forked from hkedia321/marimuthuk_website
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathresearch-publications.html
executable file
·437 lines (377 loc) · 26.1 KB
/
research-publications.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>Dr. Marimuthu Karuppiah Vellore Institute of Technology(VIT) | Research Publications</title>
<meta name="description" content="Dr. Marimuthu Karuppiah is a professor of Computer Science and Engineering in VIT University, Vellore. He is involved in several research works also. This page is about his Research Publications.">
<meta name="author" content="Harshit Kedia, geek.harshitkedia@gmail.com,Marimuthu Karuppiah">
<meta name="keywords" content="Marimuthu,Karuppiah,professor,VIT,faculty,portfolio,research,publications,papers,website,computer,science,Research Publications">
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta http-equiv="Content-Type" content="text/html">
<meta property="og:type" content="website" />
<meta property="og:url" content="http://marimuthuk.com/">
<meta property="og:site_name" content="Dr. Marimuthu K" />
<meta property="og:url" content="marimuthuk.com" />
<meta property="og:title" content="Dr. Marimuthu Karuppiah Vellore Institute of Technology(VIT) | Research Publications" />
<meta property="og:description" content="Dr. Marimuthu Karuppiah is a professor of Computer Science and Engineering in VIT University, Vellore. He is involved in several research works also. This page is about his Research Publications." />
<meta property="og:image" content="imgs/profilePic.png" />
<link rel="icon" type="img/png" href="imgs/m.png">
<link rel="stylesheet" type="text/css" href="bootstrap/css/bootstrap.min.css">
<link rel="stylesheet" type="text/css" href="css/fontawesome/css/font-awesome.min.css">
<link rel="stylesheet" type="text/css" href="css/css.css">
</head>
<body>
<div class="container bodyContainer">
<div class="container navContainer col-sm-3">
<div class="row">
<div id="" class="">
<div class="sidebar-nav">
<div class="navbar navbar-default navDiv1" role="navigation">
<div class="container-fluid aboveNav">
<div class="aboveNav2 col-sm-12">
<a href="index.html" id="photoName" class="linkStyleNone"><img alt="pic" src="imgs/profilePic2.png" class="img-thumbnail img-circle marimuthuPic visible-md visible-lg" id="marimuthu1">
<h3 class="navname">Dr. Marimuthu Karuppiah</h3>
</a>
<h4 class="navname"><a href="http://www.vit.ac.in" target="_blank">Vellore Institute of Technology</a></h4>
<br class="onlybigbr">
</div>
</div>
<div class="navbar-header">
<button type="button" class="navbar-toggle" data-toggle="collapse" data-target=".sidebar-navbar-collapse">
<span class="sr-only">Toggle navigation</span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
</div>
<div class="navbar-collapse collapse sidebar-navbar-collapse">
<ul class="nav navbar-nav">
<li><a href="index.html">Biography</a><span class="underline"></span></li>
<li><a href="academic-qualifications.html">Academic Qualifications</a><span class="underline"></span></li>
<li><a href="awards-and-achievements.html">Awards and Achievements</a><span class="underline"></span></li>
<li><a href="professional-memberships.html">Professional Memberships</a><span class="underline"></span></li>
<li><a href="teaching-experience.html">Teaching Experience</a><span class="underline"></span></li>
<li><a href="phd-research-work.html">PhD Research Work</a><span class="underline"></span></li>
<li class="active"><a href="research-publications.html">Research Publications</a><span class="underline"></span></li>
<li><a href="editorial-works.html">Editorial works</a><span class="underline"></span></li>
<li><a href="students-corner.html">Student's Corner<span class="badge">2+</span></a><span class="underline"></span></li>
<li><a href="contact-me.html">Contact me</a><span class="underline"></span></li>
<li><a href="miscellaneous.html">Miscellaneous</a><span class="underline"></span></li>
</ul>
</div><!--/.nav-collapse -->
</div>
</div>
</div>
</div>
</div>
<div class="col-sm-9 content">
<div class="contentinner" id="reapub">
<div class="row">
<h1>Research Publications</h1>
<br>
<h4>International journal publications (<span class="red">SCI/JCR Indexing</span>)</h4>
<ol>
<li id="25">
Arijit karati, SK Hafizul Islam and <b>Marimuthu Karuppiah</b> (2018). Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments. Accepted in IEEE Transaction on Industrial Informatics.
