Qualification: 
Ph.D, MCA, MPhil
n_harini@cb.amrita.edu

Dr. Harini N. currently serves as Assistant Professor at Department of Computer Science and Engineering, School of Engineering, Coimbatore Campus. Her areas of research include Security.

Publications

Publication Type: Conference Paper

Year of Publication Title

2021

A. R. Devi, D. Reddy, H. Siva Rami, T. Kumar, A., Sriraj, P., Sankar, P., and Dr. Harini N., “Prevention and Detection of SQL Injection Attacks Using Generic Decryption”, in Advances in Distributed Computing and Machine Learning, Singapore, 2021.[Abstract]


Today, Internet services have become an indispensable part of everyone's life. With Internet becoming platform to offer services, traditional core services like banking and ecommerce are now being provided in Internet platform, and making security for these services have become necessary. The openness of Internet has increased risk. In certain huge organization's cyber security, it is usual to notice major issues because of vulnerabilities in their system or software. By performing a depth analysis, it has come to know that the cause of vulnerabilities is either the developers or the design process. Research studies suggest that more than 80% of the active Web sites are vulnerable to SQL injection. The Web sites that unnecessarily expose server information have been recorded as nearly 67%. The Web sites that does not secure session cookies is approximately 50%. About 30% of the Websites secure their communications, for sending sensitive information of users. Hence, a study on mitigation of attacks is compelling. SQL injection targets interactive Internet services that employ database and aims to exploit vulnerability occurring at database layer in the three-tier architecture. This paper proposes a solution to detect and prevent SQL injection attacks using a model which is inspired from the concept of generic decryption. Results obtained confirm the extraordinary performance of the proposed scheme against the existing prevention techniques

More »»

2020

B. Saiharsha, Tharagesh, R. S. Sanjay, Kumar, S. V. Nikish, and Dr. Harini N., “Cloud Based Data Integrity model for Minimal Human Intervention using Smart Contracts”, in 2020 5th International Conference on Communication and Electronics Systems (ICCES), 2020.

2020

Neethu M. R. and Dr. Harini N., “Secure Request Response (SRR): A Framework to Classify Trust/Distrust Relationships in Social Networking”, in Advances in Intelligent Systems and Computing, 307–317, 2020.[Abstract]


The rapid development of the online social media and its application has enabled people to share interests and activities, through the Internet using online social platforms. The enormous sharing of information in the media has enabled hackers to steal personal information about the user. This calls for improved schemes capable of mitigating Internet fraud, privacy leak, dissemination of rumors, etc. The unawareness that exists in the peers related to the risk associated with uploading sensitive information paves way for cyber conspirators to prey on personal information. Failure to apply security policies will easily compromise the social stature of the individual. The paper proposes a security framework SRR (Secure Request, Response) to classify the trust/distrust relationship in the online social network.

More »»

2014

Dr. Senthil Kumar M., Aishwarya, M., K. Vaishnavi, S., Sukanya, R., Aiswariya, C., and Dr. Harini N., “An Improved Authentication Scheme Using Colour QR Codes”, in Proceedings of International conference on Adaptive Technologies for Sustainable Growth (ICATS-2014), 2014, pp. 65-72.

2012

Dr. Harini N. and Padmanabhan, T. R., “A Secured-Concurrent-Available Architecture for Improving Performance of Web Servers”, in Wireless Networks and Computational Intelligence, Berlin, Heidelberg, 2012, vol. 292 CCIS, pp. 621-631.[Abstract]


As Internet services become more popular and pervasive, a serious problem that arises is managing the performance of services under intense overload. Models and mechanisms proposed by researchers till date either stop answering requests or give answers based on incomplete/stale data, specifically when Web servers become saturated. The paper provides two contributions to the study of improving the performance of Web servers in terms of support for massive concurrency. Firstly it outlines the factors necessary to build scalable Web servers and the research contributions made to these. Secondly it illustrates how these factors can be combined and applied to obtain architecture for highly concurrent Internet services. The proposed scheme addresses the issues of overload and staleness effectively and ensures that more number of legitimate requests is answered with complete data. It is shown to improve Web QoS for commercial Web servers through control mechanisms that offer adaptive load shedding,improved availability, and secure transactions using a multi layered filtering scheme. Our experimental results show that the proposed architectural framework provides a simpler programming model that achieves superior performance.

