Year : 2021
A Scheme to Enhance the Security and Efficiency of MQTT Protocol
Cite this Research Publication : Dr. Harini N., Mani, S. M. Kannan, and M Bharatwaj, B., “A Scheme to Enhance the Security and Efficiency of MQTT Protocol”, Smart Innovation, Systems and Technologies, 2021.
Publisher : Smart Innovation, Systems and Technologies
Year : 2021
Investigating Peers in Social Networks: Reliable or Unreilable
Cite this Research Publication : Neethu M. R., Dr. Harini N., and Abirami K., “Investigating Peers in Social Networks: Reliable or Unreilable”, Advances in Distributed Computing and Machine Learning, vol. pp 173-180, 2021.
Publisher : Advances in Distributed Computing and Machine Learning
Year : 2020
Integrity Preserved Multifactor Authentication based Automated Ticketing System
Cite this Research Publication : S. S. Hari, Harini, G., P. Kumar, H., Vinod, K. V., and Dr. Harini N., “Integrity Preserved Multifactor Authentication based Automated Ticketing System”, International Journal of Advanced Science and Technology, 2020.
Publisher : International Journal of Advanced Science and Technology
Year : 2019
Diminishing Spread of False Message in Twitter using Block chain and Machine Learning
Cite this Research Publication : AlaguVignesh and Dr. Harini N., “Diminishing Spread of False Message in Twitter using Block chain and Machine Learning”, International Journal of Engineering and Advanced Technology, vol. 9, no. 1, pp. 4933-4937, 2019.
Publisher : International Journal of Engineering and Advanced Technology,
Year : 2019
A hybrid Scheme for Detecting Fake Accounts in Facebook
Cite this Research Publication : M. Smruthi and Dr. Harini N., “A hybrid Scheme for Detecting Fake Accounts in Facebook”, International Journal of Recent Technology and Engineering (IJRTE), vol. 7, no. 5S3, 2019.
Publisher : International Journal of Recent Technology and Engineering (IJRTE)
Year : 2019
Enhancing security of one time passwords in online banking systems
Cite this Research Publication : S. Hari, Kavinkumar, C., Niketh, G. K., and Dr. Harini N., “Enhancing security of one time passwords in online banking systems”, International Journal of Recent Technology and Engineering, vol. 7, pp. 319-324, 2019.
Publisher : International Journal of Recent Technology and Engineering
Year : 2019
A Model to Ensure Business Ethicsin Social Networks
Cite this Research Publication : Neethu M. R. and Dr. Harini N., “A Model to Ensure Business Ethicsin Social Networks”, International Journal of Scientific and Technology Research, vol. 8, no. 10, pp. 586-591, 2019.
Publisher : International Journal of Scientific and Technology Research
Year : 2019
Securing Images with Fingerprint Data using Steganography and Blockchain
Cite this Research Publication : S. Pramothini, Pavan, S., and Dr. Harini N., “Securing Images with Fingerprint Data using Steganography and Blockchain”, International Journal of Recent Technology and Engineering, vol. 7, no. 4, pp. 82-85, 2019.
Publisher : International Journal of Recent Technology and Engineering
Year : 2019
A secure scheme to manage complex password capable of overcoming human memory limitations
Cite this Research Publication : M. S. Srinivas, Manchikanti, B., G. Babu, C., and Dr. Harini N., “A secure scheme to manage complex password capable of overcoming human memory limitations”, International Journal of Recent Technology and Engineering, vol. 7, pp. 137-143, 2019.
Publisher : International Journal of Recent Technology and Engineering, Blue Eyes Intelligence Engineering and Sciences Publication
Year : 2019
An enhanced scheme for authentication using OTP and QR code for MQTT protocol
Cite this Research Publication : A. P. Jayan, Balasubramani, A., Kaikottil, A., and Dr. Harini N., “An enhanced scheme for authentication using OTP and QR code for MQTT protocol”, International Journal of Recent Technology and Engineering, vol. 7, pp. 70-75, 2019.
Publisher : International Journal of Recent Technology and Engineering, Blue Eyes Intelligence Engineering and Sciences Publication,
Year : 2018
Multi-factor Authentication using IMEI Encrypted Color QRcode
Cite this Research Publication :
Dr. Harini N., Kumar, M., Ananthasayanam, A., Aravind, A., and Aravindh, R., “Multi-factor Authentication using IMEI Encrypted Color QRcode”, International Journal of Pure and Applied Mathematics, vol. 119, no. 12, pp. 13771 -13780, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Secure Proxy Blind ECDS Algorithm for IoT
Cite this Research Publication : P. S. Vaidhyesh, Mukund, W. N., G Varshni, S., and Dr. Harini N., “Secure Proxy Blind ECDS Algorithm for IoT”, International Journal of Pure and Applied Mathematics , vol. 119, 2018.
Publisher : International Journal of Pure and Applied Mathematics.
