Marimuthu Karuppiah
Orcid: 0000-0001-7379-2641Affiliations:
- VIT University, School of Computing Science and Engineering, Vellore, India
According to our database1,
Marimuthu Karuppiah
authored at least 63 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Hybrid CMOS Memristor Based Biometric OBU Authentication and Anonymous Mutual Authentication for Secure Communication in Fog-Based VANETs.
IEEE Trans. Intell. Transp. Syst., September, 2024
J. Intell. Inf. Syst., June, 2024
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Secur. Priv., 2024
Bioinspired molecular communications system for targeted drug delivery with IoBNT-based sustainable biocyber interface.
Comput. Electr. Eng., 2024
2023
Cryptanalysis on "a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ".
Cyber Secur. Appl., December, 2023
AI-based wavelet and stacked deep learning architecture for detecting coronavirus (COVID-19) from chest X-ray images.
Comput. Electr. Eng., May, 2023
An SOA-RBFNN approach for the system modelling of optimal energy management in grid-connected smart grid system.
Artif. Intell. Rev., May, 2023
ACM Trans. Asian Low Resour. Lang. Inf. Process., March, 2023
Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications.
IEEE Internet Things Mag., March, 2023
Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing.
IEEE J. Biomed. Health Informatics, February, 2023
PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023
Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to Secure IoT Devices.
J. Cyber Secur. Mobil., 2023
2022
Blockchain-based consensus algorithm for solving security issues in distributed internet of things.
Int. J. Electron. Bus., 2022
Public key encryption with equality test for Industrial Internet of Things system in cloud computing.
Trans. Emerg. Telecommun. Technol., 2022
Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system.
Comput. Commun., 2022
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system.
Clust. Comput., 2022
Comput. Electr. Eng., 2022
Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd).
Comput. Electr. Eng., 2022
2021
An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks.
Wirel. Networks, 2021
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs.
Secur. Commun. Networks, 2021
COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking.
Inf. Syst. Frontiers, 2021
Psychological Perceptual Analysis Based on Dance Therapy Using Artificial Intelligence Techniques.
Int. J. Artif. Intell. Tools, 2021
Comput. Networks, 2021
PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications.
IEEE Access, 2021
2020
A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things.
Int. J. Commun. Syst., 2020
Int. J. Comput. Aided Eng. Technol., 2020
Type-specific classification of bronchogenic carcinomas using bi-layer mutated particle swarm optimisation.
Int. J. Comput. Aided Eng. Technol., 2020
2019
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Syst. J., 2019
Security analysis on "mutual authentication scheme for multimedia medical information systems".
Secur. Priv., 2019
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019
J. Syst. Archit., 2019
A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification.
J. Intell. Fuzzy Syst., 2019
Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs.
Inf. Sci., 2019
Inf. Sci., 2019
A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment.
Int. J. E Health Medical Commun., 2019
Efficient Spectrum Management Techniques for Cognitive Radio Networks for Proximity Service.
IEEE Access, 2019
Probability-Based Centralized Device for Spectrum Handoff in Cognitive Radio Networks.
IEEE Access, 2019
2018
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments.
IEEE Trans. Ind. Informatics, 2018
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018
Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018
Int. J. Intell. Syst. Technol. Appl., 2018
Consistent and effective energy utilisation of node model for securing data in wireless sensor networks.
Int. J. Grid Util. Comput., 2018
Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES.
Int. J. Commun. Syst., 2018
An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment.
Future Gener. Comput. Syst., 2018
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring.
Future Gener. Comput. Syst., 2018
Comput. Electr. Eng., 2018
2017
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
J. Electr. Comput. Eng., 2017
Int. J. Imaging Syst. Technol., 2017
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Comput. Electr. Eng., 2017
Comput. Electr. Eng., 2017
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities".
Proceedings of the Mathematics and Computing - Third International Conference, 2017
2016
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Secur. Commun. Networks, 2016
A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Secur. Commun. Networks, 2016
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
J. Medical Syst., 2016
Int. J. Internet Protoc. Technol., 2016
2015
A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2015
2014
J. Inf. Secur. Appl., 2014