Follow
Dr. John Singh K
Dr. John Singh K
Professor, School of CSE and Information Systems, Vellore Institute of Technology, Vellore
Verified email at vit.ac.in - Homepage
Title
Cited by
Cited by
Year
A comprehensive survey and analysis on access control schemes in cloud environment
PG Shynu, KJ Singh
Cybernetics and Information Technologies 16 (1), 19-38, 2016
282016
BE AGILE: Project Development with Scrum Framework
S Paul, KJ Singh
Journal of Theoretical and Applied Information Technology 40 (1), 105-112, 2012
212012
Performance evaluation of chaotic encryption technique
AM Babu, KJ Singh
American Journal of Applied Sciences 10 (1), 35, 2013
192013
A survey on joint compression and encryption techniques for video data
KJ Singh, R Manimegalai
Journal of Computer Science 8 (5), 731, 2012
182012
Image Encryption and Cluster Based Framework for Secured Image Transmission in Wireless Sensor Networks
R Jayanthi, K John Singh
Wireless Personal Communications 112 (3), 1355-1368, 2020
152020
Security Issues in Cloud Computing
R Paul, M Talreja, A Sahu, KJ Singh
International Journal of Computer Science and Engineering 4 (11), 1863-1867, 2012
13*2012
An Enhanced ABE based Secure Access Control Scheme for E-health Clouds.
PG Shynu, KJ Singh
International Journal of Intelligent Engineering & Systems 10 (5), 2017
102017
Survey and analysis of security issues on RSA algorithm for digital video data
K Gagneja, J Singh
Journal of Discrete Mathematical Sciences and Cryptography 19 (1), 39-55, 2016
102016
Fast random bit encryption technique for video data
KJ Singh, R Manimegalai
European Journal of Scientific Research 64 (3), 437-445, 2011
102011
Architecture and Security Issues in Fog Computing Applications
S Goundar, SB Bhushan, PK Rayani
IGI Global, 2019
82019
Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing
PG Shynu, KJ Singh
International Journal of Embedded Systems 10 (4), 287-300, 2018
82018
Review of Digital Forensic Models and A Proposal For Operating System Level Enhancements
A Joseph, KJ Singh
International Journal of Computer Science and Information Security 14 (11 …, 2016
82016
A case Study: Home Environment Monitoring System using Internet of Things
R Raghavan, J Singh. K, T Reddy. G, S K, V P, SO Olabiyisi
International Journal of Mechanical Engineering and Technology 8 (11), 173-180, 2017
72017
Evolution of encryption techniques and data security mechanisms
KJ Singh, R Manimegalai
World Applied Sciences Journal 33 (10), 1597-1613, 2015
62015
An Enhanced CP-ABE based Access Control Algorithm for Point to Multi-Point Communication in Cloud Computing.
PG Shynu, K SINGH
Journal of Information Science & Engineering 33 (3), 2017
52017
K, Thippa Reddy G, Sudheer K and Venkatesh P and Stephen Olatunde Olabiyisi, A Case Study: Home Environment Monitoring System using Internet of Things
R Raghavan, J Singh
International Journal of Mechanical Engineering and Technology 8 (11), 2017
52017
Survey on Latest Trends and Challenges in Cyber Forensics
A Joseph, KJ Singh
International Conference on Mechanical, Civil, Electronics & Communication …, 2016
52016
A Survey on Latest Trends and Challenges in Cyber Forensics
A Joseph, KJ Singh
International Journal of Advances in Electronics and Computer Science, 75-78, 2016
52016
A study of computational trust models in cloud security
VR Thakare, J Singh
International Journal of Grid and High Performance Computing (IJGHPC) 13 (3 …, 2021
42021
Cloud Security Architecture Based on Fully Homomorphic Encryption
VR Thakare, KJ Singh
IGI Global Publications, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20