Marimuthu Karuppiah

Orcid: 0000-0001-7379-2641

Affiliations:
  • VIT University, School of Computing Science and Engineering, Vellore, India


According to our database1, Marimuthu Karuppiah authored at least 59 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Secur. Priv., 2024

2023
Cryptanalysis on "a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ".
Cyber Secur. Appl., December, 2023

AI-based wavelet and stacked deep learning architecture for detecting coronavirus (COVID-19) from chest X-ray images.
Comput. Electr. Eng., May, 2023

Effective College English Teaching Based on Teacher-student Interactive Model.
ACM Trans. Asian Low Resour. Lang. Inf. Process., March, 2023

Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications.
IEEE Internet Things Mag., March, 2023

Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing.
IEEE J. Biomed. Health Informatics, February, 2023

PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023

Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to Secure IoT Devices.
J. Cyber Secur. Mobil., 2023

2022
Blockchain-based consensus algorithm for solving security issues in distributed internet of things.
Int. J. Electron. Bus., 2022

Public key encryption with equality test for Industrial Internet of Things system in cloud computing.
Trans. Emerg. Telecommun. Technol., 2022

Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system.
Comput. Commun., 2022

Efficient privacy-preserving anonymous authentication scheme for human predictive online education system.
Clust. Comput., 2022

College music education and teaching based on AI techniques.
Comput. Electr. Eng., 2022

Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd).
Comput. Electr. Eng., 2022

2021
An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks.
Wirel. Networks, 2021

BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs.
Secur. Commun. Networks, 2021

COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking.
Inf. Syst. Frontiers, 2021

Psychological Perceptual Analysis Based on Dance Therapy Using Artificial Intelligence Techniques.
Int. J. Artif. Intell. Tools, 2021

GCACS-IoD: A certificate based generic access control scheme for Internet of drones.
Comput. Networks, 2021

PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications.
IEEE Access, 2021

2020
A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things.
Int. J. Commun. Syst., 2020

Effective user preference mining-based personalised movie recommendation system.
Int. J. Comput. Aided Eng. Technol., 2020

Type-specific classification of bronchogenic carcinomas using bi-layer mutated particle swarm optimisation.
Int. J. Comput. Aided Eng. Technol., 2020

2019
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Syst. J., 2019

Security analysis on "mutual authentication scheme for multimedia medical information systems".
Secur. Priv., 2019

Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019

Bio-inspired cryptosystem with DNA cryptography and neural networks.
J. Syst. Archit., 2019

A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification.
J. Intell. Fuzzy Syst., 2019

Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs.
Inf. Sci., 2019

A lightweight machine learning-based authentication framework for smart IoT devices.
Inf. Sci., 2019

A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment.
Int. J. E Health Medical Commun., 2019

Efficient Spectrum Management Techniques for Cognitive Radio Networks for Proximity Service.
IEEE Access, 2019

Probability-Based Centralized Device for Spectrum Handoff in Cognitive Radio Networks.
IEEE Access, 2019

2018
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments.
IEEE Trans. Ind. Informatics, 2018

Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018

Modification of AES using genetic algorithms for high-definition image encryption.
Int. J. Intell. Syst. Technol. Appl., 2018

Consistent and effective energy utilisation of node model for securing data in wireless sensor networks.
Int. J. Grid Util. Comput., 2018

Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES.
Int. J. Commun. Syst., 2018

An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment.
Future Gener. Comput. Syst., 2018

A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring.
Future Gener. Comput. Syst., 2018

Introduction to the special section on Big data and IoT in e-healthcare.
Comput. Electr. Eng., 2018

2017
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

Wireless and Mobile Networks: Security and Privacy Issues.
J. Electr. Comput. Eng., 2017

An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion.
Int. J. Imaging Syst. Technol., 2017

A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Comput. Electr. Eng., 2017

An efficient secure communication for healthcare system using wearable devices.
Comput. Electr. Eng., 2017

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017

Security on "A Lightweight Authentication Scheme with User Untraceability".
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities".
Proceedings of the Mathematics and Computing - Third International Conference, 2017

2016
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016

An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Secur. Commun. Networks, 2016

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Secur. Commun. Networks, 2016

Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
J. Medical Syst., 2016

Remote user authentication scheme using smart card: a review.
Int. J. Internet Protoc. Technol., 2016

2015
A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2015

2014
A secure remote user mutual authentication scheme using smart cards.
J. Inf. Secur. Appl., 2014


  Loading...