scispace - formally typeset
M

Muttukrishnan Rajarajan

Researcher at City University London

Publications -  279
Citations -  5737

Muttukrishnan Rajarajan is an academic researcher from City University London. The author has contributed to research in topics: Cloud computing & Encryption. The author has an hindex of 32, co-authored 267 publications receiving 4817 citations. Previous affiliations of Muttukrishnan Rajarajan include Universities UK & University College London.

Papers
More filters
Journal ArticleDOI

Securing electronic health records with novel mobile encryption schemes.

TL;DR: This paper presents a novel protocol that will send the information securely while including the access privileges to the authorized recipient as well as a novel security framework based on long-term security keys.
Proceedings ArticleDOI

Feature selection and data balancing for activity recognition in smart homes

TL;DR: An activity recognition approach is proposed that identifies key features from the information obtained using the sensors deployed in multiple locations and objects that increase the separability between the classes, making the approach suitable for overlapping activities.
Journal ArticleDOI

Characterisation of low-loss waveguide bends with offset-optimisation for compact photonic integrated circuits

TL;DR: In this paper, the least squares boundary residual method is employed to calculate the lateral offset necessary to maximise the transmission and simultaneously to minimize the reflection coefficients at the straight-to-bend waveguide interfaces.
Proceedings ArticleDOI

Anomalies Detection in Smart-Home Activities

TL;DR: An anomaly detection approach for activities performed in a smart home that applies a density based clustering algorithm on the recognized activity instances to separate the normal from the anomalous.
Journal ArticleDOI

DDoS victim service containment to minimize the internal collateral damages in cloud computing

TL;DR: This work shows that DDoS mitigation methods may not provide the expected timely mitigation due to the heavy resource outage created by the attacks, and proposes a novel resource containment approach to enforce the victim's resource limits.