Login / Signup
John Singh K
ORCID
Publication Activity (10 Years)
Years Active: 2017-2024
Publications (10 Years): 14
Top Topics
Privacy Preserving
Public Key Cryptography
Cloud Computing
Data Hiding
Top Venues
Int. J. Embed. Syst.
Electron. Gov. an Int. J.
J. Inf. Sci. Eng.
Int. J. Reason. based Intell. Syst.
</>
Publications
</>
R. Raghavan
,
John Singh K
An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient's noisy fingerprint.
Int. J. Syst. Assur. Eng. Manag.
15 (1) (2024)
Jomina John
,
John Singh K
Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation.
J. Cloud Comput.
13 (1) (2024)
S. Ayeswarya
,
John Singh K
A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User Profiling.
IEEE Access
12 (2024)
Raghavan R
,
John Singh K
A hybrid approach towards content-based image retrieval for colored images using enhanced first type of pessimistic covering based lower approximation multi-granular rough sets.
Evol. Intell.
14 (2) (2021)
Vaishali Ravindra Thakare
,
John Singh K
Computational trust evaluation algorithm for cloud models using fuzzy logic approach.
Int. J. Ad Hoc Ubiquitous Comput.
38 (1/2/3) (2021)
Vaishali Ravindra Thakare
,
John Singh K
A Study of Computational Trust Models in Cloud Security.
Int. J. Grid High Perform. Comput.
13 (3) (2021)
Shubham Shrimali
,
Aadarsh Kumar
,
John Singh K
Fast hash-based high secure hiding technique for digital data security.
Electron. Gov. an Int. J.
16 (3) (2020)
R. Jayanthi
,
John Singh K
Image encryption techniques for data transmission in networks: a survey.
Int. J. Adv. Intell. Paradigms
12 (1/2) (2019)
Shynu Gopalan Padinjappurathu
,
John Singh K
Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing.
Int. J. Embed. Syst.
10 (4) (2018)
R. Jayanthi
,
John Singh K
Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography.
Int. J. Reason. based Intell. Syst.
10 (3/4) (2018)
Vaishali R. Thakare
,
John Singh K
An efficient ternary tree-based TGDH protocol for dynamic secure group data sharing in cloud computing.
Int. J. Embed. Syst.
10 (4) (2018)
John Singh K
,
Kunal Gagneja
Public key cryptography using sphere and spheroid.
Int. J. Commun. Networks Distributed Syst.
21 (3) (2018)
Shynu Gopalan Padinjappurathu
,
John Singh K
A novel temporal access control scheme for outsourced data in cloud with user revocation.
Electron. Gov. an Int. J.
13 (3) (2017)
Shynu Gopalan Padinjappurathu
,
John Singh K
An Enhanced CP-ABE based Access Control Algorithm for Point to Multi-Point Communication in Cloud Computing.
J. Inf. Sci. Eng.
33 (3) (2017)