More »»

Publication Type: Journal Article

Year of Publication Title

2021

Dr. Harini N., Mani, S. M. Kannan, and M Bharatwaj, B., “A Scheme to Enhance the Security and Efficiency of MQTT Protocol”, Smart Innovation, Systems and Technologies, 2021.

2021

Neethu M. R., Dr. Harini N., and Abirami K., “Investigating Peers in Social Networks: Reliable or Unreilable”, Advances in Distributed Computing and Machine Learning, vol. pp 173-180, 2021.[Abstract]


Social networking sites have made its impact in converting a passive reader into content contributor. This has turned online social networks into a commercial sphere. The site demands creation of public profiles. The main goal of online social networks is to share content with maximum users. This enormous sharing of information can lead to malicious users leverage the privacy of an individual. An attempt has been made in this paper to improve privacy preservation by calculating the reliability of a user, can entrust on his/her peer using the content sharing, Machine Learning and tone analysis. The recorded metrics and transaction details are stored in IPFS.

More »»

2020

S. S. Hari, Harini, G., P. Kumar, H., Vinod, K. V., and Dr. Harini N., “Integrity Preserved Multifactor Authentication based Automated Ticketing System”, International Journal of Advanced Science and Technology, 2020.

2019

S. Hari, Kavinkumar, C., Niketh, G. K., and Dr. Harini N., “Enhancing security of one time passwords in online banking systems”, International Journal of Recent Technology and Engineering, vol. 7, pp. 319-324, 2019.[Abstract]


The advancement in the technology has led to introduction of many popular Internet applications. Internet Banking also called as e-banking is one such indispensable application which has a major impact on our modern life. Although banks strongly encourage their customers to do online transactions and advertise it as a very safe and secure mode of transacting, in reality there is a huge risk associated. The continuous growth of online banking application brings with it several security issues and increased cost of implementing higher security systems for customers and banks. Online banking system maybe compromised in a wide variety of ways like using trojan horse, botnets, Phishing etc. Although multifactor authentication schemes exist to verify the authenticity of the client, the drawbacks with these schemes is that they work at transaction level rather than at the authentication level. This paves way for so called for man in the middle attack between the user and security mechanisms of browsers, smartphones etc. With online banking security becoming a critical requirement one needs to find better usable and workable solution based on transaction cum authentication level. An attempt has been made in this work to propose an authentication that enhances the security of the online banking systems.

More »»

2019

M. Smruthi and Dr. Harini N., “A hybrid Scheme for Detecting Fake Accounts in Facebook”, International Journal of Recent Technology and Engineering (IJRTE), vol. 7, no. 5S3, 2019.[Abstract]


A social networking service serves as a platform to build social networks or social relations among people who, share interests, activities, backgrounds, or real life connections. A social network service is generally offered to participants who registers to this site with their unique representation (often a profile) and one’s social links. Most social network services are web-based and provide means for users to interact over the Internet. Nevertheless these sites are also constantly preyed by hackers raising various problems related to threats and attacks such as disclosure of information, identity thefts etc. One of the most common ways of performing a large-scale data harvesting attack is the use of fake profiles, where malicious users present themselves in profiles impersonating fictitious or real persons. An attempt has been made in this work to use a hybrid model based on machine learning and skin detection algorithms to detect the existence of fake accounts. The experimentation process clearly brought out the strength of the proposed scheme in terms of detecting fake accounts with high accuracy.

