Search Results - "Mathew K, Preetha"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Secure query processing and optimization in cloud environment: a review by VL, Divya, PA, Job, Mathew K, Preetha

    Published in Information security journal. (03-03-2024)
    “…Cloud computing is trusted and used by millions of users around the world. Therefore, it becomes essential to offer trusted and efficient services to its…”
    Get full text
    Journal Article
  2. 2

    A broad review on non-intrusive active user authentication in biometrics by Thomas, Princy Ann, Preetha Mathew, K.

    “…Authentication is the process of keeping the user’s personal information as confidential in digital applications. Moreover, the user authentication process in…”
    Get full text
    Journal Article
  3. 3

    An Efficient Optimized Mouse and Keystroke Dynamics Framework for Continuous Non-Intrusive User Authentication by Thomas, Princy Ann, Mathew, K. Preetha

    Published in Wireless personal communications (01-05-2022)
    “…In recent years, user authentication based on mouse and keystroke dynamic is the most wanted topic to identify the external user and to secure information…”
    Get full text
    Journal Article
  4. 4

    Fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography by Jayaprabha, P., Paulose Jacob, K., Preetha Mathew, K.

    Published in Soft computing (Berlin, Germany) (01-04-2021)
    “…Sharing data via social media may affect the privacy of other user’s in social media. Also, multiparty privacy management is absent in social media, which…”
    Get full text
    Journal Article