P. Vijayakumar
P. Vijayakumar
Assistant Professor, Computer Science & Engineering, Anna University
Verified email at aucet.in
Cited by
Cited by
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
P Vijayakumar, M Azees, A Kannan, L Jegatha Deborah
IEEE Transactions on Intelligent Transportation Systems 17 (4), 1015 - 1028, 2016
EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks
M Azees, P Vijayakumar, LJ Deboarh
IEEE Transactions on Intelligent Transportation Systems 18 (9), 2467-2476, 2017
Comprehensive survey on security services in vehicular ad-hoc networks
M Azees, P Vijayakumar, LJ Deborah
IET Intelligent Transport Systems 10 (6), 379-388, 2016
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks
P Vijayakumar, V Chang, LJ Deborah, B Balusamy, PG Shynu
Future generation computer systems 78, 943-955, 2018
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs
SKH Islam, MS Obaidat, P Vijayakumar, E Abdulhay, F Li, MKC Reddy
Future Generation Computer Systems 84, 216-227, 2018
Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments
A Karati, SKH Islam, GP Biswas, MZA Bhuiyan, P Vijayakumar, ...
IEEE Internet of Things Journal 5 (4), 2904-2914, 2017
Chinese remainder theorem based centralised group key management for secure multicast communication
P Vijayakumar, S Bose, A Kannan
IET information Security 8 (3), 179-187, 2014
Centralized key distribution protocol using the greatest common divisor method
P Vijayakumar, S Bose, A Kannan
Computers & Mathematics with Applications 65 (9), 1360-1368, 2013
An intelligent temporal pattern classification system using fuzzy temporal rules and particle swarm optimization
S Ganapathy, R Sethukkarasi, P Yogesh, P Vijayakumar, A Kannan
Sadhana 39 (2), 283-302, 2014
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks
P Vijayakumar, M Azees, V Chang, J Deborah, B Balusamy
cluster computing 20 (3), 2439-2450, 2017
An Intelligent CRF Based Feature Selection for Effective Intrusion Detection.
S Ganapathy, P Vijayakumar, P Yogesh, A Kannan
International Arab Journal of Information Technology (IAJIT) 13 (1), 2016
Fuzzy-logic based learning style prediction in e-learning using web interface information
L Jegatha Deborah, R Sathiyaseelan, S Audithan, P Vijayakumar
Sadhana Academy Proceedings in Engineering Sciences 40 (2), 379-394, 2015
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
D Mishra, P Vijayakumar, V Sureshkumar, R Amin, SKH Islam, P Gope
Multimedia Tools and Applications 77 (14), 18295-18325, 2018
Time efficient secure DNA based access control model for cloud computing environment
S Namasudra, P Roy, P Vijayakumar, S Audithan, B Balusamy
Future Generation Computer Systems 73, 90-105, 2017
A provably secure password-based anonymous authentication scheme for wireless body area networks
F Wei, P Vijayakumar, J Shen, R Zhang, L Li
Computers & Electrical Engineering 65, 322-331, 2018
Rotation based secure multicast key management for batch rekeying operations
P Vijayakumar, S Bose, A Kannan
Networking Science 1 (1-4), 39-47, 2012
An efficient secure communication for healthcare system using wearable devices
P Vijayakumar, P Pandiaraja, M Karuppiah, LJ Deborah
Computers & Electrical Engineering 63, 232-245, 2017
A secure key distribution protocol for multicast communication
P Vijayakumar, S Bose, A Kannan, SS Subramanian
International Conference on Logic, Information, Control and Computation, 249-257, 2011
An efficient group key agreement protocol for secure P2P communication
P Vijayakumar, R Naresh, L Jegatha Deborah, SK Hafizul Islam
Security and Communication Networks 9 (17), 3952-3965, 2016
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
P Vijayakumar, S Bose, A Kannan, L Jegatha Deborah
KSII Transactions on Internet & Information Systems 7 (4), 2013
The system can't perform the operation now. Try again later.
Articles 1–20