Sl.No | Publication Detail | Year |
1 | Hybrid Broadcast Group Management Protocol for Secure, Scalable and Efficient Group Communication, M Sayee Kumar, T Purusothaman, Journal of Computer Science 11 (2), 344 | 2015 |
2 | Hierarchical Tree Structure Based Clustering Schemes for Secure Group Communication, SJ Begum, T Purusothaman,Mobile Networks and Applications, 1-11 | 2015 |
3 | Optimizing batch rekeying interval for secure group communication based on queuing model,A Vasanthi, T Purusothaman, Journal of Computer Science 10 (2), 325 | 2014 |
4 | Certain investigations on scheduling Algorithms in computational grid With economic and deadline Considerations, T Purusothaman | 2014 |
5 | INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS, A Vasanthi, T Purusothaman | 2014 |
6 | USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME., V RAJENDRAN, T PURUSOTHAMAN, Journal of Theoretical & Applied Information Technology 56 (1) | 2013 |
7 | Concealing party-centric sensitive rules in a centralized data source,M Rajalakshmi, T Purusothaman, International Journal of Machine Learning and Cybernetics 4 (5), 515-525 | 2013 |
8 | A new utility-emphasized analysis for stock trading rules, S Shankar, T Purusothaman, Intelligent Data Analysis 17 (2), 271-294 | 2013 |
9 | A Performance Analysis on Cluster Based Group Key Management Schemes in Multicast Network, NMS Kumar, T Purusothaman, S Lavanya, Archives Des Sciences 66 (2) | 2013 |
10 | An Efficient Routing Protocol for Wireless Sensor Networks, K KE, T PURUSOTHAMAN, Life Science Journal 10 (2) | 2013 |
11 | New interest propagation mechanism in directed diffusion protocol for mobile sensor networks,KE Kannammal, T Purusothaman,Eur J Sci Res 68 (1), 36-42 | 2012 |
12 | SEGKMS: Scalable and Efficient Group Key Management Scheme in Multicast Networks,NMS Kumar, T Purusothaman,European Journal of Scientific Research 89 (3), 394-408 | 2012 |
13 | IPSD: new coverage preserving and connectivity maintenance scheme for improving lifetime of wireless sensor networks,A Balamurugan, T Purusothaman,WSEAS Trans. Commun 11 (1) | 2012 |
14 | Cryptanalysis of simple block ciphers using extensive heuristic attacks,G Selvi, T Purusothaman, Eur J Sci Res 78, 198-221 | 2012 |
15 | A Cross Layer Frame Work for Enhanced Quality of Service Provisioning in Worldwide Interoperability for Microwave Access Networks,S Kumar, T Purusothaman,Journal of Computer Science 8 (3), 420 | 2012 |
16 | FPGA implementation of low power high speed square root circuits,KN Vijeyakumar, V Sumathy, P Vasakipriya, A Dinesh Babu,Computational Intelligence & Computing Research (ICCIC), 2012 IEEE | 2012 |
17 | Performance of Improved Directed Diffusion Protocol for Sensor Networks under Different Mobility Models, KE Kannammal, T Purusothaman,Journal of Computer Science 8 (5), 694 | 2012 |
18 | Efficient star topology based multicast key management algorithm,K Saravanan, T Purusothaman, Journal of Computer Science 8 (6), 951 | 2012 |
19 | 6 Job Scheduling Model with Job Sequencing and Prioritizing Strategy in Grid Computing, A. R. Jayasudha, T. Purusothaman, International Journal of Computer Applications 46 (24) | 2012 |
20 | A multi-agent based data replication mechanism for mobile grid, T Senthilnathan, T Purusothaman, American Journal of Applied Sciences 9 (4), 542 | 2012 |
21 | Collusion-Free Privacy Preserving Data Mining,T Purusothaman, M Rajalakshmi, S Pratheeba, Insights into Advancements in Intelligent Information Technologies | 2012 |
22 | Logical Tree Based Routing for Energy Efficient Wireless Sensor Networks, N Suma, T Purusothaman, European Journal of Scientific Research 87 (4), 504-511 | 2012 |
23 | Self-Protected Mobile Agent Approach for Distributed Intrusion Detection System against DDoS Attacks, P Marikkannu, JJA Jovin, T Purusothaman, International Journal of Information and Electronics Engineering 2 (4), 606 | 2012 |
24 | ESGIA: Extensible service based grid information aggregator, D Surendran, T Purusothaman, RA Balachandar, G Kousalya, International Journal of Computer Systems Science & Engineering 27 (4), 267-274 | 2012 |
