BibTeX records: John Singh K

download as .bib file

@article{DBLP:journals/saem/RaghavanK24,
  author       = {R. Raghavan and
                  John Singh K},
  title        = {An enhanced and hybrid fingerprint minutiae feature extraction method
                  for identifying and authenticating the patient's noisy fingerprint},
  journal      = {Int. J. Syst. Assur. Eng. Manag.},
  volume       = {15},
  number       = {1},
  pages        = {84--97},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13198-022-01674-6},
  doi          = {10.1007/S13198-022-01674-6},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saem/RaghavanK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evi/RK21,
  author       = {Raghavan R and
                  John Singh K},
  title        = {A hybrid approach towards content-based image retrieval for colored
                  images using enhanced first type of pessimistic covering based lower
                  approximation multi-granular rough sets},
  journal      = {Evol. Intell.},
  volume       = {14},
  number       = {2},
  pages        = {1135--1143},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12065-020-00563-w},
  doi          = {10.1007/S12065-020-00563-W},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/evi/RK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/ThakareK21,
  author       = {Vaishali Ravindra Thakare and
                  John Singh K},
  title        = {Computational trust evaluation algorithm for cloud models using fuzzy
                  logic approach},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {38},
  number       = {1/2/3},
  pages        = {127--140},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJAHUC.2021.119092},
  doi          = {10.1504/IJAHUC.2021.119092},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/ThakareK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijghpc/ThakareK21,
  author       = {Vaishali Ravindra Thakare and
                  John Singh K},
  title        = {A Study of Computational Trust Models in Cloud Security},
  journal      = {Int. J. Grid High Perform. Comput.},
  volume       = {13},
  number       = {3},
  pages        = {1--11},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJGHPC.2021070101},
  doi          = {10.4018/IJGHPC.2021070101},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijghpc/ThakareK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eg/ShrimaliKS20,
  author       = {Shubham Shrimali and
                  Aadarsh Kumar and
                  John Singh K},
  title        = {Fast hash-based high secure hiding technique for digital data security},
  journal      = {Electron. Gov. an Int. J.},
  volume       = {16},
  number       = {3},
  pages        = {326--340},
  year         = {2020},
  url          = {https://doi.org/10.1504/EG.2020.108491},
  doi          = {10.1504/EG.2020.108491},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eg/ShrimaliKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaip/JayanthiS19,
  author       = {R. Jayanthi and
                  John Singh K},
  title        = {Image encryption techniques for data transmission in networks: a survey},
  journal      = {Int. J. Adv. Intell. Paradigms},
  volume       = {12},
  number       = {1/2},
  pages        = {178--191},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJAIP.2019.096962},
  doi          = {10.1504/IJAIP.2019.096962},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaip/JayanthiS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/KG18,
  author       = {John Singh K and
                  Kunal Gagneja},
  title        = {Public key cryptography using sphere and spheroid},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {21},
  number       = {3},
  pages        = {363--383},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJCNDS.2018.10015057},
  doi          = {10.1504/IJCNDS.2018.10015057},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/KG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ThakareK18,
  author       = {Vaishali R. Thakare and
                  John Singh K},
  title        = {An efficient ternary tree-based {TGDH} protocol for dynamic secure
                  group data sharing in cloud computing},
  journal      = {Int. J. Embed. Syst.},
  volume       = {10},
  number       = {4},
  pages        = {273--286},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJES.2018.10014924},
  doi          = {10.1504/IJES.2018.10014924},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/ThakareK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/GK18,
  author       = {Shynu Gopalan Padinjappurathu and
                  John Singh K},
  title        = {Privacy preserving secret key extraction protocol for multi-authority
                  attribute-based encryption techniques in cloud computing},
  journal      = {Int. J. Embed. Syst.},
  volume       = {10},
  number       = {4},
  pages        = {287--300},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJES.2018.10014925},
  doi          = {10.1504/IJES.2018.10014925},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/GK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijris/JayanthiK18,
  author       = {R. Jayanthi and
                  John Singh K},
  title        = {Encrypted image-based data hiding technique using elliptic curve ElGamal
                  cryptography},
  journal      = {Int. J. Reason. based Intell. Syst.},
  volume       = {10},
  number       = {3/4},
  pages        = {279--285},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJRIS.2018.096222},
  doi          = {10.1504/IJRIS.2018.096222},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijris/JayanthiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eg/GK17,
  author       = {Shynu Gopalan Padinjappurathu and
                  John Singh K},
  title        = {A novel temporal access control scheme for outsourced data in cloud
                  with user revocation},
  journal      = {Electron. Gov. an Int. J.},
  volume       = {13},
  number       = {3},
  pages        = {274--286},
  year         = {2017},
  url          = {https://doi.org/10.1504/EG.2017.10006067},
  doi          = {10.1504/EG.2017.10006067},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eg/GK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/GK17,
  author       = {Shynu Gopalan Padinjappurathu and
                  John Singh K},
  title        = {An Enhanced {CP-ABE} based Access Control Algorithm for Point to Multi-Point
                  Communication in Cloud Computing},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {3},
  pages        = {837--858},
  year         = {2017},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=156\_2039},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/GK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics