Publications




Sl.No Publication Detail Year
1 Hybrid Broadcast Group Management Protocol for Secure, Scalable and Efficient Group Communication, M Sayee Kumar, T Purusothaman, Journal of Computer Science 11 (2), 344 2015
2 Hierarchical Tree Structure Based Clustering Schemes for Secure Group Communication, SJ Begum, T Purusothaman,Mobile Networks and Applications, 1-11 2015
3 Optimizing batch rekeying interval for secure group communication based on queuing model,A Vasanthi, T Purusothaman, Journal of Computer Science 10 (2), 325 2014
4 Certain investigations on scheduling Algorithms in computational grid With economic and deadline Considerations, T Purusothaman 2014
5 INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS, A Vasanthi, T Purusothaman 2014
6 USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME., V RAJENDRAN, T PURUSOTHAMAN, Journal of Theoretical & Applied Information Technology 56 (1) 2013
7 Concealing party-centric sensitive rules in a centralized data source,M Rajalakshmi, T Purusothaman, International Journal of Machine Learning and Cybernetics 4 (5), 515-525 2013
8 A new utility-emphasized analysis for stock trading rules, S Shankar, T Purusothaman, Intelligent Data Analysis 17 (2), 271-294 2013
9 A Performance Analysis on Cluster Based Group Key Management Schemes in Multicast Network, NMS Kumar, T Purusothaman, S Lavanya, Archives Des Sciences 66 (2) 2013
10 An Efficient Routing Protocol for Wireless Sensor Networks, K KE, T PURUSOTHAMAN, Life Science Journal 10 (2) 2013
11 New interest propagation mechanism in directed diffusion protocol for mobile sensor networks,KE Kannammal, T Purusothaman,Eur J Sci Res 68 (1), 36-42 2012
12 SEGKMS: Scalable and Efficient Group Key Management Scheme in Multicast Networks,NMS Kumar, T Purusothaman,European Journal of Scientific Research 89 (3), 394-408 2012
13 IPSD: new coverage preserving and connectivity maintenance scheme for improving lifetime of wireless sensor networks,A Balamurugan, T Purusothaman,WSEAS Trans. Commun 11 (1) 2012
14 Cryptanalysis of simple block ciphers using extensive heuristic attacks,G Selvi, T Purusothaman, Eur J Sci Res 78, 198-221 2012
15 A Cross Layer Frame Work for Enhanced Quality of Service Provisioning in Worldwide Interoperability for Microwave Access Networks,S Kumar, T Purusothaman,Journal of Computer Science 8 (3), 420 2012
16 FPGA implementation of low power high speed square root circuits,KN Vijeyakumar, V Sumathy, P Vasakipriya, A Dinesh Babu,Computational Intelligence & Computing Research (ICCIC), 2012 IEEE 2012
17 Performance of Improved Directed Diffusion Protocol for Sensor Networks under Different Mobility Models, KE Kannammal, T Purusothaman,Journal of Computer Science 8 (5), 694 2012
18 Efficient star topology based multicast key management algorithm,K Saravanan, T Purusothaman, Journal of Computer Science 8 (6), 951 2012
19 6 Job Scheduling Model with Job Sequencing and Prioritizing Strategy in Grid Computing, A. R. Jayasudha, T. Purusothaman, International Journal of Computer Applications 46 (24) 2012
20 A multi-agent based data replication mechanism for mobile grid, T Senthilnathan, T Purusothaman, American Journal of Applied Sciences 9 (4), 542 2012
21 Collusion-Free Privacy Preserving Data Mining,T Purusothaman, M Rajalakshmi, S Pratheeba, Insights into Advancements in Intelligent Information Technologies 2012
22 Logical Tree Based Routing for Energy Efficient Wireless Sensor Networks, N Suma, T Purusothaman, European Journal of Scientific Research 87 (4), 504-511 2012
23 Self-Protected Mobile Agent Approach for Distributed Intrusion Detection System against DDoS Attacks, P Marikkannu, JJA Jovin, T Purusothaman, International Journal of Information and Electronics Engineering 2 (4), 606 2012
24 ESGIA: Extensible service based grid information aggregator, D Surendran, T Purusothaman, RA Balachandar, G Kousalya, International Journal of Computer Systems Science & Engineering 27 (4), 267-274 2012
