Hospital and Research Center, 19 Dec. 2016, Riyadh, Saudi Arabia
  • Invited Lecture on "New Strategies in Scientific Publishing", Workshop on Forefront of Scientific Publishing: Research Impact on Achieving Saudi Vision 2030, 8 Nov. 2016, King Saud University, Saudi Arabia
  • Invited Lecture on "Digital Holy Quran Computing: An Information Security Perspective", The 2nd Annual Forum on Information Security: Challenges, Insights, and Trends, Naif Arab University of Security Sciences, 4-5 October 2016, Riyadh, Saudi Arabia
  • Invited Lecture/Seminar on "Innovation: What, Why and How", Southwest Jiaotong University, 4 August 2016, Chengdu, China
  • Panelist in the Session "National Capacity and Capability Building in Cybersecurity" at the International Conference on C4I Solutions, 26-28 April 2016, King Saud University, Riyadh, Saudi Arabia
  • Invited Lecture/Seminar on "Cybersecurity: Evolutions, Applications and Emerging Trends", King Faisal University, Al-Hofuf, Kingdom of Saudi Arabia, 19 Jan 2016
  • Invited Lecture/Seminar on "Research Publishing Strategies for Early Career Researchers", Iqra University, Karachi, Pakistan, 21 Sept. 2015
  • Invited Lecture/Seminar on "Prospects and Challenges of Cybersecurity", Southwest Jiaotong University, Chengdu, China, 5 August 2015
  • Invited Lecture/Seminar on "Writing and Publishing Scientific Papers", Southwest Jiaotong University, Chengdu, China, 5 August 2015
  • Invited Lecture/Seminar on "Cybersecurity: Challenges & Opportunities", Fujian University of Technology, Fuzhou, China, 4 August 2015
  • Invited Lecture/Seminar on "Cybersecurity: Challenges and Opportunities in the Modern Society", Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, 28 July 2015
  • Keynote Speaker at the 43rd Seminar of the Institution of Engineers (Pakistan)-Saudi Arabian Section, Riyadh, Saudi Arabia, 21 May 2015
  • Invited Speaker and Panelist at "The National Symposium for Command & Control and Cybersecurity", King Saud University, Riyadh, Saudi Arabia, 27-29 April 2015
  • Invited Seminar on "Digital Authentication: The First Line of Defense Against Cyber Attacks", King Abdullah University of Science & Technology (KAUST), Saudi Arabia, March 2015
  • Invited Lecture on "Cybersecurity: Challenges & Opportunities", Qatar University, Doha, Qatar, 19 October 2014
  • Invited Lecture on "Cybersecurity Challenges and Opportunities", Southwest Jiaotong University, China, 3 August 2014
  • Invited Keynote Speech at United Nations/UAE Open Government Data Forum, Abu Dhabi, UAE, 28-29 April 2014
  • Invited Lecture "Cybersecurity: Threats, Challenges and Opportunities", College of Business Administration, King Saud University, 17 April, 2014
  • Seminar on "Cybersecurity: Challenges and Concerns", CoEIA, KSU, 7 Jan. 2014
  • Keynote Speaker at 14th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'13), Taipei, Taiwan, 16-18 Dec. 2013
  • Invited Lecture on "Cybersecurity in Modern Arena", Southwest University for Nationalities, China, 6 July 2013
  • Invited Lecture on "Exploring Biometrics for Reliable Personal Identification", Southwest Jiaotong University, China, 16 July 2012
  • Workshop on "Towards Writing & Publishing Technical Research Papers", CoEIA, King Saud University, 28 December 2011
  • Invited Seminar/Lecture on "Biometrics Personal Identification: Advances in Research and Applications", Southwest University for Nationalities, Chengdu, China, 15 July 2011
  • Invited Seminar/Lecture on Biometrics Research Advances and R&D collaboration invitation at Coventry University, UK, June 2010
  • Invited Seminar/Lecture on Biometrics Security at Southwest Jiaotong University, Chengdu, China, July 2010
  • Invited Seminar/lecture on Writing and Publishing Scientific Papers at Southwest University for Nationalities, China, July 2010
  • Collaborating Avenues in Biometrics & Multimedia Security Research with CoEIA, at CoEIA, King Saud University, 6 January, 2010
  • Research Strategies for Beginners, at CoEIA, King Saud University, 15 March 2009
  • Writing and Publishing Scientific Papers, at CoEIA, King Saud University, 24 October, 2009
  • Biometrics: Changing the Paradigm of Personal Identification, at CoEIA, King Saud University,18 November 2009
  • Tutorial on "Biometrics: Recent Advances, Future Prospects and Applications in Pakistan" at the IEEE International Conference on Information & Emerging Technologies (IEEE ICIET'07), FAST-National University of Computer & Emerging Sciences, July, 2007
  • Securing Biometric Templates for Reliable Identity Authentication, Invited Paper Talk, International Conference on Intelligent Computing (ICIC'05), Hefei, China, August, 2005