(Indexing: <span class="red">SCI</span>, Scopus; Impact Factor: <span class="red">6.764</span>)
</li>
<li id="24">
Xiong Li, Jianwei Niu, Md Zakirul Alam Bhuiyan, Fan Wu, <b>Marimuthu Karuppiah</b>, Saru Kumari (2017). A Robust ECC based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things. IEEE Transaction on Industrial Informatics.
DOI: 10.1109/TII.2017.2773666 (Indexing: <span class="red">SCI, Scopus</span>; Impact Factor:<span class="red">6.764</span> )
</li>
<li id="23">
Arijit Karati, SK Hafizul Islam, G. P. Biswas, Md Zakirul Alam Bhuiyan, Pandi Vijayakumar, <b>Marimuthu Karuppiah</b> (2017). Provably Secure Identity-based Signcryption Scheme for Crowd- sourced Industrial Internet of Things Environments. IEEE Internet of Things Journal. DOI: 10.1109/JIOT.2017.2741580
</li>
<li id="22">
Rifaqat Ali, Arup Kumar Pal, Saru Kumari, <b>Marimuthu Karuppiah</b>, Mauro Conti(2017). A
secure user authentication and key-agreement scheme using wireless sensor networks for agriculture
monitoring. Future Generation Computer Systems(Elsevier).
DOI: http://dx.doi.org/10.1016/j.future.2017.06.018
(Indexing: <span class="red">SCI, Scopus</span>; Impact Factor: <span class="red">3.997</span>;SNIP: <span class="red">3.323</span>).
</li>
<li id="21">
Rajkumar Soundrapandian, <b>Marimuthu Karuppiah</b>, Saru Kumari, Sanjay Kumar Tyagi, Fan
Wu and Ki-Hyun Jung(2017). An Efficient DWT and Intuitionistic Fuzzy based Multimodality
Medical Image Fusion. International Journal of Imaging Systems and Technology(Wiley).
DOI: 10.1002/ima.22216.
(Indexing: <span class="red">SCI Expanded, Scopus</span>; Impact Factor: <span class="red">1.139</span>;SNIP: <span class="red">0.81</span>).
</li>
<li id="20">
P Vijayakumar,P Pandiaraj, <b>Marimuthu Karuppiah</b>, Jegatha Deborah (2017). An efficient
secure communication for healthcare system using wearable devices. Computer and Electrical
Engineering(<span class="blue">Elsevier</span>). http://doi.org/10.1016/j.compeleceng.2017.04.014
(Indexing: <span class="red">SCI Expanded, Scopus</span>; Impact Factor: <span class="red">1.084</span>;SNIP: <span class="red">1.164</span>).
</li>
<li id="19">
Saru Kumari, <b>Marimuthu Karuppiah</b>, Ashok Kumar Das, Xiong Li, Fan Wu(2017). An enhanced authentication scheme using elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing (<span class="blue">Springer</span>). DOI: http://dx.doi.org/10.1007/s11227-017-2048-0
(Indexing: <span class="red">SCI, Scopus</span>; Impact Factor: <span class="red">1.088</span>;SNIP: <span class="red">1.065</span>).
</li>
<li id="18">
Fan Wu, Xiong Li, Lili Xu, Saru Kumari, <b>Marimuthu Karuppiah</b> and Jian Shen (2017). A
lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Computer and Electrical Engineering(<span class="blue">Elsevier</span>).
http://doi.org/10.1016/j.compeleceng.2017.04.014
(Indexing:<span class="red"> SCI Expanded, Scopus</span>; Impact Factor: <span class="red">1.084</span>;SNIP: <span class="red">1.164</span>).
</li>
<li id="17">
Xiong Li, Jieyao Peng, Saru Kumari, Fan Wu, <b>Marimuthu Karuppiah</b>, Kim-Kwang Raymond
Choo (2017). An Enhanced 1-Round Authentication Protocol for Wireless Body Area Networks
with User Anonymous. Computer and Electrical Engineering(<span class="blue">Elsevier</span>).
DOI: http://dx.doi.org/10.1016/j.compeleceng.2017.02.011
(Indexing: <span class="red">SCI Expanded, Scopus</span>; Impact Factor: <span class="red">1.084</span>;SNIP: <span class="red">1.164</span>).
</li>
<li id="18">
Saru Kumari, <b>Marimuthu Karuppiah</b>, Ashok Kumar Das, Xiong Li, Fan Wu, Jianghong
Wei,(2017). A Secure ECC-based Authentication Scheme with User Anonymity for Session Initiation
Protocol-based Communications. Journal of Ambient Intelligence and Humanized Computing(<span class="blue">Springer</span>),
DOI: 10.1007/s12652-017-0460-1
(Indexing: <span class="red">SCI Expanded, Scopus</span>; Impact Factor: <span class="">0.835</span>; SNIP: <span class="red">1.048</span>).
