Sl.No |
Publication Detail |
Year |
1 |
Hybrid Broadcast Group Management Protocol for Secure, Scalable and Efficient Group Communication, M Sayee Kumar, T Purusothaman, Journal of Computer Science 11 (2), 344 |
2015 |
2 |
Hierarchical Tree Structure Based Clustering Schemes for Secure Group Communication, SJ Begum, T Purusothaman,Mobile Networks and Applications, 1-11 |
2015 |
3 |
Optimizing batch rekeying interval for secure group communication based on queuing model,A Vasanthi, T Purusothaman, Journal of Computer Science 10 (2), 325 |
2014 |
4 |
Certain investigations on scheduling Algorithms in computational grid With economic and deadline Considerations, T Purusothaman |
2014 |
5 |
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS, A Vasanthi, T Purusothaman |
2014 |
6 |
USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME., V RAJENDRAN, T PURUSOTHAMAN, Journal of Theoretical & Applied Information Technology 56 (1) |
2013 |
7 |
Concealing party-centric sensitive rules in a centralized data source,M Rajalakshmi, T Purusothaman, International Journal of Machine Learning and Cybernetics 4 (5), 515-525 |
2013 |
8 |
A new utility-emphasized analysis for stock trading rules, S Shankar, T Purusothaman, Intelligent Data Analysis 17 (2), 271-294 |
2013 |
9 |
A Performance Analysis on Cluster Based Group Key Management Schemes in Multicast Network, NMS Kumar, T Purusothaman, S Lavanya, Archives Des Sciences 66 (2) |
2013 |
10 |
An Efficient Routing Protocol for Wireless Sensor Networks, K KE, T PURUSOTHAMAN, Life Science Journal 10 (2) |
2013 |
11 |
New interest propagation mechanism in directed diffusion protocol for mobile sensor networks,KE Kannammal, T Purusothaman,Eur J Sci Res 68 (1), 36-42 |
2012 |
12 |
SEGKMS: Scalable and Efficient Group Key Management Scheme in Multicast Networks,NMS Kumar, T Purusothaman,European Journal of Scientific Research 89 (3), 394-408 |
2012 |
13 |
IPSD: new coverage preserving and connectivity maintenance scheme for improving lifetime of wireless sensor networks,A Balamurugan, T Purusothaman,WSEAS Trans. Commun 11 (1) |
2012 |
14 |
Cryptanalysis of simple block ciphers using extensive heuristic attacks,G Selvi, T Purusothaman, Eur J Sci Res 78, 198-221 |
2012 |
15 |
A Cross Layer Frame Work for Enhanced Quality of Service Provisioning in Worldwide Interoperability for Microwave Access Networks,S Kumar, T Purusothaman,Journal of Computer Science 8 (3), 420 |
2012 |
16 |
FPGA implementation of low power high speed square root circuits,KN Vijeyakumar, V Sumathy, P Vasakipriya, A Dinesh Babu,Computational Intelligence & Computing Research (ICCIC), 2012 IEEE |
2012 |
17 |
Performance of Improved Directed Diffusion Protocol for Sensor Networks under Different Mobility Models, KE Kannammal, T Purusothaman,Journal of Computer Science 8 (5), 694 |
2012 |
18 |
Efficient star topology based multicast key management algorithm,K Saravanan, T Purusothaman, Journal of Computer Science 8 (6), 951 |
2012 |
19 |
6 Job Scheduling Model with Job Sequencing and Prioritizing Strategy in Grid Computing, A. R. Jayasudha, T. Purusothaman, International Journal of Computer Applications 46 (24) |
2012 |
20 |
A multi-agent based data replication mechanism for mobile grid, T Senthilnathan, T Purusothaman, American Journal of Applied Sciences 9 (4), 542 |
2012 |
21 |
Collusion-Free Privacy Preserving Data Mining,T Purusothaman, M Rajalakshmi, S Pratheeba, Insights into Advancements in Intelligent Information Technologies |
2012 |
22 |
Logical Tree Based Routing for Energy Efficient Wireless Sensor Networks, N Suma, T Purusothaman, European Journal of Scientific Research 87 (4), 504-511 |
2012 |
23 |
Self-Protected Mobile Agent Approach for Distributed Intrusion Detection System against DDoS Attacks, P Marikkannu, JJA Jovin, T Purusothaman, International Journal of Information and Electronics Engineering 2 (4), 606 |
2012 |
24 |
ESGIA: Extensible service based grid information aggregator, D Surendran, T Purusothaman, RA Balachandar, G Kousalya, International Journal of Computer Systems Science & Engineering 27 (4), 267-274 |
2012 |
25 |
