2CAuth: A new two factor authentication scheme using QR-code N Harini, TR Padmanabhan International Journal of Engineering and Technology 5 (2), 1087-1094, 2013 | 63 | 2013 |
A hybrid scheme for detecting fake accounts in facebook M Smruthi, N Harini International Journal of Recent Technology and Engineering (IJRTE) 7 (5S3 …, 2019 | 18 | 2019 |
Cryptography and security CK Shyamala, N Harini, TR Padmanabhan Wiley, 2013 | 16 | 2013 |
Multi-factor authentication scheme for online examination N Joshy, G Kumar, P Mukhilan, M Prasad, T Ramasamy, H Student International Journal of Pure and Applied Mathematics 119 (15), 1705-1712, 2018 | 12 | 2018 |
3c-auth: A new scheme for enhancing security N Harini, TR Padmanabhan Int. J. Netw. Secur 18 (1), 143-150, 2016 | 11 | 2016 |
Mitigation of spoofing attacks on IOT home networks KC Archana, N Harini International Journal of Engineering and Advanced Technology 9 (1S), 240-245, 2019 | 9 | 2019 |
Cryptography and security TR Padmanabhan, CK Shyamala, N Harini | 9 | 2011 |
Securing IoT devices by generating QR codes PS Vaidhyesh, WN Mukund, N Harini Int. J. Pure Appl. Math 119, 13743-13749, 2018 | 8 | 2018 |
Securing images with fingerprint data using steganography and blockchain S Pramothini, YS Pavan, N Harini Int. J. Recent Technol. Eng 7 (4), 82-85, 2018 | 7 | 2018 |
A novel electronic medical record design using cryptography and steganography techniques M Deepa, ND Harini, V Sravika, S Soundarya, S Reshma 2021 5th International Conference on Electronics, Communication and …, 2021 | 6 | 2021 |
Secure proxy blind ECDS algorithm for IoT N Harini, D Kamakshi, D Aruna Int. J. Pure Appl. Math 118 (7), 437-445, 2018 | 6 | 2018 |
Admission control and request scheduling for secured-concurrent-available architecture N Harini, TR Padmanabhan International Journal of Computer Applications 63 (6), 2013 | 6 | 2013 |
An enhanced scheme for authentication using OTP and QR code for MQTT protocol AP Jayan, A Balasubramani, A Kaikottil, N Harini Int. J. Recent Technol. Eng 7 (5), 70-75, 2019 | 5 | 2019 |
A Secured-Concurrent-Available architecture for improving performance of web servers N Harini, TR Padmanabhan Wireless Networks and Computational Intelligence: 6th International …, 2012 | 5 | 2012 |
Cloud based data integrity model for minimal human intervention using smart contracts B Saiharsha, RSS Tharagesh, SVN Kumar, N Harini 2020 5th International Conference on Communication and Electronics Systems …, 2020 | 4 | 2020 |
Enhancing security of one time passwords in online banking systems S Hari, C Kavinkumar, GK Niketh, N Harini Int J Recent Technol Eng 7, 319-324, 2019 | 4 | 2019 |
Analysis of web workload on QoS to assist capacity K Abirami, N Harini, PS Vaidhyesh, P Kumar Proceedings of the International Conference on ISMAC in Computational Vision …, 2019 | 4 | 2019 |
A scheme to enhance the security of MQTT protocol AP Jayan, N Harini Int. J. Pure Appl. Math 119 (12), 13975-13982, 2018 | 4 | 2018 |
Securing image posts in social networking sites MR Neethu, N Harini Computational Vision and Bio Inspired Computing, 79-91, 2018 | 4 | 2018 |
A scheme to enhance the security and efficiency of MQTT protocol SM Kannan Mani, M Balaji Bharatwaj, N Harini Intelligent and Cloud Computing: Proceedings of ICICC 2019, Volume 1, 79-93, 2021 | 3 | 2021 |