Year : 2018
Security in online games using blockchain
Cite this Research Publication : S. P. Dhevi, Subash, A. S., and Dr. Harini N., “Security in Online Games using Blockchain”, International Journal of Pure and Applied Mathematics, vol. 119, no. 15, pp. 1661-1669, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Securing iot devices by generating QR codes
Cite this Research Publication : P. S. Vaidhyesh, Mukund, W. N., G. Varshni, S., and Dr. Harini N., “Securing iot Devices by Generating QR Codes”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13743-13748, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Securing conversation in online social networking
Cite this Research Publication : M. SivaYogitha, Gopal, P. R., and Harini, N., “Securing Conversation in Online Social Networking”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1639-1648, 2018.
Publisher : International Journal of Pure and Applied Mathematics, Academic Press
Year : 2018
Secure video transmission
Cite this Research Publication : K. Ramakrishna and Dr. Harini N., “Secure Video Transmission”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1649-1659, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
A scheme to enhance the security of MQTT protocol
Cite this Research Publication : A. P. Jayan and Dr. Harini N., “A Scheme to Enhance the Security of MQTT Protocol”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13975-13981, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Safe sonet: A framework for building trustworthy relationships
Cite this Research Publication : Neethu M. R. and Dr. Harini N., “Safe sonet: A Framework for Building Trustworthy Relationships”, International Journal of Engineering and Technology(UAE), vol. 7, pp. 57-62, 2018.
Publisher : International Journal of Engineering and Technology(UAE), Science Publishing Corporation Inc
Year : 2018
Multi-factor authentication using IMEI encrypted color qr code
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Multi-factor authentication scheme for online examination
Cite this Research Publication : N. Joshy, Kumar, M. G., Mukhilan, P., Prasad, V. M., Ramasamy, T., and Dr. Harini N., “Multi-factor authentication scheme for online examination”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1705-1712, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
A hybrid infallible scheme for secure audio exchange
Cite this Research Publication : Dr. Harini N., M. Kumar, Ananthasayanam, A., Aravind, A., and Aravindh, R., “A hybrid infallible scheme for secure audio exchange”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13771-13780, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Evaluating efficiency of HMAC and digital signatures to enhance security in IoT
Cite this Research Publication : K. V. V. N. S. Kiran and Harini, N., “Evaluating Efficiency of HMAC and Digital Signatures to Enhance Security in IoT”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13991-13996, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2016
CHATGAURD’-A System that Ensures Safe a Posting in Social Networking Sites
Cite this Research Publication : Dr. Harini N. and Suryapraba, “CHATGAURD’-A System that Ensures Safe a Posting in Social Networking Sites”, International Journal f Engineering and Technoloty, 2016.
Publisher : International Journal f Engineering and Technoloty
Year : 2016
A System to Screen Posts that Minimize user Frustration
Cite this Research Publication : Dr. Harini N. and , “A System to Screen Posts that Minimize user Frustration”, International Journal of Applied Engineering Research, vol. 11, no. 6, pp. 3944- 3949, 2016.
Publisher : International Journal of Applied Engineering Research
Year : 2015
Securing Information Transfer In Online Gaming
Cite this Research Publication : .G, S., and Dr. Harini N., “Securing Information Transfer In Online Gaming”, International Journal of Applied Engineering Research, vol. 10, pp. 2747-2751, 2015.
Publisher : International Journal of Applied Engineering Research
Year : 2015
Analysis of twitter feeds using natural language processing and machine learning
Cite this Research Publication : H. A. Raman, MuraliKrishnan, E., Abishek, M., SaiSandhesh, R., Vijaykanth, K., and Dr. Harini N., “Analysis of twitter feeds using natural language processing and machine learning”, International Journal of Applied Engineering Research, vol. 10, pp. 18911-18916, 2015.
Publisher : International Journal of Applied Engineering Research
Year : 2014
Vulnerability Analysis and Security System for NFC Enabled Mobile Phones
Cite this Research Publication : K. S., K., P., ,, ,, and Dr. Harini N., “Vulnerability Analysis and Security System for NFC Enabled Mobile Phones”, International Journal of Scientific Technology Research, vol. 3, pp. 207-210, 2014.
Publisher : International Journal of Scientific Technology Research
Year : 2013
Admission Control and Request Scheduling for Secured-concurrent-available Architecture
Cite this Research Publication : Dr. Harini N. and Padmanabhan, T. R., “Admission Control and Request Scheduling for Secured-concurrent-available Architecture”, International Journal of Computer Applications, vol. 63, pp. 24-30, 2013.
Publisher : International Journal of Computer Applications
Year : 2013
2CAuth: A new two factor authentication scheme using QR-code
Cite this Research Publication : Dr. Harini N. and Padmanabhan, T. R., “2CAuth: A new two factor authentication scheme using QR-code”, International Journal of Engineering and Technology, vol. 5, pp. 1087-1094, 2013.
Publisher : International Journal of Engineering and Technology
Year : 2010
Securing Cloud Environment
Cite this Research Publication : Dr. Harini N., Shyamala, C. K., and Padmanabhan, T. R., “Securing Cloud Environment”, Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives: Applications and Perspectives, p. 115, 2010.
Publisher : IGI Global