FUNDED PROJECTS

  • Hand-based Biometrics Fusion and Bio-Cryptosystem Computation, Funded by National Plan for Science, Technology and Innovation (NPSTI), Saudi Arabia, Role: Principal Investigator, 2018-2020
  • Cryptgraphically Privacy Preserving Mechanism for Cloud-based Healthcare Systems in KSA, ​Funded by National Plan for Science Technology and Innovation, Saudi Arabia, Role: Consultant, 2014-2016
  • A Secure e-Quran Certification System Integrating Audio, Image and Text Watermarking Technologies for Verification of Integrity and Content-Authenticity​​, Funded by King Abdulaziz City for Science & Technology (KACST), Saudi Arabia, Role: Co-PI, 2015-2017
  • Digital Multimedia Forensics, Funded by National Plan for Science Technology and Innovation (NPSTI), Saudi Arabia, Role: Principal Investigator, Jan. 2014-Dec. 2015 (Highly Recommended Project by KACST & AAAS (USA))
  • Research of Polymorphic Lightweight Chaotic Ciphers with Application to Railway Signal Systems, National Natural Science Foundation of China (NSFC), Role: Co-Investigator, 2014-2017
  • Key Theory and Technological Research on Data Security Protection in Cloud Storage System, National Natural Science Foundation of China (NSFC), Role: Co-Investigator, 2014-2016
  • Research Group on Biometrics and Cybersecurity, Deanship of Scientific Research, King Saud University, Role: Principal Investigator, 2013-2014
  • Digital Quran, Funded by NOORITC Research Center, Taibah University, Saudi Arabia, Role: Principal Investigator, 2012-2013
  • ID-based Signature & Authentication, Funded by National Plan for Science Technology and Innovation (NPSTI), Saudi Arabia, Role: Co-Investigator, 2011-2012
  • ​​​"Early Detection of Spam Botnets based on Traffic Properties", Funded by National Plan for Science Technology and Innovation (NPSTI), Saudi Arabia, Role: Co-Investigator, 2011-2013
  • ​"Remote Authentication and Attestation of Documents: A Cryptographic Digital Watermarking Approach", Role: Internal Collaborat​​or, 2010
  • Satellite Image Security, Deanship of Scientific Research, King Saud University, 2010
  • ​National Science Foundation China (NSFC Grant No: 60572027), Role: Research Team Member, 2004-2006
  • Sichuan Youth Science and Technology Foundation (Grant No. 03ZQ026-033), Role: Research Team Member, 2004-2006​
  • Securing The Transmission of Biometric Data for Reliable Identity Authentication, Doctoral Innovation Funds of Southwest Jiaotong University, Role: Principal Investigator, 2005-2006

There are several other classified funding projects, which are not mentioned in the list due to some reasons.

Awards & Media Coverage

Prof. Khurram has a firm believe that nothing great was ever achieved without enthusiasm. Hard work, consistency, and passion are his friends for the journey of his career. He considers success as a journey not a destination!
img01

