Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: John Singh K
@article{DBLP:journals/saem/RaghavanK24, author = {R. Raghavan and John Singh K}, title = {An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient's noisy fingerprint}, journal = {Int. J. Syst. Assur. Eng. Manag.}, volume = {15}, number = {1}, pages = {84--97}, year = {2024}, url = {https://doi.org/10.1007/s13198-022-01674-6}, doi = {10.1007/S13198-022-01674-6}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saem/RaghavanK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evi/RK21, author = {Raghavan R and John Singh K}, title = {A hybrid approach towards content-based image retrieval for colored images using enhanced first type of pessimistic covering based lower approximation multi-granular rough sets}, journal = {Evol. Intell.}, volume = {14}, number = {2}, pages = {1135--1143}, year = {2021}, url = {https://doi.org/10.1007/s12065-020-00563-w}, doi = {10.1007/S12065-020-00563-W}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/evi/RK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/ThakareK21, author = {Vaishali Ravindra Thakare and John Singh K}, title = {Computational trust evaluation algorithm for cloud models using fuzzy logic approach}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {38}, number = {1/2/3}, pages = {127--140}, year = {2021}, url = {https://doi.org/10.1504/IJAHUC.2021.119092}, doi = {10.1504/IJAHUC.2021.119092}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/ThakareK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijghpc/ThakareK21, author = {Vaishali Ravindra Thakare and John Singh K}, title = {A Study of Computational Trust Models in Cloud Security}, journal = {Int. J. Grid High Perform. Comput.}, volume = {13}, number = {3}, pages = {1--11}, year = {2021}, url = {https://doi.org/10.4018/IJGHPC.2021070101}, doi = {10.4018/IJGHPC.2021070101}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijghpc/ThakareK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eg/ShrimaliKS20, author = {Shubham Shrimali and Aadarsh Kumar and John Singh K}, title = {Fast hash-based high secure hiding technique for digital data security}, journal = {Electron. Gov. an Int. J.}, volume = {16}, number = {3}, pages = {326--340}, year = {2020}, url = {https://doi.org/10.1504/EG.2020.108491}, doi = {10.1504/EG.2020.108491}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eg/ShrimaliKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaip/JayanthiS19, author = {R. Jayanthi and John Singh K}, title = {Image encryption techniques for data transmission in networks: a survey}, journal = {Int. J. Adv. Intell. Paradigms}, volume = {12}, number = {1/2}, pages = {178--191}, year = {2019}, url = {https://doi.org/10.1504/IJAIP.2019.096962}, doi = {10.1504/IJAIP.2019.096962}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaip/JayanthiS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/KG18, author = {John Singh K and Kunal Gagneja}, title = {Public key cryptography using sphere and spheroid}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {21}, number = {3}, pages = {363--383}, year = {2018}, url = {https://doi.org/10.1504/IJCNDS.2018.10015057}, doi = {10.1504/IJCNDS.2018.10015057}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/KG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ThakareK18, author = {Vaishali R. Thakare and John Singh K}, title = {An efficient ternary tree-based {TGDH} protocol for dynamic secure group data sharing in cloud computing}, journal = {Int. J. Embed. Syst.}, volume = {10}, number = {4}, pages = {273--286}, year = {2018}, url = {https://doi.org/10.1504/IJES.2018.10014924}, doi = {10.1504/IJES.2018.10014924}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/ThakareK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/GK18, author = {Shynu Gopalan Padinjappurathu and John Singh K}, title = {Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing}, journal = {Int. J. Embed. Syst.}, volume = {10}, number = {4}, pages = {287--300}, year = {2018}, url = {https://doi.org/10.1504/IJES.2018.10014925}, doi = {10.1504/IJES.2018.10014925}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/GK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijris/JayanthiK18, author = {R. Jayanthi and John Singh K}, title = {Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography}, journal = {Int. J. Reason. based Intell. Syst.}, volume = {10}, number = {3/4}, pages = {279--285}, year = {2018}, url = {https://doi.org/10.1504/IJRIS.2018.096222}, doi = {10.1504/IJRIS.2018.096222}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijris/JayanthiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eg/GK17, author = {Shynu Gopalan Padinjappurathu and John Singh K}, title = {A novel temporal access control scheme for outsourced data in cloud with user revocation}, journal = {Electron. Gov. an Int. J.}, volume = {13}, number = {3}, pages = {274--286}, year = {2017}, url = {https://doi.org/10.1504/EG.2017.10006067}, doi = {10.1504/EG.2017.10006067}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eg/GK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/GK17, author = {Shynu Gopalan Padinjappurathu and John Singh K}, title = {An Enhanced {CP-ABE} based Access Control Algorithm for Point to Multi-Point Communication in Cloud Computing}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {3}, pages = {837--858}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=156\_2039}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/GK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.