More »»

2019

Neethu M. R. and Dr. Harini N., “A Model to Ensure Business Ethicsin Social Networks”, International Journal of Scientific and Technology Research, vol. 8, no. 10, pp. 586-591, 2019.[Abstract]


Social networking sites generally push aside trust issues to maximize social interaction. One of the barriers to trust in online environment is
privacy because Internet by design lacks a unified method for identifying who communicates with whom. Privacy concern is a person's awareness and
assessment of risks related to privacy violations. Violation to privacy happens mostly because users themselves don't understand the consequences of
sharing their personal data with peers. Context aware systems like cameras, accelerometers, microphones etc. affect privacy to a larger extent.
Individuals are more likely to be concerned about their privacy when information is used without one's knowledge. In this paper, a privacy preservation
scheme that safeguards users from online social networks selling data to third parties, based on distributed ledger technology is presented. The
proposed scheme uses IPFS to store the digital content with high integrity thus making it available to all.

More »»

2019

AlaguVignesh and Dr. Harini N., “Diminishing Spread of False Message in Twitter using Block chain and Machine Learning”, International Journal of Engineering and Advanced Technology, vol. 9, no. 1, pp. 4933-4937, 2019.

2019

S. Pramothini, Pavan, S., and Dr. Harini N., “Securing Images with Fingerprint Data using Steganography and Blockchain”, International Journal of Recent Technology and Engineering, vol. 7, no. 4, pp. 82-85, 2019.

2019

A. P. Jayan, Balasubramani, A., Kaikottil, A., and Dr. Harini N., “An enhanced scheme for authentication using OTP and QR code for MQTT protocol”, International Journal of Recent Technology and Engineering, vol. 7, pp. 70-75, 2019.[Abstract]


The pervasive nature of computing makes classical solutions inapplicable for handling communication between peers in the IOT platform. With enormous number of users and devices becoming a part of this network, Authentication of communication devices has become more challenging. The work presented in this paper discusses an authentication scheme with reduced overhead based on multi factors, barcodes and One Time Password. The outcome of the experimentation revealed the efficiency of the scheme in terms of guaranteeing enhanced security without compromise in versatility.

More »»

2019

M. S. Srinivas, Manchikanti, B., G. Babu, C., and Dr. Harini N., “A secure scheme to manage complex password capable of overcoming human memory limitations”, International Journal of Recent Technology and Engineering, vol. 7, pp. 137-143, 2019.[Abstract]


Security policies are required that protect information from illegal access, and also respect challenges users face in creating, and particularly managing, increasing numbers of passwords. With the increase in dependence of people on internet services for their day to day activities the number of passwords in use is more, the relationship between the passwords and the services is more complex. Each of the users follows their own strategy to remember and manage. Clearly, managing multiple passwords requires effort for creation, encoding, retrieval and execution. Most of us rely on the memory or reuse of passwords for easy management. The intricate characteristics of secure passwords, however, posit an unfortunate problem for password users. That is, whereas such passwords are difficult to be guessed by intruders, they are in general considerably difficult to be remembered by authorized users. This paper proposes a highly secure scheme that facilitates complex password management at ease without lack of user-friendliness.

More »»

2018

P. S. Vaidhyesh, Mukund, W. N., G Varshni, S., and Dr. Harini N., “Secure Proxy Blind ECDS Algorithm for IoT”, International Journal of Pure and Applied Mathematics , vol. 119, 2018.

2018

M. SivaYogitha, Gopal, P. R., and Dr. Harini N., “Securing Conversation in Online Social Networking”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1639-1648, 2018.[Abstract]


Today parents and children live in a world heavily influenced by digital devices and online platforms. Every parent has the trouble of effectively dealing with the challenge of monitoring their child‟s interaction and exposure to various digital spaces on the internet. Social networks have revolutionized the way people interact with each other. Existing services facilitate ways to connect with peers and share information. However, issues related to maintaining privacy and security of user information is still a challenge. In this work we present a customized security architecture that facilitates children to participate freely in social networking services under the supervision of their parents without loss of privacy of the child. The proposed model is expected to bring with it enhanced security features in terms of its capability to resist attacks like content modification, non-repudiation. © Academic Press. All rights reserved.

