BibTeX records: Sannasy Muthurajkumar

download as .bib file

@article{DBLP:journals/iajit/Suthanthiramani21,
  author    = {Pradeep Suthanthiramani and
               Sannasy Muthurajkumar and
               Ganapathy Sannasi and
               Kannan Arputharaj},
  title     = {Secured data storage and retrieval using elliptic curve cryptography
               in cloud},
  journal   = {Int. Arab J. Inf. Technol.},
  volume    = {18},
  number    = {1},
  pages     = {56--66},
  year      = {2021},
  url       = {https://doi.org/10.34028/iajit/18/1/7},
  doi       = {10.34028/iajit/18/1/7},
  timestamp = {Wed, 28 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iajit/Suthanthiramani21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Suthanthiramani21,
  author    = {Pradeep Suthanthiramani and
               Sannasy Muthurajkumar and
               Sannasi Ganapathy and
               Arputharaj Kannan},
  title     = {A Matrix Translation and Elliptic Curve Based Cryptosystem for Secured
               Data Communications in WSNs},
  journal   = {Wirel. Pers. Commun.},
  volume    = {119},
  number    = {1},
  pages     = {489--508},
  year      = {2021},
  url       = {https://doi.org/10.1007/s11277-021-08221-9},
  doi       = {10.1007/s11277-021-08221-9},
  timestamp = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/wpc/Suthanthiramani21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/NancyMGKSA20,
  author    = {Periasamy Nancy and
               Sannasy Muthurajkumar and
               Sannasi Ganapathy and
               S. V. N. Santhosh Kumar and
               M. Selvi and
               Kannan Arputharaj},
  title     = {Intrusion detection using dynamic feature selection and fuzzy temporal
               decision tree classification for wireless sensor networks},
  journal   = {{IET} Commun.},
  volume    = {14},
  number    = {5},
  pages     = {888--895},
  year      = {2020},
  url       = {https://doi.org/10.1049/iet-com.2019.0172},
  doi       = {10.1049/iet-com.2019.0172},
  timestamp = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iet-com/NancyMGKSA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MuthurajkumarGV17,
  author    = {Sannasy Muthurajkumar and
               Sannasi Ganapathy and
               Muthuswamy Vijayalakshmi and
               Arputharaj Kannan},
  title     = {An Intelligent Secured and Energy Efficient Routing Algorithm for
               MANETs},
  journal   = {Wirel. Pers. Commun.},
  volume    = {96},
  number    = {2},
  pages     = {1753--1769},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11277-017-4266-4},
  doi       = {10.1007/s11277-017-4266-4},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/wpc/MuthurajkumarGV17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MuthurajkumarVK17,
  author    = {Sannasy Muthurajkumar and
               Muthuswamy Vijayalakshmi and
               Arputharaj Kannan},
  title     = {Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques
               and Chaining Encryption in Cloud Databases},
  journal   = {Wirel. Pers. Commun.},
  volume    = {96},
  number    = {4},
  pages     = {5621--5633},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11277-017-4437-3},
  doi       = {10.1007/s11277-017-4437-3},
  timestamp = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/wpc/MuthurajkumarVK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icia2/MuthurajkumarVK16,
  author    = {Sannasy Muthurajkumar and
               Muthuswamy Vijayalakshmi and
               Arputharaj Kannan},
  editor    = {V. Akila and
               N. Sivakumar and
               K. Saruladha and
               G. Zayaraz and
               E. Ilavarasan},
  title     = {Resource Allocation Between Temporal Cloud Database and User Using
               Access Control},
  booktitle = {Proceedings of the International Conference on Informatics and Analytics,
               {ICIA} 2016, Pondicherry, India, August 25-26, 2016},
  pages     = {37:1--37:4},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2980258.2980338},
  doi       = {10.1145/2980258.2980338},
  timestamp = {Tue, 01 Oct 2019 13:44:39 +0200},
  biburl    = {https://dblp.org/rec/conf/icia2/MuthurajkumarVK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/GanapathyKMVPK13,
  author    = {Sannasi Ganapathy and
               Kanagasabai Kulothungan and
               Sannasy Muthurajkumar and
               Muthuswamy Vijayalakshmi and
               Yogesh Palanichamy and
               Arputharaj Kannan},
  title     = {Intelligent feature selection and classification techniques for intrusion
               detection in networks: a survey},
  journal   = {{EURASIP} J. Wirel. Commun. Netw.},
  volume    = {2013},
  pages     = {271},
  year      = {2013},
  url       = {https://doi.org/10.1186/1687-1499-2013-271},
  doi       = {10.1186/1687-1499-2013-271},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ejwcn/GanapathyKMVPK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics