Seguir
N Harini
N Harini
Amrita school of engineering, amrita vishwa vidyapeetham, Amrita University
Dirección de correo verificada de cb.amrita.edu
Título
Citado por
Citado por
Año
2CAuth: A new two factor authentication scheme using QR-code
N Harini, TR Padmanabhan
International Journal of Engineering and Technology 5 (2), 1087-1094, 2013
692013
A hybrid scheme for detecting fake accounts in Facebook
M Smruthi, N Harini
International Journal of Recent Technology and Engineering (IJRTE) 7 (5S3 …, 2019
192019
Cryptography and security
CK Shyamala, N Harini, TR Padmanabhan
Wiley, 2013
182013
3c-auth: A new scheme for enhancing security
N Harini, TR Padmanabhan
Int. J. Netw. Secur 18 (1), 143-150, 2016
142016
Multi-factor authentication scheme for online examination
N Joshy, G Kumar, P Mukhilan, M Prasad, T Ramasamy, H Student
International Journal of Pure and Applied Mathematics 119 (15), 1705-1712, 2018
132018
Mitigation of spoofing attacks on IOT home networks
KC Archana, N Harini
International Journal of Engineering and Advanced Technology 9 (1S), 240-245, 2019
102019
Cryptography and security
TR Padmanabhan, CK Shyamala, N Harini
92011
A novel electronic medical record design using cryptography and steganography techniques
M Deepa, ND Harini, V Sravika, S Soundarya, S Reshma
2021 5th International Conference on Electronics, Communication and …, 2021
82021
Cloud based data integrity model for minimal human intervention using smart contracts
B Saiharsha, RSS Tharagesh, SVN Kumar, N Harini
2020 5th International Conference on Communication and Electronics Systems …, 2020
82020
Securing IoT devices by generating QR codes
PS Vaidhyesh, WN Mukund, N Harini
Int. J. Pure Appl. Math 119, 13743-13749, 2018
82018
Securing images with fingerprint data using steganography and blockchain
S Pramothini, YS Pavan, N Harini
Int. J. Recent Technol. Eng 7 (4), 82-85, 2018
72018
An enhanced scheme for authentication using OTP and QR code for MQTT protocol
AP Jayan, A Balasubramani, A Kaikottil, N Harini
Int. J. Recent Technol. Eng 7 (5), 70-75, 2019
62019
Secure proxy blind ECDS algorithm for IoT
N Harini, D Kamakshi, D Aruna
Int. J. Pure Appl. Math 118 (7), 437-445, 2018
62018
Admission control and request scheduling for secured-concurrent-available architecture
N Harini, TR Padmanabhan
International Journal of Computer Applications 63 (6), 2013
62013
Multi-Factor Authentication System With ID Card Credentials For Secure Transactions
R Vasudev, N Harini, MR Neethu
2023 14th International Conference on Computing Communication and Networking …, 2023
52023
A Secured-Concurrent-Available architecture for improving performance of web servers
N Harini, TR Padmanabhan
International Conference on Information Processing, 621-631, 2012
52012
Enhancing security of one time passwords in online banking systems
S Hari, C Kavinkumar, GK Niketh, N Harini
Int J Recent Technol Eng 7, 319-324, 2019
42019
Analysis of web workload on QoS to assist capacity
K Abirami, N Harini, PS Vaidhyesh, P Kumar
Proceedings of the International Conference on ISMAC in Computational Vision …, 2019
42019
A scheme to enhance the security of MQTT protocol
AP Jayan, N Harini
Int. J. Pure Appl. Math 119 (12), 13975-13982, 2018
42018
Securing image posts in social networking sites
MR Neethu, N Harini
Computational Vision and Bio Inspired Computing, 79-91, 2018
42018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20