25 | Explicit Allocation Strategy with Deadline and Budget Constraint Algorithm in Bag of Tasks Grid, MS Kumar, T Purusothaman Journal of Computer Science 8 (7), 1108 | 2012 |
26 | Multimodal Personal Authentication with Fingerprint, Speech and Teeth Traits using SVM Classifier,AJ Basha, V Palanisamy, T Purusothaman, European Journal of Scientific Research 76 (3), 463-473 | 2012 |
27 | An Enhanced Star Topology based Multicast Key Management Algorithm,K Saravanan, T Purusothaman,European Journal of Scientific Research 75 (4), 482-489 | 2012 |
28 | Secured Autonomous Key Management with Bai’s Secret Sharing Scheme,NM SaravanaKumar, T Purusothaman, Wireless Communication 4 (10), 556-561 | 2012 |
29 | An enhanced scheduling scheme for QoS guarantee using channel state information in WiMAX networks, SJKJ Kumar, T Purusothaman,European Journal of Scientific Research 64 (2), 285-292 | 2011 |
30 | Fault-tolerant adaptive mobile agent system using dynamic role based access control,P Marikkannu, JJA Jovin, T Purusothaman,International Journal of Computer Applications 20 (2), 1-6 | 2011 |
31 | A generic interface for resource aggregation in grid of grids,D Surendran, T Purusothaman, RA Balachandar, International Journal of Information Technology, Communications and . | 2011 |
32 | Performance Analysis of Clustering Algorithms in Brain Tumor Detection of MR Images,P TamijeSelvy, V Palanisamy, T Purusothaman,European Journal of Scientific Research 63 (3) | 2011 |
33 | AFDB security protocol against colluded truncation attack in free roaming mobile agent environment,P Marikkannu, R Murugesan, T Purusothaman,Recent Trends in Information Technology (ICRTIT), 2011 International | 2011 |
34 | Comparison of data centric routing protocols with random way point mobility model in mobile sensor networks,KE Kannammal, T Purusothaman,European Journal of Scientific Research 65 (4), 546-452 | 2011 |
35 | Privacy preserving distributed data mining using randomized site selection,M Rajalakshmi, T Purusothaman,European Journal Of Scientific Research 64 (2), 610-624 | 2011 |
36 | Reduction of key search space of vigenere cipher using particle swarm optimization,G Sivagurunathan, T Purusothaman, Journal of computer science 7 (11), 1633 | 2011 |
37 | Performance analysis of a resource aggregator in a grid of grids environment, D Surendran, T Purusothaman, RA Balachandar, International Journal of Computer Systems Science & Engineering 26 (4), 293-306 | 2011 |
38 | A secure simple authenticated key exchange algorithm based authentication for social network, P Venkateswari, T Purusothaman, Journal of Computer Science 7 (8), 1152 | 2011 |
39 | USABILITY AND SECURITY ASPECTS OF SOCIAL NETWORK SITES (SNS), P Venkateswari, T Purusothaman, DIGITAL WORLD 2 (04) | 2011 |
40 | Survey on Improvisation of Medium Access Protocol for Wireless Sensors Networks, BN Naveen, K Manikandan, T Purusothaman, International Journal of Advanced Research in Computer Science 2 (2) | 2011 |
41 | Secured distributed multi-agent role based access control, P Marikkannu, JJ Jovin, T Purusothaman, R Baskaran, Proceedings of the International Conference & Workshop on Emerging Trends in … | 2011 |
42 | A Novel Method of Key Management for Social Groups, P Venkateswari, T Purusothaman, European Journal of Scientific Research 63 (3), 398-404 | 2011 |
43 | A Novel Approach for Optimized Multi Site Replica Placement in Mobile Grid, T Senthilnathan, T Purusothaman, European Journal of Scientific Research 63 (3), 325-338 | 2011 |
44 | A Stringent Authorization using Principles and Policy for Grid Computing, AR Jayasudha, T Purusothaman, Journal of Computer Science 7 (8), 1295 | 2011 |
45 | Classification of substitution ciphers using neural networks,G Sivagurunathan, V Rajendran, T Purusothaman,Int. J. Comput. Sci. Netw. Secur 10 (3), 274-279 | 2010 |
46 | An Efficient Routing Protocol Design for Distributed Wireless Sensor Networks,K Manikandan, T Purusothaman,International Journal of Computer Applications 10 (4), 5-10 | 2010 |
47 | Efficient key management scheme for secure multicast in MANET,T Purusothaman,IJCSNS 10 (11), 157 | 2010 |