Awards & Recognitions

Awards & Recognitions

Awards & Recognitions
img01

Media / Press Coverage

Media / Press Coverage

Media / Press Coverage

Awards & Recognitions

  • King Saud University Award for Scientific Excellence (Inventions, Innovations, and Technology Licensing), 16 May 2016
  • Best Paper Award from the Journal of Network and Computer Applications (Elsevier), Awarded at IEEE Globecom'15, San Diego, USA, Dec. 2015
  • King Saud University Award for Scientific Excellence (Research Productivity), 19 May 2015
  • Awarded Bronze Medal at 41st International Exhibition of Inventions at Geneva, for the invention "Detecting Counterfeit Money using RFID-enabled Smart Phone", Geneva, Switzerland, 10-14 April 2013
  • Awarded Gold Medal at 10th Malaysia Technology Expo 2011, Feb. 2011, Kulala Lumpur, Malaysia, for the best invention & innovation award
  • Certificate of Appreciation from Elsevier Science for Successfully Guest Editing a Special Issue in Journal of Network & Computer Applications (vol. 33 Issue 3, 2010)
  • Certificate of Appreciation for Outstanding Contributions in Biometrics & Information Security Research, AIT Conference 2010, June 2010, Japan
  • Inclusion of biography in '2000 Outstanding Intellectuals of the 21st Century - 2011', Cambridge, UK
  • Marquis Who is Who in the World, 2010 Edition, USA
  • Outstanding Leadership Award, IEEE Network & Systems Security Conference, October 2009, Australia
  • Awarded the best Ph.D. dissertation award in Sichuan Province, China
  • Awarded the best Ph.D. dissertation award at Southwest Jiaotong University, China
  • Outstanding graduate student award at Southwest Jiaotong University, China
  • Record holder to become the first foreign engineering doctorate of Sichuan Province
  • Secured first class first position in 6 months Chinese Language certificate
  • Awarded Gold medal & title of 'Magna Cum Laude' in Masters degree