25 Explicit Allocation Strategy with Deadline and Budget Constraint Algorithm in Bag of Tasks Grid, MS Kumar, T Purusothaman Journal of Computer Science 8 (7), 1108 2012
26 Multimodal Personal Authentication with Fingerprint, Speech and Teeth Traits using SVM Classifier,AJ Basha, V Palanisamy, T Purusothaman, European Journal of Scientific Research 76 (3), 463-473 2012
27 An Enhanced Star Topology based Multicast Key Management Algorithm,K Saravanan, T Purusothaman,European Journal of Scientific Research 75 (4), 482-489 2012
28 Secured Autonomous Key Management with Bai’s Secret Sharing Scheme,NM SaravanaKumar, T Purusothaman, Wireless Communication 4 (10), 556-561 2012
29 An enhanced scheduling scheme for QoS guarantee using channel state information in WiMAX networks, SJKJ Kumar, T Purusothaman,European Journal of Scientific Research 64 (2), 285-292 2011
30 Fault-tolerant adaptive mobile agent system using dynamic role based access control,P Marikkannu, JJA Jovin, T Purusothaman,International Journal of Computer Applications 20 (2), 1-6 2011
31 A generic interface for resource aggregation in grid of grids,D Surendran, T Purusothaman, RA Balachandar, International Journal of Information Technology, Communications and . 2011
32 Performance Analysis of Clustering Algorithms in Brain Tumor Detection of MR Images,P TamijeSelvy, V Palanisamy, T Purusothaman,European Journal of Scientific Research 63 (3) 2011
33 AFDB security protocol against colluded truncation attack in free roaming mobile agent environment,P Marikkannu, R Murugesan, T Purusothaman,Recent Trends in Information Technology (ICRTIT), 2011 International 2011
34 Comparison of data centric routing protocols with random way point mobility model in mobile sensor networks,KE Kannammal, T Purusothaman,European Journal of Scientific Research 65 (4), 546-452 2011
35 Privacy preserving distributed data mining using randomized site selection,M Rajalakshmi, T Purusothaman,European Journal Of Scientific Research 64 (2), 610-624 2011
36 Reduction of key search space of vigenere cipher using particle swarm optimization,G Sivagurunathan, T Purusothaman, Journal of computer science 7 (11), 1633 2011
37 Performance analysis of a resource aggregator in a grid of grids environment, D Surendran, T Purusothaman, RA Balachandar, International Journal of Computer Systems Science & Engineering 26 (4), 293-306 2011
38 A secure simple authenticated key exchange algorithm based authentication for social network, P Venkateswari, T Purusothaman, Journal of Computer Science 7 (8), 1152 2011
39 USABILITY AND SECURITY ASPECTS OF SOCIAL NETWORK SITES (SNS), P Venkateswari, T Purusothaman, DIGITAL WORLD 2 (04) 2011
40 Survey on Improvisation of Medium Access Protocol for Wireless Sensors Networks, BN Naveen, K Manikandan, T Purusothaman, International Journal of Advanced Research in Computer Science 2 (2) 2011
41 Secured distributed multi-agent role based access control, P Marikkannu, JJ Jovin, T Purusothaman, R Baskaran, Proceedings of the International Conference & Workshop on Emerging Trends in … 2011
42 A Novel Method of Key Management for Social Groups, P Venkateswari, T Purusothaman, European Journal of Scientific Research 63 (3), 398-404 2011
43 A Novel Approach for Optimized Multi Site Replica Placement in Mobile Grid, T Senthilnathan, T Purusothaman, European Journal of Scientific Research 63 (3), 325-338 2011
44 A Stringent Authorization using Principles and Policy for Grid Computing, AR Jayasudha, T Purusothaman, Journal of Computer Science 7 (8), 1295 2011
45 Classification of substitution ciphers using neural networks,G Sivagurunathan, V Rajendran, T Purusothaman,Int. J. Comput. Sci. Netw. Secur 10 (3), 274-279 2010
46 An Efficient Routing Protocol Design for Distributed Wireless Sensor Networks,K Manikandan, T Purusothaman,International Journal of Computer Applications 10 (4), 5-10 2010
47 Efficient key management scheme for secure multicast in MANET,T Purusothaman,IJCSNS 10 (11), 157 2010
