Search Results - "Mathew K, Preetha"
-
1
Secure query processing and optimization in cloud environment: a review
Published in Information security journal. (03-03-2024)“…Cloud computing is trusted and used by millions of users around the world. Therefore, it becomes essential to offer trusted and efficient services to its…”
Get full text
Journal Article -
2
A broad review on non-intrusive active user authentication in biometrics
Published in Journal of ambient intelligence and humanized computing (2023)“…Authentication is the process of keeping the user’s personal information as confidential in digital applications. Moreover, the user authentication process in…”
Get full text
Journal Article -
3
An Efficient Optimized Mouse and Keystroke Dynamics Framework for Continuous Non-Intrusive User Authentication
Published in Wireless personal communications (01-05-2022)“…In recent years, user authentication based on mouse and keystroke dynamic is the most wanted topic to identify the external user and to secure information…”
Get full text
Journal Article -
4
Fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography
Published in Soft computing (Berlin, Germany) (01-04-2021)“…Sharing data via social media may affect the privacy of other user’s in social media. Also, multiparty privacy management is absent in social media, which…”
Get full text
Journal Article