Balamurugan Balusamy
Balamurugan Balusamy
Verified email at galgotiasuniversity.edu.in - Homepage
Title
Cited by
Cited by
Year
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks
P Vijayakumar, V Chang, LJ Deborah, B Balusamy, PG Shynu
Future generation computer systems 78, 943-955, 2018
1022018
Securing e-health records using keyless signature infrastructure blockchain technology in the cloud
G Nagasubramanian, RK Sakthivel, R Patan, AH Gandomi, M Sankayya, ...
Neural Computing and Applications, 1-9, 2018
642018
Time efficient secure DNA based access control model for cloud computing environment
S Namasudra, P Roy, P Vijayakumar, S Audithan, B Balusamy
Future Generation Computer Systems 73, 90-105, 2017
632017
Securing data in Internet of Things (IoT) using cryptography and steganography techniques
M Khari, AK Garg, AH Gandomi, R Gupta, R Patan, B Balusamy
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (1), 73-80, 2019
572019
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks
P Vijayakumar, M Azees, V Chang, J Deborah, B Balusamy
cluster computing 20 (3), 2439-2450, 2017
422017
An intelligent approach for UAV and drone privacy security using blockchain methodology
T Rana, A Shankar, MK Sultan, R Patan, B Balusamy
2019 9th International Conference on Cloud Computing, Data Science …, 2019
382019
Cloud computing: fundamentals and research issues
S Namasudra, P Roy, B Balusamy
2017 Second International Conference on Recent Trends and Challenges in …, 2017
382017
Energy-aware hybrid fruitfly optimization for load balancing in cloud environments for EHR applications
M Lawanyashri, B Balusamy, S Subha
Informatics in Medicine Unlocked 8, 42-50, 2017
352017
A novel performance enhancing task scheduling algorithm for Cloud-based E-health environment
V Pandi, P Perumal, B Balusamy, M Karuppiah
International Journal of E-Health and Medical Communications (IJEHMC) 10 (2 …, 2019
302019
Data accessing based on the popularity value for cloud computing
S Namasudra, P Roy, B Balusamy, P Vijayakumar
2017 International Conference on Innovations in Information, Embedded and …, 2017
242017
Extensive survey on usage of attribute based encryption in cloud
B Balamurugan, PV Krishna
journal of emerging technologies in web intelligence 6 (3), 263-272, 2014
242014
An evolutionary SVM model for DDOS attack detection in software defined networks
KS Sahoo, BK Tripathy, K Naik, S Ramasubbareddy, B Balusamy, M Khari, ...
IEEE Access 8, 132502-132513, 2020
212020
A provably secure three-factor session initiation protocol for multimedia big data communications
SKH Islam, P Vijayakumar, MZA Bhuiyan, R Amin, B Balusamy
IEEE Internet of Things Journal 5 (5), 3408-3418, 2017
192017
Bio-inspired algorithms for cloud computing: a review
B Balusamy, J Sridhar, D Dhamodaran, PV Krishna
International Journal of Innovative Computing and Applications 6 (3-4), 181-202, 2015
192015
Improving end-users utility in software-defined wide area network systems
KS Sahoo, P Mishra, M Tiwary, S Ramasubbareddy, B Balusamy, ...
IEEE Transactions on Network and Service Management 17 (2), 696-707, 2019
182019
Robust defense scheme against selective drop attack in wireless ad hoc networks
T Poongodi, MS Khan, R Patan, AH Gandomi, B Balusamy
IEEE access 7, 18409-18419, 2019
172019
Wearable devices and IoT
T Poongodi, R Krishnamurthi, R Indrakumari, P Suresh, B Balusamy
A handbook of Internet of Things in biomedical and cyber physical system …, 2020
152020
Enhanced role-based access control for cloud security
B Balamurugan, PV Krishna
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems …, 2015
142015
Students university healthy lifestyle practice: quantitative analysis
I Assaf, F Brieteh, M Tfaily, M El-Baida, S Kadry, B Balusamy
Health information science and systems 7 (1), 1-12, 2019
132019
A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System.
B Balusamy, PV Krishna, GST Arasi, V Chang
IJ Network Security 19 (4), 559-572, 2017
132017
The system can't perform the operation now. Try again later.
Articles 1–20