</li>
<li id="16">
Xiong Li, Jianwei Niu, <b>Marimuthu Karuppiah</b>, Saru Kumari, Fan Wu(2016). Secure and Effi-
cient Two-factors User Authentication Scheme with User Anonymity for Network Based E-Health
Care Applications. <i>Journal of Medical Systems</i> (<span class="blue">Springer 40:268</span>), DOI: 10.1007/s10916-016-0629-8.
(Indexing: <span class="red">SCI, Scopus</span>; Impact Factor: <span class="red">2.213</span>;SNIP: <span class="red">1.407</span>).
</li>
<li id="15">
<b>Marimuthu Karuppiah</b>, Saru Kumari, Xiong Li, Fan Wu, Muhammad Khurram Khan, R
Saravanan, Sayantani Basu,(2016). A Dynamic ID-based Generic Framework for Anonymous
Authentication Scheme for Roaming Service in Global Mobility Networks. <i>Wireless Personal
Communication</i> (<span class="blue">Springer</span> 93(2), PP. 383-407), DOI: 10.1007/s11277-016-3672-3.
(Indexing: <span class="red">SCI Expanded</span>, Scopus; Impact Factor: <span class="red">0.701</span>).
</li>
<li id="1">
Saru Kumari, <b>Marimuthu Karuppiah</b>, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu
(2016). A Secure Trust-Extended Authentication Mechanism for VANETs. <i>Security and Communication
Networks</i>(<span class="blue">Wiley</span>), DOI: 10.1002/sec.1602. 9(17), PP.4255-4271
<br>
(Indexing: <span class="red">SCI Expanded, Scopus</span>; Impact Factor: <span class="red">0.806</span>).
</li>
<li id="2">
<b>Marimuthu Karuppiah</b>, Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Sayantani
Basu,(2016). A Secure Lightweight Authentication Scheme with User Anonymity for Roaming Service in Ubiquitous Networks. <i>Security and Communication Networks</i> (<span class="blue">Wiley</span>), DOI:10.1002/sec.1598. 9(17), PP.4192-4209
(Indexing: <span class="red">SCI Expanded</span>, <span class="red">Scopus</span>; Impact Factor: <span class="red">0.806</span>).
</li>
<li id="3"><b>Marimuthu Karuppiah</b>(2016). Remote User Authentication Scheme using Smart card: A Review.
<i>International Journal of Internet Protocol Technology</i>,(<span class="blue">Inderscience</span>), 9(2/3): 107-120. 9(17), PP.3527-3542
<br>
(Indexing:<span class="red">Emerging Sources Citation Index(ESCI)-Thomson Reuters</span>, <span class="red">Scopus</span>; SNIP: <span class="red">0.19</span>).
</li>
<li id="4">
Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Muhammad Khurram Khan,
<b>Marimuthu Karuppiah</b>, Renuka Baliyan(2016). A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. <i>Security and Communication Networks</i>(<span class="blue">Wiley</span>), DOI: 10.1002/sec.1558.
(Indexing: <span class="red">SCI Expanded</span>, <span class="red">Scopus</span>; Impact Factor: <span class="red">0.806</span>).
</li>
<li id="5">
<b>Marimuthu Karuppiah</b> and R Saravanan. A secure authentication scheme with user anonymity
for roaming service in global mobility networks. <i>Wireless Personal Communications</i>(Springer),
84(3):2055–2078, 2015.<br>
(Indexing: <span class="red">SCI Expanded, Scopus</span>; Impact Factor: <span class="red">0.701</span>).
</li>
</ol>
<h4>Internaltional Journal Publications (<span class="red">SCOPUS Indexing</span>)</h4>
<ol>
<li>
Balamurugan P, Viswa Bharathy AM, <b>Marimuthu K</b>, Niranchana R (2018). TYPE-SPECIFIC CLASSIFICATION OF BRONCHOGENIC CARCINOMAS USING BI-LAYER MUTATED PARTICLE SWARM OPTIMIZATION. International Journal of Computer Aided Engineering and Technology (Inderscience). Article in Press.