More »»

2018

S. P. Dhevi, Subash, A. S., and Dr. Harini N., “Security in Online Games using Blockchain”, International Journal of Pure and Applied Mathematics, vol. 119, no. 15, pp. 1661-1669, 2018.

2018

Dr. Harini N., Kumar, M., Ananthasayanam, A., Aravind, A., and Aravindh, R., “Multi-factor Authentication using IMEI Encrypted Color QRcode”, International Journal of Pure and Applied Mathematics, vol. 119, no. 12, pp. 13771 -13780, 2018.

2018

A. P. Jayan and Dr. Harini N., “A Scheme to Enhance the Security of MQTT Protocol”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13975-13981, 2018.[Abstract]


Spoofing is always considered as one of the most difficult attacks to defend again Denial of Service attack. Cyber-criminals have employed this tactic of masking their true identities to alias and conduct malicious activities on networks. This is more prominent in IoT networks as there are still challenges related to security and privacy issues left unsolved. The paper attempts to effectively monitor and minimize the impact of spoofing attacks with usable cryptographic primitivesin IoT networks. © 2018 Academic Press. All rights reserved.

More »»

2018

N. Joshy, Kumar, M. G., Mukhilan, P., Prasad, V. M., Ramasamy, T., and Dr. Harini N., “Multi-factor authentication scheme for online examination”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1705-1712, 2018.[Abstract]


Multi-factor authentication schemes have emerged as alternatives to single-factorauthentication schemes with the aim of improving the security. Factors like passwords, biometrics smart/id cards have been used in combinations in addition to mobile OTPs for enhancing security. Conventional authentication schemes are inadequate for security-criticalapplications like financial transaction, online examinations,etc. The paper focuses on discussing a multi-factor authentication scheme specifically designed for securing online examination services without comprising user-friendliness. The experimentation results clearly brought out the applicability of the scheme in real time with fine-tuningof network related parameters. © 2018 Academic Press. All Rights Reserved.

More »»

2018

Neethu M. R. and Dr. Harini N., “Safe sonet: A Framework for Building Trustworthy Relationships”, International Journal of Engineering and Technology(UAE), vol. 7, pp. 57-62, 2018.[Abstract]


The advent of easy to use services and the ability to bridge boundaries in space and time has increasingly changed our social lives and com-munication habits. Being unaware of their audience people on social networks inconsiderately share many personal items. Generally Social Networking Sites (SNS) users depend on the SNS platform for managing their social identities. Although SNS providers have introduced privacy settings to protect users against threats, these are insufficient and the access control models are difficult to be under-stood by novice users [1]. Unexpectedly, even those who are aware of the security and privacy threats and the preventive tools that com-bat those threats, lack the motivation to utilize security features to protect themselves. The paper discusses a frame-work (Safe SoNet) that aims to provide a plat-form for secure sharing of posts. The objective of this framework is twofold. Firstly, to analyze user behavior by retrieving user information from various social networking sites, addressing transliteration issues. Secondly, apply the user behavior to quantify the trust score of a connect, which would in turn form a decision making parameter to decide on the peer with whom the in-formation can be securely shared. © 2018 Neethu. MR, N. Harini.

More »»

2018

K. Ramakrishna and Dr. Harini N., “Secure Video Transmission”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1649-1659, 2018.[Abstract]


Securing is a big challenging task particularly with regard to assurance of confidentiality, authentication and integrity. Literature specifies usage of cryptography and steganography to secure different forms of digital data. The wide usage of communication using Internet has facilitated sharing of not only text but also audio and video posts in a more simple manner. Standard encryption algorithms are very much applicable for text and binary data but fails to handle voluminous video data. An attempt has been made in the paper to secure videos using keyed hash algorithms. Experimentation clearly revealed the benefits of the proposed scheme in terms of assuring integrity and authenticity without compromise in quality of the video. © Academic Press. All rights reserved.