48 Evaluation of directed diffusion protocol for mobile sensor networks,KE Kannammal, T Purusothaman,International Journal of Engineering Science and Technology 2 (6), 2272-2277 2010
49 A novel utility and frequency based itemset mining approach for improving CRM in retail business,S Shankar, T Purusothaman, S Kannimuthu, K Vishnu Priya,International Journal of Computer Applications 1 (16), 0975-8887 2010
50 Discovering Imperceptible Associations Based on Interestingness: A Utility-Oriented Data Mining,S Shankar, T Purusothaman,Data Science Journal 9, 1-12 2010
51 Fast multimodal biometric approach using dynamic fingerprint authentication and enhanced iris features,V Palanisamy, T Purusothaman,Computational Intelligence and Computing Research (ICCIC), 2010 IEEE 2010
52 A cluster based cost effective contributory key agreement protocol for secure group communication, S Jabeenbegum, T Purusothaman, M Karthi, N Balachandar, Computing Communication and Networking Technologies (ICCCNT), 2010  2010
53 A proficient clustering approach for detection of white matter lesions in MR images using Particle Swarm Optimization, P Tamije Selvy, V Palanisamy, T Purusothaman, European Journal of Scientific Research ISSN, 99-111 2010
54 SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER, MP Venkateswari, T Purusothaman, Journal of Computer Applications 3 (4), 18 2010
55 SMSCLOUD: A HYBRID ARCHITECTURE USING MULTIPLE CLOUDS, SJ Begum, T Purusothaman, Journal of Computer Applications 3 (3), 33 2010
56 Performance Evaluation of Mobility speed over Directed Diffusion Routing Protocol, KE Kannammal, T Purusothaman 2010
57 Utility sentient frequent itemset mining and association rule mining: a literature survey and comparative study ,S Shankar, T Purusothaman International Journal of Soft Computing Applications 4, 81-95 2009
58 Performance Evaluation of Exponential TCP/IP Congestion Control Algorithm,M Kalpana, T Purusothaman,IJCSNS 9 (3), 312 2009
59 A Novel Utility Sentient Approach for Mining Interesting Association Rules,S Shankar, T Purusothaman,International Journal of Engineering and Technology 1 (5), 454 2009
60 Cryptanalysis of vigenere cipher using genetic algorithm and dictionary analysis, T Purusothaman, V Gopalakrishnan, S Arumugam, V Palanisamy, Proceedings of the IASTED International Conference 597 (803), 246 2009
61 Evaluation of Network Life Time of Wireless Sensor Networks Using Hierarchical Energy Tree Based Routing Algorithm with Exponential Congestion Control, M Kalpana, T Purusothaman, International Journal of Soft Computing 4 (5), 185-196 2009
62 Novel algorithm for mining high utility itemsets,S Shankar, T Purusothaman, S Jayanthi,Computing, Communication and Networking, 2008. ICCCn 2008. International  2008
63 Hierarchial Energy Tree Based Energy Aware GPSR (HETEA-GPSR) Algorithm for Wireless Sensor Networks, M Kalpana, T Purusothaman, i-Manager's Journal on Software Engineering 2 (3), 43 2008
64 An Efficient Hybrid Re-keying Mechanism for Secure Group Communication,T Purusothaman, S Annadurai, V Gopalakrishnan,JOURNAL-INSTITUTION OF ENGINEERS INDIA PART ET ELECTRONICS AND 2007
65 Key Management in Group Communications, S Annadurai, T Purusothaman, R Reji, Global Networking, 35 2005
66 Dynamically Scalable, Heterogeneous and Generic Architecture for a Grid of Workstations,T Purusothaman, S Annadurai, HV Ganesh, CT Chockalingam, BU Kumar,Journal of Grid Computing 2 (3), 239-246 2004
67 GLS with secure routing in ad-hoc networks, V Sumathy, P Narayanasmy, K Baskaran, T Purusothaman, TENCON 2003. Conference on Convergent Technologies for the Asia-Pacific … 2003
68 An adaptive tree structure algorithm for efficient key management in group communication, T Purusothaman, S Annadurai, R Shanmugalakshmi, ML Valarmathi, Proceedings of the 15th international conference on Computer communication 2002
69 AN IMPROVED GA-MILSVM CLASSIFICATION APPROACH FOR DIAGNOSIS OF BREAST LESIONS FROM STAIN IMAGES,PT Selvy, V Palanisamy, T Purusothaman 1963
Go to top