(Indexing: <span class="red">Scopus</span>; SNIP: <span class="red">0.325</span>)
</li>
<li>
P Balamurugan, <b>Marimuthu Karuppiah</b>, A Mummoorthy, Viswabharathi and Niranchana R (2018). Consistent and Effective Energy Utilization of Node Model for Securing Data in Wireless Sensor Networks. International Journal of Grid and Utility Computing(Inderscience), Article in Press
(Indexing: Emerging Sources Citation Index(ESCI)-Thomson Reuters, <span class="red">Scopus</span>; SNIP: <span class="red">0.629</span>)
</li>
<li>
Sayantani Basu, <b>Marimuthu Karuppiah</b>, S Rajkumar, R. Niranchana (2017). Modification of
AES using Genetic Algorithms for High-Definition Image Encryption. International Journal of
Intelligent Systems Technologies and Applications(Inderscience), Article in Press.
(Indexing: <span class="red">Scopus</span>, EI; Impact Factor: SNIP: <span class="red">0.309</span>)
</li>
<li>
Asha Jerlin, <b>Marimuthu Karuppiah</b> (2018). A New malware detection system using machine learning for API call sequence. Journal of Applied Security Research(Taylor & Francis), 13(1), 1–9.
(Indexing: Emerging Sources Citation Index(ESCI)-Thomson Reuters, <span class="red">Scopus</span>; SNIP: <span class="red">0.248</span>)
</li>
<li>
Amit Patil, <b>K Marimuthu</b>, Nagaraja Rao A, R Niranchana (2017). Comparative study of cloud
platforms to develop a Chatbot. Accepted in International Journal of Engineering & Technology.
(Indexing: <span class="red">Scopus</span>; Impact Factor: SNIP: <span class="red">0.00</span>).
</li>
<li>
Akshat Pradhan, <b>Marimuthu Karuppiah</b>, Niranchana R, Asha Jerlin M and Rajkumar S (2017).
Design and Analysis of Smart Card based Authentication Scheme for Secure Transactions. Accepted in International Journal of Internet Technology and Secured Transactions(<span class="blue">Inderscience</span>)
(Indexing: <span class="red">Scopus</span>; Impact Factor: SNIP: <span class="red">3.323</span>).
</li>
<li>
P.Vijaya Kumar, Perumal Pandiaraja, B Balamurugan and <b>Marimuthu Karuppiah</b>(2016). A
Novel Performance enhancing Task Scheduling Algorithm for Cloud based E-Health Environment.
<i>International Journal of E-Health and Medical Communications (IJEHMC)</i>,(<span class="blue">IGI-Global</span>), <b>Article
in press</b>.
(Indexing: <span class="red">ACM Digital Lib, Scopus</span>; SNIP: <span class="red">0.36</span>).
</li>
<li id="6">
<b>Marimuthu Karuppiah</b> and R Saravanan. Cryptanalysis and an improvement of new remote
mutual authentication scheme using smart cards. <i>Journal of Discrete Mathematical Sciences and
Cryptography</i>(<span class="blue">Taylor & Francis</span>), 18(5):623–649, 2015.<br>
(Indexing: <span class="red">Scopus</span>; SNIP: <span class="red">0.09</span>).
</li>
<li>
<b>Marimuthu Karuppiah</b> and R Saravanan. A secure remote user mutual authentication scheme
using smart cards. <i>Journal of Information Security and Applications</i>(<span class="blue">Elsevier</span>), 19(4):282–294, 2014.<br>
(Indexing:<span class="red">Scopus</span>; SNIP: <span class="red">0.85</span>).
</li>
<li id="8">
P. Boominathan, <b>Marimuthu K</b>, Apoorva Shenoy, Garima Hooda and Satish Reddy. An Approach
towards Defense of DDOS Attacks in Cloud Computing using Confidence based Filtering and
Hop Count Filtering Techniques. <span class=""><i>International Journal of Applied Engineering Research</i></span>, 9(20),
7177–7190, 2014.<br>
(Indexing: <span class="red">Scopus</span>; SNIP: <span>0.12</span>).
</li>
<li id="9">
<b>Marimuthu K</b>, D Ganesh Gopal, Ginni Malik and P Boominathan. A Secured Cloud System and
Log Records based on 2LE. <i>International Journal of Applied Engineering Research</i>,9(20), 7435–7451,
2014.<br>
(Indexing: <span class="red">Scopus</span>; SNIP: <span>0.12</span>).
</li>
<li id="10">
<b>Marimuthu K</b>, D Ganesh Gopal, Harshita Mehta and Aditya Rajan, P Boominathan, “A Novel
way of integrating voice recognition and one-time passwords to prevent password phishing attacks.
2/5
<i>International Journal of Distributed and Parallel Systems</i>, 5(4), 11–20, 2014.