Media / Press Coverage

  • Live Interview on GEO TV Networks in a Program 'Subah Say Geo' on the Subject 'Biometrics and Security Research', Program Duration: 40 Minutes, GEO TV is a Satellite Television and the Biggest TV Channel in Pakistan. [Link]
  • Interview on Pakistan Television (PTV) on my Research and Academic Achievements in Biometrics Research, Program Duration: 30 Minutes, PTV is a Satellite Television and the Govt/Public Channel in Pakistan. [Link]
  • Press Interview in News paper 'The Daily Jang', Pakistan. The Daily Jang is the Biggest Urdu News Paper in Pakistan, which was Published on Paper and Online. [Link]
  • KSU scientists granted American patent on biometric security | Arab News [Link]
  • King Saud University Granted a US Patent on Biometrics Security | News KSU [Link]
  • King Saud University Award for Scientific Excellence Conferred Upon Prof. Muhammad Khurram Khan | News KSU [Link]
  • Dr. Muhammad Khurram Khan Wins KSU Research Productivity Award | News KSU [Link]
  • KSU Receives a US Patent on Currency Note Authentication | News KSU [Link]
  • King Saud University Earns a Patent on Digital Authentication for Cybersecurity | News KSU [Link]
  • KSU Professor Invited for Keynote Speech at Open Government Data Forum, UAE | News KSU [Link]
  • Risalat Al-Jameah [Link]
  • Risalat Al-Jameah [Link]
  • KSU Professor Joins Journal of Medical Systems as Associate Editor | KSU News [Link]
  • KSU and Taibah University Work Together for Digital Holy Quran Security Project | News KSU [Link]
  • Lecture on Cybersecurity: Challenges and Concerns on 7 January | News KSU [Link]
  • CoEIA lecture to explore detection of counterfeit money | News KSU [Link]
  • جريدة الرياض | «مركز التميز» منظماً لمؤتمر القيادة والسيطرة العالمي [Link]
  • جريدة الرياض | «نور» جامعة طيبة.. مرجعية علمية عالمية في مجال توظيف تقنية المعلومات في خدمة القرآن الكريم [Link]
  • انطلاق فعاليات مؤتمر جامعة طيبة في توظيف تقنية المعلومات لخدمة القرآن [Link]
  • جريدة الرياض | جامعة الملك سعود تحصد براءة اختراع أمريكية لنظام مصادقة كلمات المرور [Link]
  • جريدة الرياض | مركز التميز يحصل على براءة اختراع نظام المصادقة باستخدام كلمات المرور الموقتة [Link]
  • برعاية ولي ولي العهد.. مؤتمر القيادة والسيطرة ينطلق غدًا الثلاثاء [Link]
  • اليوم : مركز التميز بجامعة الملك سعود يحصل على براءة اختراع [Link]
  • جامعة الملك سعود تحصل على براءة اختراع نظام يحمي من الهجمات الإلكترونية [Link]
  • جامعة الملك سعود تحصد براءة اختراع أمريكية لنظام مصادقة كلمات المرور [Link]
  • جامعة طيبة | رسالة طيبة | فعاليات مؤتمر جامعة طيبة الدولي في توظيف تقنية المعلومات لخدمة القران الكريم وعل [Link]
  • براءة اختراع أمريكية لجامعة الملك سعود في نظام لاكتشاف النقود المزورة باستخدام الهواتف الذكية [Link]
  • ثقافي / مركز تميز أمن المعلومات بجامعة الملك سعود / محاضرة وكالة الأنباء السعودية [Link]
  • الصفحة غير متاحه [Link]
  • عام / برعاية ولي ولي العهد.. مؤتمر القيادة والسيطرة ينطلق غدًا الثلاثاء / إضافة ثانية واخيرة [Link]
  • عام / اختتام أعمال ندوة أنظمة القيادة والسيطرة والأمن السيبراني / إضافة ثانية واخيرة [Link]
  • المؤتمر العالمي لحلول القيادة والسيطرة يختتم أعماله غدًا [Link]
  • SaudiaTV [Link]
  • Was.sa [Link]
  • مركز التميز يحصل على براءة اختراع نظام المصادقة باستخدام كلمات المرور المؤقتة - صحيفة الأحساء الآن [Link]
  • عام / انطلاق أعمال ملتقى أمن المعلومات بجامعة نايف بمشاركة 183 خبيرًا أمنيًا/ إضافة أولى واخيرة وكالة الأنباء السعودية [Link]
  • الملتقى الدولي أمن المعلومات: التحديات،الرؤى،والتوجهات – شبكة ضياء للمؤتمرات و الدراسات [Link]
  • KSU Professor Delivers Invited Lecture at Information Security Forum | News KSU [Link]
  • رئيس جامعة المنوفية يشارك بالملتقى الدولى لأمن المعلومات وجرائم الانترنت بالسعودية | شرايين مصر | النهار [Link]
  • KSU Professor (Professor Muhammad Khurram Khan) Delivers Invited Lecture at Information Security Forum - South Asian Pulse [Link]
  • Workshop highlights importance of high-impact R&D | Arab News [Link]
  • King Saud University Represented at 35th IEEE International Conference on Consumer Electronics at USA | News KSU [Link]
  • KSU, Taibah University team working on securing framework for digital Qur’an | Arab News [Link]
  • Cybersecurity Workshop Organized at KSU | News KSU [Link]
  • Cybersecurity Workshop Organized at KSU - BY: Munir Mohammad Hasan - South Asian Pulse [Link]
  • Workshop on Writing and Publishing High Impact Research Papers Organized at KACST | News KSU [Link]
  • Center of Excellence in Information Assurance Participated at the 2nd International Conference on C4I Solutions [Link]
  • مؤتمر عالمي: السعودية أكثر دول الشرق الأوسط عرضة للهجمات الإلكترونية [Link]
  • مؤتمر دولي يوصي بتطوير التعاون الدولي الإلكتروني لمكافحة الإرهاب [Link]
  • KSU Represented at International Symposium on Regional Security and Transnational Crime [Link]
  • Saudi delegation participates in symposium on regional security, transnational crimes | Arab News [Link]
  • KSU Professor Invited at Regional Workshop on Cybersecurity of the Sustainable Energy Sector in the GCC | KSU News [Link]
  • Prof. Khurram Invited as a Keynote Speaker at Leading IEEE International Conference | KSU News [Link]
  • Center of Excellence in Information Assurance Gets Research Fund by KACST |KSU News [Link]
  • Saudi University to Establish Biometric Security Research Laboratory | Arab News [Link]
  • Center of Excellence in Information Assurance Represented at Saudi International Exhibition and Conference for Internet of Things | KSU News [Link]
  • King Saud University Granted a United States Patent in Information Security | KSU News [Link]
  • US Patent for King Saud University Invention in Information Security | Arab News [Link]
  • Workshop on ‘Cybersecurity: Future Challenges & Network Defenses’ organized at KSU | KSU News [Link]
  • Prof. Khurram Delivered a Keynote Speech at 21st National Computer Conference | KSU News [Link]
  • Riyadh Hosts Cyber Security Conference | Arab News [Link]
  • Royal Institute of International Affairs (Chatham House UK) Invites KSU Professor | KSU News [Link]
  • Workshop Discussed Data Protection Landscape in GCC | Arab News [Link]
  • KSU Represented by Prof. Khurram as a Keynote Speaker at an International Conference | KSU News [Link]
  • KSU Represented at the 11th International Symposium on Information Processing | KSU News [Link]
  • CoEIA Represented by Prof. Khurram at the 3rd National Computing Colleges Conference | KSU News [Link]

Drop me a line

Please feel free to contact me anytime through the form below or my mailing address.