Skip to main content

Publications


Sl.No

Publication Detail

Year

1

Hybrid Broadcast Group Management Protocol for Secure, Scalable and Efficient Group Communication, M Sayee Kumar, T Purusothaman, Journal of Computer Science 11 (2), 344

2015

2

Hierarchical Tree Structure Based Clustering Schemes for Secure Group Communication, SJ Begum, T Purusothaman,Mobile Networks and Applications, 1-11

2015

3

Optimizing batch rekeying interval for secure group communication based on queuing model,A Vasanthi, T Purusothaman, Journal of Computer Science 10 (2), 325

2014

4

Certain investigations on scheduling Algorithms in computational grid With economic and deadline Considerations, T Purusothaman

2014

5

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS, A Vasanthi, T Purusothaman

2014

6

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME., V RAJENDRAN, T PURUSOTHAMAN, Journal of Theoretical & Applied Information Technology 56 (1)

2013

7

Concealing party-centric sensitive rules in a centralized data source,M Rajalakshmi, T Purusothaman, International Journal of Machine Learning and Cybernetics 4 (5), 515-525

2013

8

A new utility-emphasized analysis for stock trading rules, S Shankar, T Purusothaman, Intelligent Data Analysis 17 (2), 271-294

2013

9

A Performance Analysis on Cluster Based Group Key Management Schemes in Multicast Network, NMS Kumar, T Purusothaman, S Lavanya, Archives Des Sciences 66 (2)

2013

10

An Efficient Routing Protocol for Wireless Sensor Networks, K KE, T PURUSOTHAMAN, Life Science Journal 10 (2)

2013

11

New interest propagation mechanism in directed diffusion protocol for mobile sensor networks,KE Kannammal, T Purusothaman,Eur J Sci Res 68 (1), 36-42

2012

12

SEGKMS: Scalable and Efficient Group Key Management Scheme in Multicast Networks,NMS Kumar, T Purusothaman,European Journal of Scientific Research 89 (3), 394-408

2012

13

IPSD: new coverage preserving and connectivity maintenance scheme for improving lifetime of wireless sensor networks,A Balamurugan, T Purusothaman,WSEAS Trans. Commun 11 (1)

2012

14

Cryptanalysis of simple block ciphers using extensive heuristic attacks,G Selvi, T Purusothaman, Eur J Sci Res 78, 198-221

2012

15

A Cross Layer Frame Work for Enhanced Quality of Service Provisioning in Worldwide Interoperability for Microwave Access Networks,S Kumar, T Purusothaman,Journal of Computer Science 8 (3), 420

2012

16

FPGA implementation of low power high speed square root circuits,KN Vijeyakumar, V Sumathy, P Vasakipriya, A Dinesh Babu,Computational Intelligence & Computing Research (ICCIC), 2012 IEEE

2012

17

Performance of Improved Directed Diffusion Protocol for Sensor Networks under Different Mobility Models, KE Kannammal, T Purusothaman,Journal of Computer Science 8 (5), 694

2012

18

Efficient star topology based multicast key management algorithm,K Saravanan, T Purusothaman, Journal of Computer Science 8 (6), 951

2012

19

6 Job Scheduling Model with Job Sequencing and Prioritizing Strategy in Grid Computing, A. R. Jayasudha, T. Purusothaman, International Journal of Computer Applications 46 (24)

2012

20

A multi-agent based data replication mechanism for mobile grid, T Senthilnathan, T Purusothaman, American Journal of Applied Sciences 9 (4), 542

2012

21

Collusion-Free Privacy Preserving Data Mining,T Purusothaman, M Rajalakshmi, S Pratheeba, Insights into Advancements in Intelligent Information Technologies

2012

22

Logical Tree Based Routing for Energy Efficient Wireless Sensor Networks, N Suma, T Purusothaman, European Journal of Scientific Research 87 (4), 504-511

2012

23

Self-Protected Mobile Agent Approach for Distributed Intrusion Detection System against DDoS Attacks, P Marikkannu, JJA Jovin, T Purusothaman, International Journal of Information and Electronics Engineering 2 (4), 606

2012

24

ESGIA: Extensible service based grid information aggregator, D Surendran, T Purusothaman, RA Balachandar, G Kousalya, International Journal of Computer Systems Science & Engineering 27 (4), 267-274