</li>
<li id="11">
Upadhyaya P, Anjana V, V Jain V, <b>Marimuthu K</b>, Ganesh Gopal D. Practical System for Querying
Encrypted Data on the Cloud. <i>International Journal of Engineering and Technology</i>, 5(2),
0975–4024, 2013.<br>
(Indexing: <span class="red"> Scopus</span>; SNIP: <span class="red">0.36</span>)
</li>
<li id="12">
Gupta S, Rajkumar S, Vijayarajan V, <b>Marimuthu K</b>. Quantitative Analysis of various Image
Fusion techniques based on various metrics using different Multimodality Medical Images. <i>International
Journal of Engineering and Technology</i>,5(1), 2013.<br>
(Indexing: <span class="red">Scopus</span>; SNIP: <span class="red">0.36</span>)
</li>
<li id="13">
Sriram Ramanujam, <b>Marimuthu Karuppiah</b>. Designing an algorithm with high Avalanche Effect.
<i>International Journal of Computer Science and Network Security</i>, 11(1) 106–111, 2011.<br>
(Indexing: <span class="red">Emerging Sources Citation Index (ESCI)-Thomson Reuters, EBSCOHOST</span>).
</li>
<li id="14">
<b>Marimuthu K</b>, Ganesh Gopal D. A Novel Approach for Efficient Resource Utilization and Trustworthy
Web Service. <i>International Journal of Computer Science and Security</i>, 5(2), 168–180, 2011.
</li>
</ol>
<h4>Internaltional Journal Publications (miscellaneous)</h4>
<ol>
<li>P Thanapal, <b>K Marimuthu</b>, S Rajkumar, R Niranchana (2017). Smarter Way to Access Multiple
Mobile Cloud Applications without Interoperability Issues. International Journal of Wireless and
Microwave Technologies(IJWMT), 7(5), pp. 32–39. (Indexing: EBSCOHOST, Google scholar,
DOAJ).
</li>
<li><b>K Marimuthu</b>, Anuj Shankar, Rashmi Ranganathan and Niranchana R (2017). Product Opinion
Analysis Using Text Mining And Analysis. International Journal of Smart Grid and Green Com-
munications (Inderscience), Article in press . (Indexing: EBSCOHOST, Google scholar, DOAJ).
</li>
<li>Rushikesh Shingade, <b>K Marimuthu</b>, Nagaraja Rao A and R Niranchana (2017). Healthcare Prod-
ucts Management and System Analysis in Cloud Computing Environment (Salesforce). Advances in
Computational Sciences and Technology(ACST), 10(19), pp.2823–2834 (Indexing: EBSCOHOST,
Google scholar, DOAJ).
</li>
<li>Niketan Jivane, Supriya Jivane, S.Rajkumar and <b>K.Marimuthu</b> (2016). Enhancement of An
Algorithm To Extract Text-Lines From Images For Blind And Visually Impaired Persons Through
Parallel Approach. International Journal of Computer Sciences and Engineering, 4(9), pp. 26–34.
(Indexing: CiteSeerX, DOAJ.
</li>
<li><b>Marimuthu K</b>, D Ganesh Gopal, Harshita Mehta and Aditya Rajan, P Boominathan, “A Novel
way of integrating voice recognition and one-time passwords to prevent password phishing attacks.
International Journal of Distributed and Parallel Systems, 5(4), 11–20, 2014.
(Indexing: EBSCOHOST, Google scholar, DOAJ).
</li>
<li>Sriram Ramanujam, <b>Marimuthu Karuppiah</b> . Designing an algorithm with high Avalanche Effect.
International Journal of Computer Science and Network Security, 11(1) 106–111, 2011.
(Indexing: Emerging Sources Citation Index (ESCI)-Thomson Reuters, EBSCOHOST).
</li>
<li><b>Marimuthu K</b>, Ganesh Gopal D. A Novel Approach for Efficient Resource Utilization and
Trustworthy Web Service. International Journal of Computer Science and Security, 5(2), 168–180,
2011.
(Indexing: Emerging Sources Citation Index (ESCI)-Thomson Reuters, EBSCOHOST).
