Marimuthu Karuppiah
Title
Cited by
Cited by
Year
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things
X Li, J Niu, MZA Bhuiyan, F Wu, M Karuppiah, S Kumari
IEEE Transactions on Industrial Informatics 14 (8), 3599-3609, 2017
1912017
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
S Kumari, M Karuppiah, AK Das, X Li, F Wu, N Kumar
The Journal of Supercomputing 74 (12), 6428-6453, 2018
1322018
Provably secure and lightweight certificateless signature scheme for IIoT environments
A Karati, SKH Islam, M Karuppiah
IEEE Transactions on Industrial Informatics 14 (8), 3701-3711, 2018
1032018
Designing an algorithm with high Avalanche Effect
S Ramanujam, M Karuppiah
IJCSNS International Journal of Computer Science and Network Security 11 (1 …, 2011
892011
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
R Ali, AK Pal, S Kumari, M Karuppiah, M Conti
Future Generation Computer Systems 84, 200-215, 2018
832018
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
F Wu, L Xu, S Kumari, X Li, AK Das, MK Khan, M Karuppiah, R Baliyan
Security and Communication Networks 9 (16), 3527-3542, 2016
782016
Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments
A Karati, SKH Islam, GP Biswas, MZA Bhuiyan, P Vijayakumar, ...
IEEE Internet of Things Journal 5 (4), 2904-2914, 2017
712017
A secure remote user mutual authentication scheme using smart cards
M Karuppiah, R Saravanan
Journal of information security and applications 19 (4-5), 282-294, 2014
612014
An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment
S Basu, M Karuppiah, K Selvakumar, KC Li, SKH Islam, MM Hassan, ...
Future Generation Computer Systems 88, 254-261, 2018
592018
An efficient technique for preventing SQL injection attack using pattern matching algorithm
MA Prabakar, M Karthikeyan, K Marimuthu
2013 IEEE International Conference ON Emerging Trends in Computing …, 2013
542013
Secure and efficient two-factor user authentication scheme with user anonymity for network based e-health care applications
X Li, J Niu, M Karuppiah, S Kumari, F Wu
Journal of medical systems 40 (12), 1-12, 2016
482016
A secure authentication scheme with user anonymity for roaming service in global mobility networks
M Karuppiah, R Saravanan
Wireless Personal Communications 84 (3), 2055-2078, 2015
482015
Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs
K Selvakumar, M Karuppiah, L SaiRamesh, SKH Islam, MM Hassan, ...
Information Sciences 497, 77-90, 2019
452019
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity
X Li, J Peng, S Kumari, F Wu, M Karuppiah, KKR Choo
Computers & Electrical Engineering 61, 238-249, 2017
442017
A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks
M Karuppiah, S Kumari, X Li, F Wu, AK Das, MK Khan, R Saravanan, ...
Wireless Personal Communications 93 (2), 383-407, 2017
422017
An enhanced and secure trust‐extended authentication mechanism for vehicular ad‐hoc networks
S Kumari, M Karuppiah, X Li, F Wu, AK Das, V Odelu
Security and Communication Networks 9 (17), 4255-4271, 2016
412016
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server
F Wu, X Li, L Xu, S Kumari, M Karuppiah, J Shen
Computers & Electrical Engineering 63, 168-181, 2017
402017
A lightweight machine learning-based authentication framework for smart IoT devices
P Punithavathi, S Geetha, M Karuppiah, SKH Islam, MM Hassan, ...
Information Sciences 484, 255-268, 2019
372019
Comparative study of cloud platforms to develop a Chatbot
A Patil, K Marimuthu, R Niranchana
International Journal of Engineering & Technology 6 (3), 57-61, 2017
352017
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
S Kumari, M Karuppiah, AK Das, X Li, F Wu, V Gupta
Journal of Ambient Intelligence and Humanized Computing 9 (3), 643-653, 2018
332018
The system can't perform the operation now. Try again later.
Articles 1–20