More »»

2018

K. V. V. N. S. Kiran and Dr. Harini N., “Evaluating Efficiency of HMAC and Digital Signatures to Enhance Security in IoT”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13991-13996, 2018.[Abstract]


It is possible that a few IoT devices may operate continuously unattended which can become the interest of cyber criminals in terms of discovering vulnerabilities in these devices and use them to launch different forms of attacks in the networks. A number of cryptographic primitives are available as per literature to minimize the risk levels but adoption of a scheme need to be based on different factors like convenience, the threat model associated with the environment and the applicability of the scheme with the given constraints on the device. This demands clear experimentation for assessing the suitability of signing and encryption algorithm for IoT. The paper aims at setting up a controlled test bed for experimenting Various combinations of the cryptographic schemes and identify the best in terms of minimising time related overheads. © 2018 Academic Press. All rights reserved.

More »»

2018

Dr. Harini N., M. Kumar, Ananthasayanam, A., Aravind, A., and Aravindh, R., “A hybrid infallible scheme for secure audio exchange”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13771-13780, 2018.[Abstract]


The emerging growth in the use of digital data brings out a clear need for an effective measure to ensure security. Protecting data exchanged over Internet through online social media and controlling access to this data have become a strong concern. Literature discusses technologies like steganography, cryptography to address issues related to privacy and confidentiality. This paper presents a scheme for enhancing the security in audio sharing. The scheme adopts a hybrid approach involving steganography and digital signing procedures to guarantee authentication and integrity. The experimentation results have clearly brought out the improvement in the security level

More »»

2018

P. S. Vaidhyesh, Mukund, W. N., G. Varshni, S., and Dr. Harini N., “Securing iot Devices by Generating QR Codes”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13743-13748, 2018.[Abstract]


Classical solutions to security problems are not applicable for the communicating entities in the IoT platform. To prevent illegitimate users access to information systems, authentication using different cryptographic schemes have become an integral part of IoT. This paper discusses the applicability of a multi-factor authentication scheme based on Elliptic Curve Digital signature algorithm and QR Code to enhance the security considerations. The outcome of the experiment clearly proved its efficiency in terms of guaranteeing high security without compromise in versatility. © 2018 Academic Press. All Rights Reserved.

More »»

2016

Dr. Harini N. and , “A System to Screen Posts that Minimize user Frustration”, International Journal of Applied Engineering Research, vol. 11, no. 6, pp. 3944- 3949, 2016.

2016

Dr. Harini N. and Suryapraba, “CHATGAURD’-A System that Ensures Safe a Posting in Social Networking Sites”, International Journal f Engineering and Technoloty, 2016.

2015

, .G, S., and Dr. Harini N., “Securing Information Transfer In Online Gaming”, International Journal of Applied Engineering Research, vol. 10, pp. 2747-2751, 2015.

2015

H. A. Raman, MuraliKrishnan, E., Abishek, M., SaiSandhesh, R., Vijaykanth, K., and Dr. Harini N., “Analysis of twitter feeds using natural language processing and machine learning”, International Journal of Applied Engineering Research, vol. 10, pp. 18911-18916, 2015.[Abstract]


Cyber bullying is a rapidly burgeoning phenomenon in to-days world dominated by the Internet. From every major incident happening around the world to meager day-to-day activities of an individual is posted on social media. Ergo, Internet has now become an essentiality that is indispensable. Though this seems intriguing, however, it has led to the advent of cyber bullying. Social networking sites provide an easy platform for the cyber bullies to identify and victimize other users. Cyber bullies may make use of victims personal data(e.g. real name, home address) to impersonate them, or by creating fake accounts in social networking sites that defames, discredits or ridicules them. Due to the anonymity of the Cyber bullies it becomes increasingly difficult for the o ender to be caught and punished for their behavior. This paper proposes a system which identifies posts which are aimed at hurting the sentiments of other users and makes the user to rethink and hence refrain from posting the same. This paper also provides an effective algorithm that identifies and reduces the spam content in the users post/tweet. © Research India Publications.

