Chaos-based secure satellite imagery cryptosystem M Usama, MK Khan, K Alghathbar, C Lee Computers & Mathematics with Applications 60 (2), 326-337, 2010 | 163 | 2010 |
Modified AES using chaotic key generator for satellite imagery encryption F Bin Muhaya, M Usama, MK Khan International Conference on Intelligent Computing, 1014-1024, 2009 | 36 | 2009 |
Chaos-based simultaneous compression and encryption for Hadoop M Usama, N Zakaria PloS one 12 (1), e0168207, 2017 | 23* | 2017 |
Classical and chaotic encryption techniques for the security of satellite images M Usama, MK Khan 2008 International Symposium on Biometrics and Security Technologies, 1-6, 2008 | 23 | 2008 |
An efficient construction of key-dependent substitution box based on chaotic sine map M Usama, O Rehman, I Memon, S Rizvi International Journal of Distributed Sensor Networks 15 (12), 1550147719895957, 2019 | 20 | 2019 |
An efficient secure data compression technique based on chaos and adaptive Huffman coding M Usama, QM Malluhi, N Zakaria, I Razzak, W Iqbal Peer-to-Peer Networking and Applications 14, 2651-2664, 2021 | 18 | 2021 |
Satellite image encryption for C4I System AS Alghamdi, H Ullah, MU Khan, I Ahmad, K Alnafajan International Journal of the Physical Sciences 6 (17), 4255-4263, 2011 | 10 | 2011 |
An efficient, secure, and queryable encryption for NoSQL-based databases hosted on untrusted cloud environments M Alenezi, M Usama, K Almustafa, W Iqbal, MA Raza, T Khan International Journal of Information Security and Privacy (IJISP) 13 (2), 14-31, 2019 | 6 | 2019 |
Chaos based secure storage and transmission of digital medical images F bin Muhaya, M Usama, F Akhter Appl. Math 8 (1L), 27-33, 2014 | 5 | 2014 |
Chaos-based secure data compression (CSDC) M Usama, N Zakaria 2016 3rd International Conference on Computer and Information Sciences …, 2016 | 3 | 2016 |
Framework for secure wireless communication in wireless sensor networks M Usama, FT Bin Muhaya International Journal of Distributed Sensor Networks 9 (12), 585491, 2013 | 3 | 2013 |
Satellite Imagery Security Application (SISA) M Usama, MK Khan 2008 IEEE International Multitopic Conference, 232-238, 2008 | 2 | 2008 |
Secure NoSQL Over Cloud Using Data Decomposition and Queryable Encryption MA Raza, M Usama, W Iqbal, F Bukhari Intelligent Technologies and Applications: Second International Conference …, 2020 | 1 | 2020 |
AINAN: Collaborative Application for Protein Visualization & Analyses R Malick, U Khanzada, A Abbas, W Iqbal, K Azim 2008 Ninth ACIS International Conference on Software Engineering, Artificial …, 2008 | 1 | 2008 |
CHAOS-BASED SIMULTANEOUS DATA COMPRESSION AND ENCRYPTION M USAMA Universiti Teknologi PETRONAS, 2018 | | 2018 |
Range GLS-Coding: A Scheme of Simultaneous Data Compression and Encryption M Usama, N Zakaria JOURNAL OF INFORMATICS AND MATHEMATICAL SCIENCES 8 (4), 273-279, 2016 | | 2016 |
A Generalized Framework for Biological Data Integration, Processing and Visualization RAS Malick, M Ussama, MK Azim Journal of Information Technology & Software Engin 2013, 2013 | | 2013 |
Adoption and Analysis of Security Applications to Secure Data Integrity M Usama, F bin Muhaya, F Akhter International Information Institute (Tokyo). Information 16 (5), 3025, 2013 | | 2013 |