K. Preetha Mathew
According to our database1,
K. Preetha Mathew
authored at least 14 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Feature ranking for effective continuous user authentication using keystroke and mouse dynamics with the cat recurrent neural model.
Int. J. Biom., 2025
2024
Inf. Secur. J. A Glob. Perspect., March, 2024
ResNet152: A Deep Learning Approach for Robust Spoof Detection in Speaker Verification Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2024
2023
J. Ambient Intell. Humaniz. Comput., 2023
2022
An Efficient Optimized Mouse and Keystroke Dynamics Framework for Continuous Non-Intrusive User Authentication.
Wirel. Pers. Commun., 2022
Multi-objective Scheduling Policy for Workflow Applications in Cloud Using Hybrid Particle Search and Rescue Algorithm.
Serv. Oriented Comput. Appl., 2022
2021
Webology, 2021
Fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography.
Soft Comput., 2021
An effective meta-heuristic based multi-objective hybrid optimization method for workflow scheduling in cloud computing environment.
Clust. Comput., 2021
2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Practice and Experience, 2012
An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012