Follow
Dr. John Singh K
Dr. John Singh K
Professor, School of CSE and Information Systems, Vellore Institute of Technology, Vellore
Verified email at vit.ac.in - Homepage
Title
Cited by
Cited by
Year
A comprehensive survey and analysis on access control schemes in cloud environment
PG Shynu, KJ Singh
Cybernetics and Information Technologies 16 (1), 19-38, 2016
312016
BE AGILE: Project Development with Scrum Framework
S Paul, KJ Singh
Journal of Theoretical and Applied Information Technology 40 (1), 105-112, 2012
212012
Performance evaluation of chaotic encryption technique
AM Babu, KJ Singh
American Journal of Applied Sciences 10 (1), 35, 2013
182013
A survey on joint compression and encryption techniques for video data
KJ Singh, R Manimegalai
Journal of Computer Science 8 (5), 731, 2012
182012
Security Issues in Cloud Computing
R Paul, M Talreja, A Sahu, KJ Singh
International Journal of Computer Science and Engineering 4 (11), 1863-1867, 2012
17*2012
Image Encryption and Cluster Based Framework for Secured Image Transmission in Wireless Sensor Networks
R Jayanthi, K John Singh
Wireless Personal Communications 112 (3), 1355-1368, 2020
162020
An Enhanced ABE based Secure Access Control Scheme for E-health Clouds.
PG Shynu, KJ Singh
International Journal of Intelligent Engineering & Systems 10 (5), 2017
122017
Review of Digital Forensic Models and A Proposal For Operating System Level Enhancements
A Joseph, KJ Singh
International Journal of Computer Science and Information Security 14 (11 …, 2016
102016
Survey and analysis of security issues on RSA algorithm for digital video data
K Gagneja, J Singh
Journal of Discrete Mathematical Sciences and Cryptography 19 (1), 39-55, 2016
102016
Fast random bit encryption technique for video data
KJ Singh, R Manimegalai
European Journal of Scientific Research 64 (3), 437-445, 2011
102011
Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing
PG Shynu, KJ Singh
International Journal of Embedded Systems 10 (4), 287-300, 2018
92018
A case Study: Home Environment Monitoring System using Internet of Things
R Raghavan, J Singh. K, T Reddy. G, S K, V P, SO Olabiyisi
International Journal of Mechanical Engineering and Technology 8 (11), 173-180, 2017
92017
Architecture and Security Issues in Fog Computing Applications
S Goundar, SB Bhushan, PK Rayani
IGI Global, 2019
82019
Evolution of encryption techniques and data security mechanisms
KJ Singh, R Manimegalai
World Applied Sciences Journal 33 (10), 1597-1613, 2015
82015
An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient’s noisy fingerprint
R Raghavan, K John Singh
International Journal of System Assurance Engineering and Management 15 (1 …, 2024
72024
An Enhanced CP-ABE based Access Control Algorithm for Point to Multi-Point Communication in Cloud Computing.
PG Shynu, K SINGH
Journal of Information Science & Engineering 33 (3), 2017
62017
K, Thippa Reddy G, Sudheer K and Venkatesh P and Stephen Olatunde Olabiyisi, A Case Study: Home Environment Monitoring System using Internet of Things
R Raghavan, J Singh
International Journal of Mechanical Engineering and Technology 8 (11), 2017
52017
Survey on Latest Trends and Challenges in Cyber Forensics
A Joseph, KJ Singh
International Conference on Mechanical, Civil, Electronics & Communication …, 2016
52016
Necessity of different patterns of fingerprint and its applications: A study
R Raghavan, KJ Singh
International Journal of Applied Engineering Research 11 (8), 5787-5790, 2016
52016
A Survey on Latest Trends and Challenges in Cyber Forensics
A Joseph, KJ Singh
International Journal of Advances in Electronics and Computer Science, 75-78, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20