Marimuthu Karuppiah

According to our database1, Marimuthu Karuppiah authored at least 40 papers between 2014 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:



Lung cancer prediction using higher-order recurrent neural network based on glowworm swarm optimization.
Neural Comput. Appl., 2020

A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things.
Int. J. Commun. Syst., 2020

Effective user preference mining-based personalised movie recommendation system.
Int. J. Comput. Aided Eng. Technol., 2020

Type-specific classification of bronchogenic carcinomas using bi-layer mutated particle swarm optimisation.
Int. J. Comput. Aided Eng. Technol., 2020

A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Syst. J., 2019

Security analysis on "mutual authentication scheme for multimedia medical information systems".
Secur. Priv., 2019

Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019

Bio-inspired cryptosystem with DNA cryptography and neural networks.
J. Syst. Archit., 2019

A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification.
J. Intell. Fuzzy Syst., 2019

Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs.
Inf. Sci., 2019

A lightweight machine learning-based authentication framework for smart IoT devices.
Inf. Sci., 2019

A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment.
Int. J. E Health Medical Commun., 2019

Efficient Spectrum Management Techniques for Cognitive Radio Networks for Proximity Service.
IEEE Access, 2019

Probability-Based Centralized Device for Spectrum Handoff in Cognitive Radio Networks.
IEEE Access, 2019

A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments.
IEEE Trans. Ind. Informatics, 2018

Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018

Modification of AES using genetic algorithms for high-definition image encryption.
Int. J. Intell. Syst. Technol. Appl., 2018

Consistent and effective energy utilisation of node model for securing data in wireless sensor networks.
Int. J. Grid Util. Comput., 2018

Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES.
Int. J. Commun. Syst., 2018

An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment.
Future Gener. Comput. Syst., 2018

A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring.
Future Gener. Comput. Syst., 2018

Introduction to the special section on Big data and IoT in e-healthcare.
Comput. Electr. Eng., 2018

A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

Wireless and Mobile Networks: Security and Privacy Issues.
J. Electr. Comput. Eng., 2017

An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion.
Int. J. Imaging Syst. Technol., 2017

A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Comput. Electr. Eng., 2017

An efficient secure communication for healthcare system using wearable devices.
Comput. Electr. Eng., 2017

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017

Security on "A Lightweight Authentication Scheme with User Untraceability".
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities".
Proceedings of the Mathematics and Computing - Third International Conference, 2017

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016

An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Secur. Commun. Networks, 2016

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Secur. Commun. Networks, 2016

Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
J. Medical Syst., 2016

Remote user authentication scheme using smart card: a review.
Int. J. Internet Protoc. Technol., 2016

A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2015

A secure remote user mutual authentication scheme using smart cards.
J. Inf. Secur. Appl., 2014