More »»

2014

K. S., K., P., ,, ,, and Dr. Harini N., “Vulnerability Analysis and Security System for NFC Enabled Mobile Phones”, International Journal of Scientific Technology Research, vol. 3, pp. 207-210, 2014.[Abstract]


An encryption system for NFC enabled applications using a combination of AES cryptography algorithm and DiffieHellman key negotiation scheme which when implemented prevents data modification, man in the middle attack and eavesdropping has been proposed in the paper. A timestamp based Protocol where the size of the file and time at which it is sent is retrieved to calculate the estimated time of reception which will be compared with actual reception time is also proposed to prevent relay attacks. A complete study of authentication methodologies in NFC technology and a critical analysis of our proposed system with the existing systems showing how it can resist all the possible attacks on the data exchanged between mobile phones through NFC technology. More »»

2013

Dr. Harini N. and Padmanabhan, T. R., “Admission Control and Request Scheduling for Secured-concurrent-available Architecture”, International Journal of Computer Applications, vol. 63, pp. 24-30, 2013.[Abstract]


The Internet society is continuously growing and the need of performance studies in this field is essential in order to obtain better throughput for the Web users. Moreover, Internet applications and clients have varied service expectations and demand provisioning of different levels of QoS to multiple traffic classes on the Internet. Meeting client QoS expectations prove to be a difficult task for E-Commerce service providers, especially when web servers experience overload conditions that cause increased response time, request rejections, user frustration, lowered usage of the service and reduced revenues. A recently proposed MLF (Multi Layered Filtering) framework manages potential workload; it also guaranties data freshness for all transactions that complete within their deadlines without service differentiation using request filtering and admission control schemes. In this paper, an improved request classifier and class-based admission control scheme called Multi-phase Admission Control (MPAC) that can be integrated with the MLF framework to prioritize user requests into several service classes according to their importance, and offer differentiated quality of service in terms of minimizing the frustration of premium users is presented and evaluated. The performance evaluations carried out confirm that the scheme can significantly boost the reward for having serviced a request while providing better QoS to clients. More »»

2013

Dr. Harini N. and Padmanabhan, T. R., “2CAuth: A new two factor authentication scheme using QR-code”, International Journal of Engineering and Technology, vol. 5, pp. 1087-1094, 2013.[Abstract]


Password based schemes has been the standard means of authentication over decades. Enhancements use entities like ownership (something one possess), knowledge (something one knows), and inherence (something one is) as first factor and mobile phones as token less second factor, in combinations, to offer different levels of security assurances, trading off usability. In this paper we present '2CAuth' a new two factor authentication scheme that enhances secure usage of application information and preserves usability, without sacrificing user's privacy. A significant feature of the scheme is that it DOES NOT call for any synchronization between Mobile Network Operator (MNO) and users. The analysis of the scheme clearly brings out its effectiveness in terms of its usability even at times of peak loads on mobile networks. The scheme has the dual advantage of carrying out the verification of transactions which involve the physical presence of the user as well as those to be done in his absence.

More »»

2010

Dr. Harini N., Shyamala, C. K., and Padmanabhan, T. R., “Securing Cloud Environment”, Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives: Applications and Perspectives, p. 115, 2010.