</li>
<li>B Balamurugan, <b>K Marimuthu</b>, S Rajkumar, Mamdouh Alenezi and R Niranchana (2016). Is
cloud secure?. International Journal of Computer Sciences and Engineering, 4(10), 126–129, 2016
(Indexing: CiteSeerX, DOAJ)
</li>
</ol>
<h4>International conferences publications</h4>
<ol>
<li>
Niranchana Radhakrishnan, <b>Marimuthu Karuppiah</b>, P Vijayakumar and Md Zakirul Alam
Bhuiyan (2017). Security on ’A lightweight authentication scheme with user untraceability’. Third
International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications
, Guangzhou, China. DOI: 10.1007978-3-319-72395-2 4 5
</li>
<li>
Arvind Pillai, S Rajkumar, <b>K Marimuthu</b>, G Rajasekaran(2017). Adaptive new top-hat transform
and multi-scale sequential toggle operator based infrared image enhancement. Accepted in
International Conference on Innovations in Power and Advanced Computing Technologies 2017,
India.
</li>
<li>
Akshat Pradhan, <b>Marimuthu Karuppiah</b>, Niranchana R and P.VijayKumar (2016). Secure
protocol for Subscriber Identity Module. Proc, in ICRTCCM’17, Tindivanam, India.
</li>
<li>
Marimuthu Karuppiah, Akshat Pradhan, Saru Kumari, Ruhul Amin and Rajkumar S (2016).
Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities". Proc.
in ICMC 2017, Kolkata, India.
</li>
<li>
Saru Kumari, <b>Marimuthu Karuppiah</b>(2016). Security Problems of a 'More Secure Remote User Authentication Scheme'. Proc. in ICACCCT-2016, pp. 521–522, Ramanathapuram,India.
</li>
<li>Amutha Prabakar M, M Karthikeyan, <b>K Marimuthu</b>, “An efficient technique for preventing SQL
injection attack using pattern matching algorithm” , International Conference on Emerging Trends
in Computing, Communication and Nanotechnology (ICE-CCN), 2013. IEEE. (<span class="red">Scopus</span>)
</li>
<li id="con3">
<b>K.Marimuthu</b>, D.Ganesh Gopal ,Shivam Aditya ,Varun Mittal. Cryptanalysis of oPass. IEEE
International Conference on Advanced Communication Control and Computing Technologies
(ICACCCT)-2014, PP 1945-1950. (<span class="red">Scopus</span>)
</li>
<li id="con4">
<b>K.Marimuthu</b>, D.Ganesh Gopal , K.Sashi Kanth ,Srujay Setty, Kunal Tainwala. Scalable and
Secure Data Sharing for Dynamic Groups in Cloud. IEEE International Conference on Advanced
Communication Control and Computing Technologies(ICACCCT)-2014, PP. 1697–1701. (<span class="red">Scopus</span>)
</li>
</ol>
<h4>Book Chapters</h4>
<ol>
<li>Balamurugan B, Tamizh arasi, Reddy R, Aishwarya T, Thusitha M and <b>Marimuthu Karuppiah</b>(
2016), Enhancing Quality of service in Cloud Gaming System : An Active Implementation
Framework for Enhancing Quality of Service in Multi-Player Cloud Gaming. In P.Venkata Krishna,
Emerging Technologies and Applications for Cloud-Based Gaming (Article in press). Pennsylvania
(USA): IGI Global publisher.
(Indexing: <span class="red">Scopus</span>)
</li>
</ol>
<h4>Books Published</h4>
<ol>
<li><b>Marimuthu Karupiah</b>, Rama Bhagwatrao Gaikwad and R. Niranchan, Computer Organization & Architectures, ISBN: 978-93-86532-49-7, Charulatha Publishers, Chennai, India.</li>
</ol>
</div>
</div>
<div class="row">
<footer class="footer">
<div class="hr"></div>
<div class="text-center"><div class="connectme">connect with me on</div> <a href="https://scholar.google.co.in/citations?user=AMC7s4AAAAAJ&hl=en" target="_blank"><img src="imgs/googlescholar.png" title="Google Scholar" class="img-responsive"/></a> <a href="https://www.researchgate.net/profile/Marimuthu_Karuppiah" target="_blank"><img src="imgs/rg.png" title="Research Gate" class="img-responsive"></a> <a href="https://www.linkedin.com/in/marimuthu-karuppiah-456b8795" target="_blank"><img src="imgs/linkedin.png" title="LinkedIn" class="img-responsive"></a></div>
</footer>
</div>
</div>
</div>
<script type="text/javascript" src="js/jquery.js"></script>
<script type="text/javascript" src="bootstrap/js/bootstrap.min.js"></script>
<script type="text/javascript" src="js/myjs.js"></script>
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','https://www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-80852658-1', 'auto');
ga('send', 'pageview');
</script>
</body>
</html>