Explicit Allocation Strategy with Deadline and Budget Constraint Algorithm in Bag of Tasks Grid, MS Kumar, T Purusothaman Journal of Computer Science 8 (7), 1108 |
2012 |
26 |
Multimodal Personal Authentication with Fingerprint, Speech and Teeth Traits using SVM Classifier,AJ Basha, V Palanisamy, T Purusothaman, European Journal of Scientific Research 76 (3), 463-473 |
2012 |
27 |
An Enhanced Star Topology based Multicast Key Management Algorithm,K Saravanan, T Purusothaman,European Journal of Scientific Research 75 (4), 482-489 |
2012 |
28 |
Secured Autonomous Key Management with Bai’s Secret Sharing Scheme,NM SaravanaKumar, T Purusothaman, Wireless Communication 4 (10), 556-561 |
2012 |
29 |
An enhanced scheduling scheme for QoS guarantee using channel state information in WiMAX networks, SJKJ Kumar, T Purusothaman,European Journal of Scientific Research 64 (2), 285-292 |
2011 |
30 |
Fault-tolerant adaptive mobile agent system using dynamic role based access control,P Marikkannu, JJA Jovin, T Purusothaman,International Journal of Computer Applications 20 (2), 1-6 |
2011 |
31 |
A generic interface for resource aggregation in grid of grids,D Surendran, T Purusothaman, RA Balachandar, International Journal of Information Technology, Communications and . |
2011 |
32 |
Performance Analysis of Clustering Algorithms in Brain Tumor Detection of MR Images,P TamijeSelvy, V Palanisamy, T Purusothaman,European Journal of Scientific Research 63 (3) |
2011 |
33 |
AFDB security protocol against colluded truncation attack in free roaming mobile agent environment,P Marikkannu, R Murugesan, T Purusothaman,Recent Trends in Information Technology (ICRTIT), 2011 International |
2011 |
34 |
Comparison of data centric routing protocols with random way point mobility model in mobile sensor networks,KE Kannammal, T Purusothaman,European Journal of Scientific Research 65 (4), 546-452 |
2011 |
35 |
Privacy preserving distributed data mining using randomized site selection,M Rajalakshmi, T Purusothaman,European Journal Of Scientific Research 64 (2), 610-624 |
2011 |
36 |
Reduction of key search space of vigenere cipher using particle swarm optimization,G Sivagurunathan, T Purusothaman, Journal of computer science 7 (11), 1633 |
2011 |
37 |
Performance analysis of a resource aggregator in a grid of grids environment, D Surendran, T Purusothaman, RA Balachandar, International Journal of Computer Systems Science & Engineering 26 (4), 293-306 |
2011 |
38 |
A secure simple authenticated key exchange algorithm based authentication for social network, P Venkateswari, T Purusothaman, Journal of Computer Science 7 (8), 1152 |
2011 |
39 |
USABILITY AND SECURITY ASPECTS OF SOCIAL NETWORK SITES (SNS), P Venkateswari, T Purusothaman, DIGITAL WORLD 2 (04) |
2011 |
40 |
Survey on Improvisation of Medium Access Protocol for Wireless Sensors Networks, BN Naveen, K Manikandan, T Purusothaman, International Journal of Advanced Research in Computer Science 2 (2) |
2011 |
41 |
Secured distributed multi-agent role based access control, P Marikkannu, JJ Jovin, T Purusothaman, R Baskaran, Proceedings of the International Conference & Workshop on Emerging Trends in … |
2011 |
42 |
A Novel Method of Key Management for Social Groups, P Venkateswari, T Purusothaman, European Journal of Scientific Research 63 (3), 398-404 |
2011 |
43 |
A Novel Approach for Optimized Multi Site Replica Placement in Mobile Grid, T Senthilnathan, T Purusothaman, European Journal of Scientific Research 63 (3), 325-338 |
2011 |
44 |
A Stringent Authorization using Principles and Policy for Grid Computing, AR Jayasudha, T Purusothaman, Journal of Computer Science 7 (8), 1295 |
2011 |
45 |
Classification of substitution ciphers using neural networks,G Sivagurunathan, V Rajendran, T Purusothaman,Int. J. Comput. Sci. Netw. Secur 10 (3), 274-279 |
2010 |
46 |
An Efficient Routing Protocol Design for Distributed Wireless Sensor Networks,K Manikandan, T Purusothaman,International Journal of Computer Applications 10 (4), 5-10 |
2010 |
47 |
Efficient key management scheme for secure multicast in MANET,T Purusothaman,IJCSNS 10 (11), 157 |
2010 |
48 |
