Dr. Marimuthu Karuppiah

Associate Professor
VIT University, India


Highest Degree
Ph.D. in Computer Science and Engineering from VIT University, India

Share this Profile

Biography

Dr. Marimuthu Karuppiah is currently working as an Associate Professor in the School of Computing Science and Engineering(SCOPE) in VIT University, Vellore. Prior to joining VIT University, he held academic position of Senior lecturer in Department of Computer Science and Engineering, Syed Ammal Engineering College, Ramanathapuram, India from March 2005 to November 2008. He received his Ph.D. degree in Computer Science and Engineering from VIT University, Vellore, on August 2015 [July 2009 - August 2015]. He completed ME in Computer Science and Engineering from Anna University, Chennai, in the year 2005. He also received BE degree in Computer Science and Engineering from the Madurai Kamaraj University, Madurai, India, in 2003. His current research interests includes cryptography, wireless sensor network security, mobile ad hoc network security, vehicular ad hoc network security, remote user authentication using smart cards. He has authored over 20 papers in reputed international and conferences. He is a life member of Cryptology Research Society of India (CRSI) and Computer Society of India (CSI).

Area of Interest:

Computer Sciences
Network Security
Computer Engineering
Wireless Networks
Cloud Computing

Selected Publications

  1. Wu, F., L. Xu, S. Kumari, X. Li and A.K. Das et al., 2016. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Networks, 9: 3527-3542.
    CrossRef  |  Direct Link  |  

  2. Kumari, S., M. Karuppiah, X. Li, F. Wu, A.K. Das and V. Odelu, 2016. An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Secur. Commun. Networks, (In Press). 10.1002/sec.1602.
    CrossRef  |  Direct Link  |  

  3. Karuppiah, M., S. Kumari, X. Li, F. Wu and A.K. Das et al., 2016. A dynamic ID-based generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Commun., (In Press). 10.1007/s11277-016-3672-3.
    CrossRef  |  Direct Link  |  

  4. Karuppiah, M., S. Kumari, A.K. Das, X. Li, F. Wu and S. Basu, 2016. A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks. Secur. Commun. Networks, (In Press). 10.1002/sec.1598.
    CrossRef  |  Direct Link  |  

  5. Karuppiah, M., 2016. Remote user authentication scheme using smart card: A review. Int. J. Internet Protocol Technol., 9: 107-120.
    CrossRef  |  Direct Link  |  

  6. Jivane, N., S. Jivane, S. Rajkumar and K. Marimuthu, 2016. Enhancement of an algorithm to extract text-lines from images for blind and visually impaired persons through parallel approach. Int. J. Comput. Sci. Eng., 4: 25-32.

  7. Balamurugan, B., T. Arasi, R. Reddy, T. Aishwarya, M. Thusitha and M. Karuppiah, 2016. Enhancing Quality of service in Cloud Gaming System: An Active Implementation Framework for Enhancing Quality of Service in Multi-Player Cloud Gaming. In: Emerging Technologies and Applications for Cloud-Based Gaming, Krishna, P.V. (Ed.). IGI Global Publisher, Pennsylvania, ISBN: 9781522505471, pp: 228-260.

  8. Karuppiah, M. and R. Saravanan, 2015. Cryptanalysis and an improvement of new remote mutual authentication scheme using smart cards. J. Discrete Math. Sci. Cryptogr., 18: 623-649.
    CrossRef  |  Direct Link  |  

  9. Karuppiah, M. and R. Saravanan, 2015. A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wireless Personal Commun., 84: 2055-2078.
    CrossRef  |  Direct Link  |  

  10. Marimuthu, K., D.G. Gopal, H. Mehta, A. Rajan and P. Boominathan, 2014. A novel way of integrating voice recognition and one time passwords to prevent password phishing attacks. Int. J. Distrib. Parallel Syst., 5: 11-20.
    Direct Link  |  

  11. Marimuthu, K., D.G. Gopal, G. Malik and P. Boominathan, 2014. A secured cloud system and log records based on 2LE. Int. J. Applied Eng. Res., 9: 7435-7451.

  12. Karuppiah, M. and R. Saravanan, 2014. A secure remote user mutual authentication scheme using smart cards. J. Inform. Secur. Applic., 19: 282-294.
    CrossRef  |  Direct Link  |  

  13. Boominathan, P., K. Marimuthu, A. Shenoy, G. Hooda and S. Reddy, 2014. An approach towards defense of DDOS attacks in cloud computing using confidence based filtering and hop count filtering techniques. Int. J. Applied Eng. Res., 9: 7177-7190.

  14. Upadhyaya, P., V. Anjana, V. Jain, K. Marimuthu and D.G. Gopal, 2013. Practical system for querying encrypted data on the cloud. Int. J. Eng. Technol., 5: 1878-1881.
    Direct Link  |  

  15. Gupta, S., S. Rajkumar, V. Vijayarajan and K. Marimuthu, 2013. Quantitative analysis of various image fusion techniques based on various metrics using different multimodality medical images. Int. J. Eng. Technol., 5: 133-141.
    Direct Link  |  

  16. Li, X., J. Niu, M. Karuppiah, S. Kumari and F. Wu, 2012. Secure and efficient two-factor user authentication scheme with user anonymity for network based e-health care applications. J. Med. Syst., Vol. 40. 10.1007/s10916-016-0629-8.
    CrossRef  |  Direct Link  |  

  17. Ramanujam, S. and M. Karuppiah, 2011. Designing an algorithm with high avalanche effect. Int. J. Comput. Sci. Network Secur., 11: 106-111.
    Direct Link  |  

  18. Marimuthu, K. and D.G. Gopal, 2011. A novel approach for efficient resource utilization and trustworthy web service. Int. J. Comput. Sci. Secur., 5: 168-180.
    Direct Link  |