48 | Evaluation of directed diffusion protocol for mobile sensor networks,KE Kannammal, T Purusothaman,International Journal of Engineering Science and Technology 2 (6), 2272-2277 | 2010 |
49 | A novel utility and frequency based itemset mining approach for improving CRM in retail business,S Shankar, T Purusothaman, S Kannimuthu, K Vishnu Priya,International Journal of Computer Applications 1 (16), 0975-8887 | 2010 |
50 | Discovering Imperceptible Associations Based on Interestingness: A Utility-Oriented Data Mining,S Shankar, T Purusothaman,Data Science Journal 9, 1-12 | 2010 |
51 | Fast multimodal biometric approach using dynamic fingerprint authentication and enhanced iris features,V Palanisamy, T Purusothaman,Computational Intelligence and Computing Research (ICCIC), 2010 IEEE | 2010 |
52 | A cluster based cost effective contributory key agreement protocol for secure group communication, S Jabeenbegum, T Purusothaman, M Karthi, N Balachandar, Computing Communication and Networking Technologies (ICCCNT), 2010 | 2010 |
53 | A proficient clustering approach for detection of white matter lesions in MR images using Particle Swarm Optimization, P Tamije Selvy, V Palanisamy, T Purusothaman, European Journal of Scientific Research ISSN, 99-111 | 2010 |
54 | SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER, MP Venkateswari, T Purusothaman, Journal of Computer Applications 3 (4), 18 | 2010 |
55 | SMSCLOUD: A HYBRID ARCHITECTURE USING MULTIPLE CLOUDS, SJ Begum, T Purusothaman, Journal of Computer Applications 3 (3), 33 | 2010 |
56 | Performance Evaluation of Mobility speed over Directed Diffusion Routing Protocol, KE Kannammal, T Purusothaman | 2010 |
57 | Utility sentient frequent itemset mining and association rule mining: a literature survey and comparative study ,S Shankar, T Purusothaman International Journal of Soft Computing Applications 4, 81-95 | 2009 |
58 | Performance Evaluation of Exponential TCP/IP Congestion Control Algorithm,M Kalpana, T Purusothaman,IJCSNS 9 (3), 312 | 2009 |
59 | A Novel Utility Sentient Approach for Mining Interesting Association Rules,S Shankar, T Purusothaman,International Journal of Engineering and Technology 1 (5), 454 | 2009 |
60 | Cryptanalysis of vigenere cipher using genetic algorithm and dictionary analysis, T Purusothaman, V Gopalakrishnan, S Arumugam, V Palanisamy, Proceedings of the IASTED International Conference 597 (803), 246 | 2009 |
61 | Evaluation of Network Life Time of Wireless Sensor Networks Using Hierarchical Energy Tree Based Routing Algorithm with Exponential Congestion Control, M Kalpana, T Purusothaman, International Journal of Soft Computing 4 (5), 185-196 | 2009 |
62 | Novel algorithm for mining high utility itemsets,S Shankar, T Purusothaman, S Jayanthi,Computing, Communication and Networking, 2008. ICCCn 2008. International | 2008 |
63 | Hierarchial Energy Tree Based Energy Aware GPSR (HETEA-GPSR) Algorithm for Wireless Sensor Networks, M Kalpana, T Purusothaman, i-Manager's Journal on Software Engineering 2 (3), 43 | 2008 |
64 | An Efficient Hybrid Re-keying Mechanism for Secure Group Communication,T Purusothaman, S Annadurai, V Gopalakrishnan,JOURNAL-INSTITUTION OF ENGINEERS INDIA PART ET ELECTRONICS AND | 2007 |
65 | Key Management in Group Communications, S Annadurai, T Purusothaman, R Reji, Global Networking, 35 | 2005 |
66 | Dynamically Scalable, Heterogeneous and Generic Architecture for a Grid of Workstations,T Purusothaman, S Annadurai, HV Ganesh, CT Chockalingam, BU Kumar,Journal of Grid Computing 2 (3), 239-246 | 2004 |
67 | GLS with secure routing in ad-hoc networks, V Sumathy, P Narayanasmy, K Baskaran, T Purusothaman, TENCON 2003. Conference on Convergent Technologies for the Asia-Pacific … | 2003 |
68 | An adaptive tree structure algorithm for efficient key management in group communication, T Purusothaman, S Annadurai, R Shanmugalakshmi, ML Valarmathi, Proceedings of the 15th international conference on Computer communication | 2002 |
69 | AN IMPROVED GA-MILSVM CLASSIFICATION APPROACH FOR DIAGNOSIS OF BREAST LESIONS FROM STAIN IMAGES,PT Selvy, V Palanisamy, T Purusothaman | 1963 |
+91 98422 79020