T. Purusothaman

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2022
Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol.
Comput. Syst. Sci. Eng., 2022

2016
Hierarchical Tree Structure Based Clustering Schemes for Secure Group Communication.
Mob. Networks Appl., 2016

2015
Hybrid Broadcast Group Management Protocol for Secure, Scalable and Efficient Group Communication.
J. Comput. Sci., 2015

2014
Optimizing batch Rekeying interval for Secure Group Communication based on Queuing Model.
J. Comput. Sci., 2014

2013
Concealing party-centric sensitive rules in a centralized data source.
Int. J. Mach. Learn. Cybern., 2013

A new utility-emphasized analysis for stock trading rules.
Intell. Data Anal., 2013

2012
ESGIA: Extensible service based grid information aggregator.
Comput. Syst. Sci. Eng., 2012

2011
A generic interface for resource aggregation in grid of grids.
Int. J. Inf. Technol. Commun. Convergence, 2011

Performance analysis of a resource aggregator in a grid of grids environment.
Comput. Syst. Sci. Eng., 2011

Maximal frequent itemset generation using segmentation approach
CoRR, 2011

Secured distributed multi-agent role based access control.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011

2010
Collusion-Free Privacy Preserving Data Mining.
Int. J. Intell. Inf. Technol., 2010

Discovering Imperceptible Associations Based on Interestingness: A Utility-Oriented Data Mining.
Data Sci. J., 2010

Comparative Study of Protocols Used for Establishing VPN
CoRR, 2010

2004
Dynamically Scalable, Heterogeneous and Generic Architecture for a Grid of Workstations.
J. Grid Comput., 2004


  Loading...