Year : 2021
Cite this Research Publication : Dr. Harini N., Mani, S. M. Kannan, and M Bharatwaj, B., “A Scheme to Enhance the Security and Efficiency of MQTT Protocol”, Smart Innovation, Systems and Technologies, 2021.
Publisher : Smart Innovation, Systems and Technologies
Year : 2021
Cite this Research Publication : Neethu M. R., Dr. Harini N., and Abirami K., “Investigating Peers in Social Networks: Reliable or Unreilable”, Advances in Distributed Computing and Machine Learning, vol. pp 173-180, 2021.
Publisher : Advances in Distributed Computing and Machine Learning
Year : 2020
Cite this Research Publication : S. S. Hari, Harini, G., P. Kumar, H., Vinod, K. V., and Dr. Harini N., “Integrity Preserved Multifactor Authentication based Automated Ticketing System”, International Journal of Advanced Science and Technology, 2020.
Publisher : International Journal of Advanced Science and Technology
Year : 2019
Cite this Research Publication : AlaguVignesh and Dr. Harini N., “Diminishing Spread of False Message in Twitter using Block chain and Machine Learning”, International Journal of Engineering and Advanced Technology, vol. 9, no. 1, pp. 4933-4937, 2019.
Publisher : International Journal of Engineering and Advanced Technology,
Year : 2019
Cite this Research Publication : M. Smruthi and Dr. Harini N., “A hybrid Scheme for Detecting Fake Accounts in Facebook”, International Journal of Recent Technology and Engineering (IJRTE), vol. 7, no. 5S3, 2019.
Publisher : International Journal of Recent Technology and Engineering (IJRTE)
Year : 2019
Cite this Research Publication : S. Hari, Kavinkumar, C., Niketh, G. K., and Dr. Harini N., “Enhancing security of one time passwords in online banking systems”, International Journal of Recent Technology and Engineering, vol. 7, pp. 319-324, 2019.
Publisher : International Journal of Recent Technology and Engineering
Year : 2019
Cite this Research Publication : Neethu M. R. and Dr. Harini N., “A Model to Ensure Business Ethicsin Social Networks”, International Journal of Scientific and Technology Research, vol. 8, no. 10, pp. 586-591, 2019.
Publisher : International Journal of Scientific and Technology Research
Year : 2019
Cite this Research Publication : S. Pramothini, Pavan, S., and Dr. Harini N., “Securing Images with Fingerprint Data using Steganography and Blockchain”, International Journal of Recent Technology and Engineering, vol. 7, no. 4, pp. 82-85, 2019.
Publisher : International Journal of Recent Technology and Engineering
Year : 2019
Cite this Research Publication : M. S. Srinivas, Manchikanti, B., G. Babu, C., and Dr. Harini N., “A secure scheme to manage complex password capable of overcoming human memory limitations”, International Journal of Recent Technology and Engineering, vol. 7, pp. 137-143, 2019.
Publisher : International Journal of Recent Technology and Engineering, Blue Eyes Intelligence Engineering and Sciences Publication
Year : 2019
Cite this Research Publication : A. P. Jayan, Balasubramani, A., Kaikottil, A., and Dr. Harini N., “An enhanced scheme for authentication using OTP and QR code for MQTT protocol”, International Journal of Recent Technology and Engineering, vol. 7, pp. 70-75, 2019.
Publisher : International Journal of Recent Technology and Engineering, Blue Eyes Intelligence Engineering and Sciences Publication,
Year : 2018
Cite this Research Publication : Dr. Harini N., Kumar, M., Ananthasayanam, A., Aravind, A., and Aravindh, R., “Multi-factor Authentication using IMEI Encrypted Color QRcode”, International Journal of Pure and Applied Mathematics, vol. 119, no. 12, pp. 13771 -13780, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Cite this Research Publication : P. S. Vaidhyesh, Mukund, W. N., G Varshni, S., and Dr. Harini N., “Secure Proxy Blind ECDS Algorithm for IoT”, International Journal of Pure and Applied Mathematics , vol. 119, 2018.
Publisher : International Journal of Pure and Applied Mathematics.