2012

25

Explicit Allocation Strategy with Deadline and Budget Constraint Algorithm in Bag of Tasks Grid, MS Kumar, T Purusothaman Journal of Computer Science 8 (7), 1108

2012

26

Multimodal Personal Authentication with Fingerprint, Speech and Teeth Traits using SVM Classifier,AJ Basha, V Palanisamy, T Purusothaman, European Journal of Scientific Research 76 (3), 463-473

2012

27

An Enhanced Star Topology based Multicast Key Management Algorithm,K Saravanan, T Purusothaman,European Journal of Scientific Research 75 (4), 482-489

2012

28

Secured Autonomous Key Management with Bai’s Secret Sharing Scheme,NM SaravanaKumar, T Purusothaman, Wireless Communication 4 (10), 556-561

2012

29

An enhanced scheduling scheme for QoS guarantee using channel state information in WiMAX networks, SJKJ Kumar, T Purusothaman,European Journal of Scientific Research 64 (2), 285-292

2011

30

Fault-tolerant adaptive mobile agent system using dynamic role based access control,P Marikkannu, JJA Jovin, T Purusothaman,International Journal of Computer Applications 20 (2), 1-6

2011

31

A generic interface for resource aggregation in grid of grids,D Surendran, T Purusothaman, RA Balachandar, International Journal of Information Technology, Communications and .

2011

32

Performance Analysis of Clustering Algorithms in Brain Tumor Detection of MR Images,P TamijeSelvy, V Palanisamy, T Purusothaman,European Journal of Scientific Research 63 (3)

2011

33

AFDB security protocol against colluded truncation attack in free roaming mobile agent environment,P Marikkannu, R Murugesan, T Purusothaman,Recent Trends in Information Technology (ICRTIT), 2011 International

2011

34

Comparison of data centric routing protocols with random way point mobility model in mobile sensor networks,KE Kannammal, T Purusothaman,European Journal of Scientific Research 65 (4), 546-452

2011

35

Privacy preserving distributed data mining using randomized site selection,M Rajalakshmi, T Purusothaman,European Journal Of Scientific Research 64 (2), 610-624

2011

36

Reduction of key search space of vigenere cipher using particle swarm optimization,G Sivagurunathan, T Purusothaman, Journal of computer science 7 (11), 1633

2011

37

Performance analysis of a resource aggregator in a grid of grids environment, D Surendran, T Purusothaman, RA Balachandar, International Journal of Computer Systems Science & Engineering 26 (4), 293-306

2011

38

A secure simple authenticated key exchange algorithm based authentication for social network, P Venkateswari, T Purusothaman, Journal of Computer Science 7 (8), 1152

2011

39

USABILITY AND SECURITY ASPECTS OF SOCIAL NETWORK SITES (SNS), P Venkateswari, T Purusothaman, DIGITAL WORLD 2 (04)

2011

40

Survey on Improvisation of Medium Access Protocol for Wireless Sensors Networks, BN Naveen, K Manikandan, T Purusothaman, International Journal of Advanced Research in Computer Science 2 (2)

2011

41

Secured distributed multi-agent role based access control, P Marikkannu, JJ Jovin, T Purusothaman, R Baskaran, Proceedings of the International Conference & Workshop on Emerging Trends in …

2011

42

A Novel Method of Key Management for Social Groups, P Venkateswari, T Purusothaman, European Journal of Scientific Research 63 (3), 398-404

2011

43

A Novel Approach for Optimized Multi Site Replica Placement in Mobile Grid, T Senthilnathan, T Purusothaman, European Journal of Scientific Research 63 (3), 325-338

2011

44

A Stringent Authorization using Principles and Policy for Grid Computing, AR Jayasudha, T Purusothaman, Journal of Computer Science 7 (8), 1295

2011

45

Classification of substitution ciphers using neural networks,G Sivagurunathan, V Rajendran, T Purusothaman,Int. J. Comput. Sci. Netw. Secur 10 (3), 274-279

2010

46

An Efficient Routing Protocol Design for Distributed Wireless Sensor Networks,K Manikandan, T Purusothaman,International Journal of Computer Applications 10 (4), 5-10

2010

47

Efficient key management scheme for secure multicast in MANET,T Purusothaman,IJCSNS 10 (11), 157

2010

48

Evaluation of directed diffusion protocol for mobile sensor networks,KE Kannammal, T Purusothaman,International Journal of Engineering Science and Technology 2 (6), 2272-2277