Publication Type: Conference Proceedings

Year of Publication Title

2019

K. Abirami, Dr. Harini N., Vaidhyesh, P., and Kumar, P., “Analysis of Web Workload on QoS to Assist Capacity”, Lecture Notes in Computational Vision and Biomechanics. pp. 573-582, 2019.[Abstract]


Workload characterization is a well-established discipline, which finds its applications in performance evaluation of modern Internet services. With the high degree of popularity of the Internet, there is a huge variation in the intensity of workload and this opens up new challenging performance issues to be addressed. Internet Services are subject to huge variations in demand, with bursts coinciding with the times that the service has the most value. Apart from these flash crowds, sites are also subject to denial-of-service (DoS) attacks that can knock a service out of commission. The paper aims to study the effect of various workload distributions with the service architecture ‘thread-per-connection’ in use as a basis. The source model is structured as a sequence of activities with equal execution time requirement with an additional load time of page (loading embedded objects, images, etc.). The threads are allocated to the requests in the queue; leftover requests if any are denied service. The rejection rate is used as a criterion for evaluation of the performance of the system with a given capacity. The proposed model could form a basis for various system models to be integrated into the system and get its performance metrics (i.e. QoS) evaluated.

More »»

2018

Neethu M. R. and Dr. Harini N., “Securing image Posts in Social Networking Sites”, Lecture Notes in Computational Vision and Biomechanics, vol. 28. Springer Netherlands, pp. 79-91, 2018.[Abstract]


The most unbeatable technology, Internet brings to people for communication is social networks. Starting from exchange of text messages it goes up to posting of images and videos in social networking sites which are viewed by many people. When these social networks are available to all the users for free, it will lead to various types of security issues. Image security has been a topic of research over decades. Enhancements to individual techniques and combinations proposed till date have offered different levels of security assurances. This paper aim to present a technique for secure sharing of image posts in social network. The significant feature of the scheme lies in the selection of security technique based on image content, evaluation of peers with whom the image can be shared based on text classification, transliteration and tone analysis. The proposed scheme a cost effective solution as it does not require any additional hardware. The utility of the model is demonstrated by mapping the scheme with Facebook and analyzing its performance through simulation.

More »»

2015

Radeshkumaran and Dr. Harini N., “Analysis of Web Server Performance based on Scheduling Algorithms”, In proceedings of IEEE 2nd International Conference on Knowledge Collaboration in Engineering,( ICKCE-2015. 2015.

2014

R. Sikha and Dr. Harini N., “Performance Analysis of Multi-Factor Authentication”, In Proceedings of International conference on Advances in Computer Communications and information science, (ACCIS-14). pp. 282-290, 2014.

2008

Dr. Shyamala C. K., Dr. Harini N., and Padmanabhan, T. R. Dr., “Arithmetic on Elliptic Curves Over Finite Fields”, National Conference on Advanced Computing Technologies, ACT '08. pp. 25-26, 2008.

Publication Type: Book

Year of Publication Title

2011

T. R. Padmanabhan, Dr. Shyamala C. K., and Dr. Harini N., Cryptography and Security. Wiley India , 2011, p. 560.[Abstract]


In Cryptography and Security book, basic concepts of cryptography and security are introduced. Cryptography and security are dealt with in sufficient depth and detail without losing focus. Symmetric and asymmetric key cryptography Elliptic curve cryptography, hashing functions, message authentication, and digital signature are discussed and salient features in each explained. Subsequently the cryptographic concepts are used to address security issues at application, transport, and network layers. Security threats at various levels and counter measures are explained. Relevant standards and applications are given sufficient attention. The book is organized into three parts. Part A is devoted to cryptography. Necessary mathematical background is provided; currently used cryptosystems as well as authentication and signature schemes are dealt with in adequate depth and detail. Network security is dealt with in Part B. Authentication schemes, internet security protocols, and related services in current use are explained in all their aspects. System security is the scope of Part C. Intrusion, viruses, worms etc., are dealt with in terms of their structures, threats, and protection from them inclusive of firewalls. Adequate justice is done to digital immune systems and trusted systems. Necessary supplementary material is provided as appendices.

More »»
Faculty Research Interest: