John Singh K

Orcid: 0000-0002-2674-488X

According to our database1, John Singh K authored at least 14 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation.
J. Cloud Comput., December, 2024

An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient's noisy fingerprint.
Int. J. Syst. Assur. Eng. Manag., January, 2024

A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User Profiling.
IEEE Access, 2024

2021
A Study of Computational Trust Models in Cloud Security.
Int. J. Grid High Perform. Comput., 2021

Computational trust evaluation algorithm for cloud models using fuzzy logic approach.
Int. J. Ad Hoc Ubiquitous Comput., 2021

A hybrid approach towards content-based image retrieval for colored images using enhanced first type of pessimistic covering based lower approximation multi-granular rough sets.
Evol. Intell., 2021

2020
Fast hash-based high secure hiding technique for digital data security.
Electron. Gov. an Int. J., 2020

2019
Image encryption techniques for data transmission in networks: a survey.
Int. J. Adv. Intell. Paradigms, 2019

2018
Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography.
Int. J. Reason. based Intell. Syst., 2018

An efficient ternary tree-based TGDH protocol for dynamic secure group data sharing in cloud computing.
Int. J. Embed. Syst., 2018

Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing.
Int. J. Embed. Syst., 2018

Public key cryptography using sphere and spheroid.
Int. J. Commun. Networks Distributed Syst., 2018

2017
An Enhanced CP-ABE based Access Control Algorithm for Point to Multi-Point Communication in Cloud Computing.
J. Inf. Sci. Eng., 2017

A novel temporal access control scheme for outsourced data in cloud with user revocation.
Electron. Gov. an Int. J., 2017


  Loading...