A comprehensive survey and analysis on access control schemes in cloud environment PG Shynu, KJ Singh Cybernetics and Information Technologies 16 (1), 19-38, 2016 | 31 | 2016 |
BE AGILE: Project Development with Scrum Framework S Paul, KJ Singh Journal of Theoretical and Applied Information Technology 40 (1), 105-112, 2012 | 21 | 2012 |
Performance evaluation of chaotic encryption technique AM Babu, KJ Singh American Journal of Applied Sciences 10 (1), 35, 2013 | 18 | 2013 |
A survey on joint compression and encryption techniques for video data KJ Singh, R Manimegalai Journal of Computer Science 8 (5), 731, 2012 | 18 | 2012 |
Security Issues in Cloud Computing R Paul, M Talreja, A Sahu, KJ Singh International Journal of Computer Science and Engineering 4 (11), 1863-1867, 2012 | 17* | 2012 |
Image Encryption and Cluster Based Framework for Secured Image Transmission in Wireless Sensor Networks R Jayanthi, K John Singh Wireless Personal Communications 112 (3), 1355-1368, 2020 | 16 | 2020 |
An Enhanced ABE based Secure Access Control Scheme for E-health Clouds. PG Shynu, KJ Singh International Journal of Intelligent Engineering & Systems 10 (5), 2017 | 12 | 2017 |
Review of Digital Forensic Models and A Proposal For Operating System Level Enhancements A Joseph, KJ Singh International Journal of Computer Science and Information Security 14 (11 …, 2016 | 10 | 2016 |
Survey and analysis of security issues on RSA algorithm for digital video data K Gagneja, J Singh Journal of Discrete Mathematical Sciences and Cryptography 19 (1), 39-55, 2016 | 10 | 2016 |
Fast random bit encryption technique for video data KJ Singh, R Manimegalai European Journal of Scientific Research 64 (3), 437-445, 2011 | 10 | 2011 |
Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing PG Shynu, KJ Singh International Journal of Embedded Systems 10 (4), 287-300, 2018 | 9 | 2018 |
A case Study: Home Environment Monitoring System using Internet of Things R Raghavan, J Singh. K, T Reddy. G, S K, V P, SO Olabiyisi International Journal of Mechanical Engineering and Technology 8 (11), 173-180, 2017 | 9 | 2017 |
Architecture and Security Issues in Fog Computing Applications S Goundar, SB Bhushan, PK Rayani IGI Global, 2019 | 8 | 2019 |
Evolution of encryption techniques and data security mechanisms KJ Singh, R Manimegalai World Applied Sciences Journal 33 (10), 1597-1613, 2015 | 8 | 2015 |
An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient’s noisy fingerprint R Raghavan, K John Singh International Journal of System Assurance Engineering and Management 15 (1 …, 2024 | 7 | 2024 |
An Enhanced CP-ABE based Access Control Algorithm for Point to Multi-Point Communication in Cloud Computing. PG Shynu, K SINGH Journal of Information Science & Engineering 33 (3), 2017 | 6 | 2017 |
K, Thippa Reddy G, Sudheer K and Venkatesh P and Stephen Olatunde Olabiyisi, A Case Study: Home Environment Monitoring System using Internet of Things R Raghavan, J Singh International Journal of Mechanical Engineering and Technology 8 (11), 2017 | 5 | 2017 |
Survey on Latest Trends and Challenges in Cyber Forensics A Joseph, KJ Singh International Conference on Mechanical, Civil, Electronics & Communication …, 2016 | 5 | 2016 |
Necessity of different patterns of fingerprint and its applications: A study R Raghavan, KJ Singh International Journal of Applied Engineering Research 11 (8), 5787-5790, 2016 | 5 | 2016 |
A Survey on Latest Trends and Challenges in Cyber Forensics A Joseph, KJ Singh International Journal of Advances in Electronics and Computer Science, 75-78, 2016 | 5 | 2016 |