2010

49

A novel utility and frequency based itemset mining approach for improving CRM in retail business,S Shankar, T Purusothaman, S Kannimuthu, K Vishnu Priya,International Journal of Computer Applications 1 (16), 0975-8887

2010

50

Discovering Imperceptible Associations Based on Interestingness: A Utility-Oriented Data Mining,S Shankar, T Purusothaman,Data Science Journal 9, 1-12

2010

51

Fast multimodal biometric approach using dynamic fingerprint authentication and enhanced iris features,V Palanisamy, T Purusothaman,Computational Intelligence and Computing Research (ICCIC), 2010 IEEE

2010

52

A cluster based cost effective contributory key agreement protocol for secure group communication, S Jabeenbegum, T Purusothaman, M Karthi, N Balachandar, Computing Communication and Networking Technologies (ICCCNT), 2010 

2010

53

A proficient clustering approach for detection of white matter lesions in MR images using Particle Swarm Optimization, P Tamije Selvy, V Palanisamy, T Purusothaman, European Journal of Scientific Research ISSN, 99-111

2010

54

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER, MP Venkateswari, T Purusothaman, Journal of Computer Applications 3 (4), 18

2010

55

SMSCLOUD: A HYBRID ARCHITECTURE USING MULTIPLE CLOUDS, SJ Begum, T Purusothaman, Journal of Computer Applications 3 (3), 33

2010

56

Performance Evaluation of Mobility speed over Directed Diffusion Routing Protocol, KE Kannammal, T Purusothaman

2010

57

Utility sentient frequent itemset mining and association rule mining: a literature survey and comparative study ,S Shankar, T Purusothaman International Journal of Soft Computing Applications 4, 81-95

2009

58

Performance Evaluation of Exponential TCP/IP Congestion Control Algorithm,M Kalpana, T Purusothaman,IJCSNS 9 (3), 312

2009

59

A Novel Utility Sentient Approach for Mining Interesting Association Rules,S Shankar, T Purusothaman,International Journal of Engineering and Technology 1 (5), 454

2009

60

Cryptanalysis of vigenere cipher using genetic algorithm and dictionary analysis, T Purusothaman, V Gopalakrishnan, S Arumugam, V Palanisamy, Proceedings of the IASTED International Conference 597 (803), 246

2009

61

Evaluation of Network Life Time of Wireless Sensor Networks Using Hierarchical Energy Tree Based Routing Algorithm with Exponential Congestion Control, M Kalpana, T Purusothaman, International Journal of Soft Computing 4 (5), 185-196

2009

62

Novel algorithm for mining high utility itemsets,S Shankar, T Purusothaman, S Jayanthi,Computing, Communication and Networking, 2008. ICCCn 2008. International 

2008

63

Hierarchial Energy Tree Based Energy Aware GPSR (HETEA-GPSR) Algorithm for Wireless Sensor Networks, M Kalpana, T Purusothaman, i-Manager's Journal on Software Engineering 2 (3), 43

2008

64

An Efficient Hybrid Re-keying Mechanism for Secure Group Communication,T Purusothaman, S Annadurai, V Gopalakrishnan,JOURNAL-INSTITUTION OF ENGINEERS INDIA PART ET ELECTRONICS AND

2007

65

Key Management in Group Communications, S Annadurai, T Purusothaman, R Reji, Global Networking, 35

2005

66

Dynamically Scalable, Heterogeneous and Generic Architecture for a Grid of Workstations,T Purusothaman, S Annadurai, HV Ganesh, CT Chockalingam, BU Kumar,Journal of Grid Computing 2 (3), 239-246

2004

67

GLS with secure routing in ad-hoc networks, V Sumathy, P Narayanasmy, K Baskaran, T Purusothaman, TENCON 2003. Conference on Convergent Technologies for the Asia-Pacific …

2003

68

An adaptive tree structure algorithm for efficient key management in group communication, T Purusothaman, S Annadurai, R Shanmugalakshmi, ML Valarmathi, Proceedings of the 15th international conference on Computer communication

2002

69

AN IMPROVED GA-MILSVM CLASSIFICATION APPROACH FOR DIAGNOSIS OF BREAST LESIONS FROM STAIN IMAGES,PT Selvy, V Palanisamy, T Purusothaman

1963