L. A. Khan& M.S Baig, “Reconstructing a
Class of Cipher Systems used in Wireless Digital Communications.” Proceedings
of the IEEE International Conference on Electrical Engineering, Lahore,
Pakistan, 11-12 April, 2007.
L. A. Khan, M. S. Baig& M. Ashraf, “Exploiting Silence for Ciphertext Only
reconstruction of Stream Ciphered Digitized Voice.” The 2007 International
Conference on Security and Management (SAM’07), Las Vegas, Nevada, USA, 25-28
L. A. Khan& M. S. Baig. “Cryptanalysis of
Keystream Reuse in Stream Ciphered Digitized Speech using HMM based ASR
Techniques.” International Conference on Computer Science and Applications, San
Francisco, USA, 24-26 Oct, 2007. (Best Student Paper Award)
Ashraf, M.S. Baig, L .A. Khan&
Ali Hassan, “Parallel Implementation of 2D-DWT by Purging Read After Write
Dependency for High Speed Applications.” Proceedings of the IEEE Conference on
Emerging Technologies (ICET 2007), Islamabad, Pakistan, 13-14 Nov, 2007.
L. A. Khan& M. S. Baig. “Automated
Cryptanalysis of Plaintext XORs of Waveform Encoded Speech.” IAENG
International Journal of Computer Science, Volume 35 Issue 2, pp 234-241, May,
L. A. Khan& M. S. Baig. “A Hidden Markov
Model Based Speech Recognition Approach to Automated Cryptanalysis of Two Time
Pads.” Advances in Computational
Algorithms and DataAnalysis, Lecture Notes in Electrical Engineering, Volume
14, pp 159-168, Springer, September, 2008
L. A. Khan& M. S. Baig. “A Server Based ASR
Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech.”
Proceedings of the International Conference on Information Assurance and
Security (IAS’08), pp 103-107, Naples, Italy, September, 2008.
L. A. Khan, M. S. Baig and Ali Hassan.
"Cryptanalysis of Stream Enciphered Speech Communication in a Keystream
Reuse Situation." Mehran University Research Journal of Engineering &
Technology, Vol. 29, No. 1, pp 61-78, Jan, 2010.
L. A. Khan, B. Fung, M. Debabi.
"Email Authorship Verification for Forensic Investigation." Proceedings
of the 2010 ACM Symposium on Applied Computing (SAC), pp 1591-1598, Sierre
Switzerland, March, 2010.
A. Khan, M. S.
Baig&Amr M. Youssef. "Speaker Recognition from Encrypted VoIP
Investigation Vol. 7, No. 1-2, pp 65-73, Oct, 2010.
A. Khan, F. Iqbal,
M.S. Baig. “Speaker Verification from Partially Encrypted Compressed Speech for
Forensic Investigation.” Digital Investigation Vol. 7, No. 1-2, pp 74-80, Oct,
A. Khan, M. S.
Baig& Ali Hassan. "Cryptanalysis of Two Time Pads in Case of
Compressed Speech." Computers and Electrical Engineering, Vol. 37 No. 4, pp
13. Usama Ahmed, AmmarMasood, L. A. Khan. “Quantifying the Role of
Access Control in End to End Network Security.” The 2011 International
Conference on Security and Management (SAM’11), Las Vegas, Nevada, USA, 18-21
14. Naila M. Abbassi, M. S. Baig, L. A. Khan. “Improved Trust based Key
Management for End to End Secure Communication in Cellular Netwroks.” 8th
International Conference on Security of Information and Networks, Sochi,
Russia, 8-10 Sep, 2015.
Umar Mujahid, L. A. Khan, M.
Najam-ul-Islam. “Full Disclosure Attack on
Ultralightweight Mutual Authentication Protocol: SASI.” Accepted in 10th CHAOS
2017 International Conference in CASA CONVALESCÈNCIA, Barcelona, Spain, 30
May-02 Jun, 2017.