Year : 2018
Cite this Research Publication : S. P. Dhevi, Subash, A. S., and Dr. Harini N., “Security in Online Games using Blockchain”, International Journal of Pure and Applied Mathematics, vol. 119, no. 15, pp. 1661-1669, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Cite this Research Publication : P. S. Vaidhyesh, Mukund, W. N., G. Varshni, S., and Dr. Harini N., “Securing iot Devices by Generating QR Codes”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13743-13748, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Cite this Research Publication : M. SivaYogitha, Gopal, P. R., and Harini, N., “Securing Conversation in Online Social Networking”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1639-1648, 2018.
Publisher : International Journal of Pure and Applied Mathematics, Academic Press
Year : 2018
Cite this Research Publication : K. Ramakrishna and Dr. Harini N., “Secure Video Transmission”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1649-1659, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Cite this Research Publication : A. P. Jayan and Dr. Harini N., “A Scheme to Enhance the Security of MQTT Protocol”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13975-13981, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Cite this Research Publication : Neethu M. R. and Dr. Harini N., “Safe sonet: A Framework for Building Trustworthy Relationships”, International Journal of Engineering and Technology(UAE), vol. 7, pp. 57-62, 2018.
Publisher : International Journal of Engineering and Technology(UAE), Science Publishing Corporation Inc
Year : 2018
Cite this Research Publication :
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Cite this Research Publication : N. Joshy, Kumar, M. G., Mukhilan, P., Prasad, V. M., Ramasamy, T., and Dr. Harini N., “Multi-factor authentication scheme for online examination”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1705-1712, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Cite this Research Publication : Dr. Harini N., M. Kumar, Ananthasayanam, A., Aravind, A., and Aravindh, R., “A hybrid infallible scheme for secure audio exchange”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13771-13780, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2018
Cite this Research Publication : K. V. V. N. S. Kiran and Harini, N., “Evaluating Efficiency of HMAC and Digital Signatures to Enhance Security in IoT”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13991-13996, 2018.
Publisher : International Journal of Pure and Applied Mathematics
Year : 2016
Cite this Research Publication : Dr. Harini N. and Suryapraba, “CHATGAURD’-A System that Ensures Safe a Posting in Social Networking Sites”, International Journal f Engineering and Technoloty, 2016.
Publisher : International Journal f Engineering and Technoloty
Year : 2016
Cite this Research Publication : Dr. Harini N. and , “A System to Screen Posts that Minimize user Frustration”, International Journal of Applied Engineering Research, vol. 11, no. 6, pp. 3944- 3949, 2016.
Publisher : International Journal of Applied Engineering Research
Year : 2015
Cite this Research Publication : .G, S., and Dr. Harini N., “Securing Information Transfer In Online Gaming”, International Journal of Applied Engineering Research, vol. 10, pp. 2747-2751, 2015.
Publisher : International Journal of Applied Engineering Research
Year : 2015
Cite this Research Publication : H. A. Raman, MuraliKrishnan, E., Abishek, M., SaiSandhesh, R., Vijaykanth, K., and Dr. Harini N., “Analysis of twitter feeds using natural language processing and machine learning”, International Journal of Applied Engineering Research, vol. 10, pp. 18911-18916, 2015.
Publisher : International Journal of Applied Engineering Research
Year : 2014
Cite this Research Publication : K. S., K., P., ,, ,, and Dr. Harini N., “Vulnerability Analysis and Security System for NFC Enabled Mobile Phones”, International Journal of Scientific Technology Research, vol. 3, pp. 207-210, 2014.
Publisher : International Journal of Scientific Technology Research
Year : 2013
Cite this Research Publication : Dr. Harini N. and Padmanabhan, T. R., “Admission Control and Request Scheduling for Secured-concurrent-available Architecture”, International Journal of Computer Applications, vol. 63, pp. 24-30, 2013.
Publisher : International Journal of Computer Applications
Year : 2013
Cite this Research Publication : Dr. Harini N. and Padmanabhan, T. R., “2CAuth: A new two factor authentication scheme using QR-code”, International Journal of Engineering and Technology, vol. 5, pp. 1087-1094, 2013.
Publisher : International Journal of Engineering and Technology
Year : 2010
Cite this Research Publication : Dr. Harini N., Shyamala, C. K., and Padmanabhan, T. R., “Securing Cloud Environment”, Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives: Applications and Perspectives, p. 115, 2010.
Publisher : IGI Global