Ph.D, MCA, MPhil

Dr. Harini N. currently serves as Assistant Professor at Department of Computer Science and Engineering, School of Engineering, Coimbatore Campus. Her areas of research include Security.


Publication Type: Journal Article

Year of Publication Title


S. Pramothini, Pavan, S., and Dr. Harini N., “Securing Images with Fingerprint Data using Steganography and Blockchain”, International Journal of Recent Technology and Engineering, vol. 7, no. 4, pp. 82-85, 2019.


P. S. Vaidhyesh, Mukund, W. N., G Varshni, S., and Dr. Harini N., “Secure Proxy Blind ECDS Algorithm for IoT”, International Journal of Pure and Applied Mathematics , vol. 119, 2018.


Dr. Harini N., Kumar, M., Ananthasayanam, A., Aravind, A., and Aravindh, R., “Multi-factor Authentication using IMEI Encrypted Color QRcode”, International Journal of Pure and Applied Mathematics, vol. 119, no. 12, pp. 13771 -13780, 2018.


H. A. Raman, MuraliKrishnan, E., Abishek, M., SaiSandhesh, R., Vijaykanth, K., and Dr. Harini N., “Analysis of twitter feeds using natural language processing and machine learning”, International Journal of Applied Engineering Research, vol. 10, pp. 18911-18916, 2015.[Abstract]

Cyber bullying is a rapidly burgeoning phenomenon in to-days world dominated by the Internet. From every major incident happening around the world to meager day-to-day activities of an individual is posted on social media. Ergo, Internet has now become an essentiality that is indispensable. Though this seems intriguing, however, it has led to the advent of cyber bullying. Social networking sites provide an easy platform for the cyber bullies to identify and victimize other users. Cyber bullies may make use of victims personal data(e.g. real name, home address) to impersonate them, or by creating fake accounts in social networking sites that defames, discredits or ridicules them. Due to the anonymity of the Cyber bullies it becomes increasingly difficult for the o ender to be caught and punished for their behavior. This paper proposes a system which identifies posts which are aimed at hurting the sentiments of other users and makes the user to rethink and hence refrain from posting the same. This paper also provides an effective algorithm that identifies and reduces the spam content in the users post/tweet. © Research India Publications.

More »»


Dr. Harini N. and Padmanabhan, T. R., “Admission Control and Request Scheduling for Secured-concurrent-available Architecture”, International Journal of Computer Applications, vol. 63, pp. 24-30, 2013.[Abstract]

The Internet society is continuously growing and the need of performance studies in this field is essential in order to obtain better throughput for the Web users. Moreover, Internet applications and clients have varied service expectations and demand provisioning of different levels of QoS to multiple traffic classes on the Internet. Meeting client QoS expectations prove to be a difficult task for E-Commerce service providers, especially when web servers experience overload conditions that cause increased response time, request rejections, user frustration, lowered usage of the service and reduced revenues. A recently proposed MLF (Multi Layered Filtering) framework manages potential workload; it also guaranties data freshness for all transactions that complete within their deadlines without service differentiation using request filtering and admission control schemes. In this paper, an improved request classifier and class-based admission control scheme called Multi-phase Admission Control (MPAC) that can be integrated with the MLF framework to prioritize user requests into several service classes according to their importance, and offer differentiated quality of service in terms of minimizing the frustration of premium users is presented and evaluated. The performance evaluations carried out confirm that the scheme can significantly boost the reward for having serviced a request while providing better QoS to clients. More »»


Dr. Harini N. and Padmanabhan, T. R., “2CAuth: A new two factor authentication scheme using QR-code”, International Journal of Engineering and Technology, vol. 5, pp. 1087-1094, 2013.[Abstract]

Password based schemes has been the standard means of authentication over decades. Enhancements use entities like ownership (something one possess), knowledge (something one knows), and inherence (something one is) as first factor and mobile phones as token less second factor, in combinations, to offer different levels of security assurances, trading off usability. In this paper we present '2CAuth' a new two factor authentication scheme that enhances secure usage of application information and preserves usability, without sacrificing user's privacy. A significant feature of the scheme is that it DOES NOT call for any synchronization between Mobile Network Operator (MNO) and users. The analysis of the scheme clearly brings out its effectiveness in terms of its usability even at times of peak loads on mobile networks. The scheme has the dual advantage of carrying out the verification of transactions which involve the physical presence of the user as well as those to be done in his absence.

More »»

Publication Type: Conference Paper

Year of Publication Title


Dr. Senthil Kumar M., Aishwarya, M., K. Vaishnavi, S., Sukanya, R., Aiswariya, C., and Dr. Harini N., “An Improved Authentication Scheme Using Colour QR Codes”, in Proceedings of International conference on Adaptive Technologies for Sustainable Growth (ICATS-2014), 2014, pp. 65-72.

Publication Type: Conference Proceedings

Year of Publication Title


Dr. Harini N. and Padmanabhan, T. R., “A secured-concurrent-available architecture for improving performance of web servers”, Communications in Computer and Information Science, vol. 292 CCIS. Bangalore, pp. 621-631, 2012.[Abstract]

As Internet services become more popular and pervasive, a serious problem that arises is managing the performance of services under intense overload. Models and mechanisms proposed by researchers till date either stop answering requests or give answers based on incomplete/stale data, specifically when Web servers become saturated. The paper provides two contributions to the study of improving the performance of Web servers in terms of support for massive concurrency. Firstly it outlines the factors necessary to build scalable Web servers and the research contributions made to these. Secondly it illustrates how these factors can be combined and applied to obtain architecture for highly concurrent Internet services. The proposed scheme addresses the issues of overload and staleness effectively and ensures that more number of legitimate requests is answered with complete data. It is shown to improve Web QoS for commercial Web servers through control mechanisms that offer adaptive load shedding,improved availability, and secure transactions using a multi layered filtering scheme. Our experimental results show that the proposed architectural framework provides a simpler programming model that achieves superior performance. © 2012 Springer-Verlag.

More »»


Dr. Shyamala C. K., Dr. Harini N., and Padmanabhan, T. R. Dr., “Arithmetic on Elliptic Curves Over Finite Fields”, National Conference on Advanced Computing Technologies, ACT '08. pp. 25-26, 2008.

Publication Type: Book

Year of Publication Title


T. R. Padmanabhan, Dr. Shyamala C. K., and Dr. Harini N., Cryptography and Security. Wiley India , 2011, p. 560.[Abstract]

In Cryptography and Security book, basic concepts of cryptography and security are introduced. Cryptography and security are dealt with in sufficient depth and detail without losing focus. Symmetric and asymmetric key cryptography Elliptic curve cryptography, hashing functions, message authentication, and digital signature are discussed and salient features in each explained. Subsequently the cryptographic concepts are used to address security issues at application, transport, and network layers. Security threats at various levels and counter measures are explained. Relevant standards and applications are given sufficient attention. The book is organized into three parts. Part A is devoted to cryptography. Necessary mathematical background is provided; currently used cryptosystems as well as authentication and signature schemes are dealt with in adequate depth and detail. Network security is dealt with in Part B. Authentication schemes, internet security protocols, and related services in current use are explained in all their aspects. System security is the scope of Part C. Intrusion, viruses, worms etc., are dealt with in terms of their structures, threats, and protection from them inclusive of firewalls. Adequate justice is done to digital immune systems and trusted systems. Necessary supplementary material is provided as appendices.

More »»
Faculty Research Interest: