Analysis on homomorphic technique for data security in fog computing A Murugesan, B Saminathan, F Al‐Turjman, RL Kumar Transactions on Emerging Telecommunications Technologies 32 (9), e3990, 2021 | 26 | 2021 |
Mutual authentication and authorized data access between fog and user based on blockchain technology M Arun, S Balamurali, BS Rawal, Q Duan, RL Kumar, B Balamurugan IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 10 | 2020 |
Missing data handling by mean imputation method and statistical analysis of classification algorithm K Maheswari, P Packia Amutha Priya, S Ramkumar, M Arun EAI International Conference on Big Data Innovation for Sustainable …, 2020 | 10 | 2020 |
A lightweight authentication and secure data access between fog and IoT user A Murugesan, B Saminathan, F Al-Turjman, RL Kumar International Journal of Electronic Business 16 (1), 77-87, 2021 | 7 | 2021 |
Secure efficient signature for internet of things over near-ring V Muthukumaran, M Arun, SS Kumar, SD Kumta, MA Kavitha, ... Journal of Physics: Conference Series 1964 (2), 022015, 2021 | 4 | 2021 |
Forex exchange using big data analytics J Sadhasivam, M Arun, R Deepa, V Muthukumaran, RL Kumar, ... Journal of Physics: Conference Series 1964 (4), 042060, 2021 | 3 | 2021 |
Key management for secured group communication A Murugesan, B Saminathan International Journal of Pure and Applied Mathematics 118 (8), 33-38, 2018 | 2 | 2018 |
Algorithms Used in Cryptography and Role of Cryptography in Network Security KP Arun Murugesan, Pradeepkandhasamy Jawahar International Journal of Recent Technology and Engineering 8 (4S2), 3, 2019 | | 2019 |
Attribute - Semantic Based Access Control Policy Model for IoT DMK Arun Murugesan, Dr.Balamurali Saminathan International Journal of Engineering and Advanced Technology 9 (1S4), 5, 2019 | | 2019 |
Preventing Credit Card Fraud Using Dual Layer Security J Inbaraj, P Kandasamy International conference on Computer Networks, Big data and IoT, 579-584, 2018 | | 2018 |