scispace - formally typeset
B

Balamurugan Balusamy

Researcher at Galgotias University

Publications -  84
Citations -  1339

Balamurugan Balusamy is an academic researcher from Galgotias University. The author has contributed to research in topics: Cloud computing & Computer science. The author has an hindex of 15, co-authored 61 publications receiving 691 citations. Previous affiliations of Balamurugan Balusamy include Xi'an Jiaotong-Liverpool University & VIT University.

Papers
More filters
Journal ArticleDOI

Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks

TL;DR: A computationally efficient anonymous mutual authentication scheme to validate the message source as well as to ensure the integrity of messages along with a conditional tracking mechanism to trace the real identity of misbehaving vehicles and revoke them from VANET in the case of dispute.
Journal ArticleDOI

An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks

TL;DR: The experimental results show that compared to single-SVM, the proposed model achieves more accurate classification with better generalization, and can be embedded within the controller to define security rules to prevent possible attacks by the attackers.
Journal ArticleDOI

Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques

TL;DR: In the proposed work, the elliptic Galois cryptography protocol is introduced and discussed, and a cryptography technique is used to encrypt confidential data that came from different medical sources and embeds the encrypted data into a low complexity image.
Journal ArticleDOI

Securing e-health records using keyless signature infrastructure blockchain technology in the cloud

TL;DR: The results show that the response time of the proposed system with the blockchain technology is almost 50% shorter than the conventional techniques and the cost of storage is about 20% less for the system with blockchain in comparison with the existing techniques.
Journal ArticleDOI

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks

TL;DR: Experimental analysis portrays that the results of this new privacy preserving anonymous authentication and key management schemes are promising and efficient with regard to signature verification cost and computational cost in comparison with the existing schemes.