Evaluation of directed diffusion protocol for mobile sensor networks,KE Kannammal, T Purusothaman,International Journal of Engineering Science and Technology 2 (6), 2272-2277 |
2010 |
49 |
A novel utility and frequency based itemset mining approach for improving CRM in retail business,S Shankar, T Purusothaman, S Kannimuthu, K Vishnu Priya,International Journal of Computer Applications 1 (16), 0975-8887 |
2010 |
50 |
Discovering Imperceptible Associations Based on Interestingness: A Utility-Oriented Data Mining,S Shankar, T Purusothaman,Data Science Journal 9, 1-12 |
2010 |
51 |
Fast multimodal biometric approach using dynamic fingerprint authentication and enhanced iris features,V Palanisamy, T Purusothaman,Computational Intelligence and Computing Research (ICCIC), 2010 IEEE |
2010 |
52 |
A cluster based cost effective contributory key agreement protocol for secure group communication, S Jabeenbegum, T Purusothaman, M Karthi, N Balachandar, Computing Communication and Networking Technologies (ICCCNT), 2010 |
2010 |
53 |
A proficient clustering approach for detection of white matter lesions in MR images using Particle Swarm Optimization, P Tamije Selvy, V Palanisamy, T Purusothaman, European Journal of Scientific Research ISSN, 99-111 |
2010 |
54 |
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER, MP Venkateswari, T Purusothaman, Journal of Computer Applications 3 (4), 18 |
2010 |
55 |
SMSCLOUD: A HYBRID ARCHITECTURE USING MULTIPLE CLOUDS, SJ Begum, T Purusothaman, Journal of Computer Applications 3 (3), 33 |
2010 |
56 |
Performance Evaluation of Mobility speed over Directed Diffusion Routing Protocol, KE Kannammal, T Purusothaman |
2010 |
57 |
Utility sentient frequent itemset mining and association rule mining: a literature survey and comparative study ,S Shankar, T Purusothaman International Journal of Soft Computing Applications 4, 81-95 |
2009 |
58 |
Performance Evaluation of Exponential TCP/IP Congestion Control Algorithm,M Kalpana, T Purusothaman,IJCSNS 9 (3), 312 |
2009 |
59 |
A Novel Utility Sentient Approach for Mining Interesting Association Rules,S Shankar, T Purusothaman,International Journal of Engineering and Technology 1 (5), 454 |
2009 |
60 |
Cryptanalysis of vigenere cipher using genetic algorithm and dictionary analysis, T Purusothaman, V Gopalakrishnan, S Arumugam, V Palanisamy, Proceedings of the IASTED International Conference 597 (803), 246 |
2009 |
61 |
Evaluation of Network Life Time of Wireless Sensor Networks Using Hierarchical Energy Tree Based Routing Algorithm with Exponential Congestion Control, M Kalpana, T Purusothaman, International Journal of Soft Computing 4 (5), 185-196 |
2009 |
62 |
Novel algorithm for mining high utility itemsets,S Shankar, T Purusothaman, S Jayanthi,Computing, Communication and Networking, 2008. ICCCn 2008. International |
2008 |
63 |
Hierarchial Energy Tree Based Energy Aware GPSR (HETEA-GPSR) Algorithm for Wireless Sensor Networks, M Kalpana, T Purusothaman, i-Manager's Journal on Software Engineering 2 (3), 43 |
2008 |
64 |
An Efficient Hybrid Re-keying Mechanism for Secure Group Communication,T Purusothaman, S Annadurai, V Gopalakrishnan,JOURNAL-INSTITUTION OF ENGINEERS INDIA PART ET ELECTRONICS AND |
2007 |
65 |
Key Management in Group Communications, S Annadurai, T Purusothaman, R Reji, Global Networking, 35 |
2005 |
66 |
Dynamically Scalable, Heterogeneous and Generic Architecture for a Grid of Workstations,T Purusothaman, S Annadurai, HV Ganesh, CT Chockalingam, BU Kumar,Journal of Grid Computing 2 (3), 239-246 |
2004 |
67 |
GLS with secure routing in ad-hoc networks, V Sumathy, P Narayanasmy, K Baskaran, T Purusothaman, TENCON 2003. Conference on Convergent Technologies for the Asia-Pacific … |
2003 |
68 |
An adaptive tree structure algorithm for efficient key management in group communication, T Purusothaman, S Annadurai, R Shanmugalakshmi, ML Valarmathi, Proceedings of the 15th international conference on Computer communication |
2002 |
69 |
AN IMPROVED GA-MILSVM CLASSIFICATION APPROACH FOR DIAGNOSIS OF BREAST LESIONS FROM STAIN IMAGES,PT Selvy, V Palanisamy, T Purusothaman |
1963 |