2CAuth: A new two factor authentication scheme using QR-code N Harini, TR Padmanabhan International Journal of Engineering and Technology 5 (2), 1087-1094, 2013 | 69 | 2013 |
A hybrid scheme for detecting fake accounts in Facebook M Smruthi, N Harini International Journal of Recent Technology and Engineering (IJRTE) 7 (5S3 …, 2019 | 19 | 2019 |
Cryptography and security CK Shyamala, N Harini, TR Padmanabhan Wiley, 2013 | 18 | 2013 |
3c-auth: A new scheme for enhancing security N Harini, TR Padmanabhan Int. J. Netw. Secur 18 (1), 143-150, 2016 | 14 | 2016 |
Multi-factor authentication scheme for online examination N Joshy, G Kumar, P Mukhilan, M Prasad, T Ramasamy, H Student International Journal of Pure and Applied Mathematics 119 (15), 1705-1712, 2018 | 13 | 2018 |
Mitigation of spoofing attacks on IOT home networks KC Archana, N Harini International Journal of Engineering and Advanced Technology 9 (1S), 240-245, 2019 | 10 | 2019 |
Cryptography and security TR Padmanabhan, CK Shyamala, N Harini | 9 | 2011 |
A novel electronic medical record design using cryptography and steganography techniques M Deepa, ND Harini, V Sravika, S Soundarya, S Reshma 2021 5th International Conference on Electronics, Communication and …, 2021 | 8 | 2021 |
Cloud based data integrity model for minimal human intervention using smart contracts B Saiharsha, RSS Tharagesh, SVN Kumar, N Harini 2020 5th International Conference on Communication and Electronics Systems …, 2020 | 8 | 2020 |
Securing IoT devices by generating QR codes PS Vaidhyesh, WN Mukund, N Harini Int. J. Pure Appl. Math 119, 13743-13749, 2018 | 8 | 2018 |
Securing images with fingerprint data using steganography and blockchain S Pramothini, YS Pavan, N Harini Int. J. Recent Technol. Eng 7 (4), 82-85, 2018 | 7 | 2018 |
An enhanced scheme for authentication using OTP and QR code for MQTT protocol AP Jayan, A Balasubramani, A Kaikottil, N Harini Int. J. Recent Technol. Eng 7 (5), 70-75, 2019 | 6 | 2019 |
Secure proxy blind ECDS algorithm for IoT N Harini, D Kamakshi, D Aruna Int. J. Pure Appl. Math 118 (7), 437-445, 2018 | 6 | 2018 |
Admission control and request scheduling for secured-concurrent-available architecture N Harini, TR Padmanabhan International Journal of Computer Applications 63 (6), 2013 | 6 | 2013 |
Multi-Factor Authentication System With ID Card Credentials For Secure Transactions R Vasudev, N Harini, MR Neethu 2023 14th International Conference on Computing Communication and Networking …, 2023 | 5 | 2023 |
A Secured-Concurrent-Available architecture for improving performance of web servers N Harini, TR Padmanabhan International Conference on Information Processing, 621-631, 2012 | 5 | 2012 |
Enhancing security of one time passwords in online banking systems S Hari, C Kavinkumar, GK Niketh, N Harini Int J Recent Technol Eng 7, 319-324, 2019 | 4 | 2019 |
Analysis of web workload on QoS to assist capacity K Abirami, N Harini, PS Vaidhyesh, P Kumar Proceedings of the International Conference on ISMAC in Computational Vision …, 2019 | 4 | 2019 |
A scheme to enhance the security of MQTT protocol AP Jayan, N Harini Int. J. Pure Appl. Math 119 (12), 13975-13982, 2018 | 4 | 2018 |
Securing image posts in social networking sites MR Neethu, N Harini Computational Vision and Bio Inspired Computing, 79-91, 2018 | 4 | 2018 |