Back close

Dr. Harini N.

Associate Professor, School of Computing, Coimbatore

Qualification: MCA, MPhil, Ph.D
n_harini@cb.amrita.edu
Research Interest: Security

Bio

Dr. Harini N. currently serves as Associate Professor at School of Computing, Coimbatore Campus. Her areas of research include Security.

 

Publications

Journal Article

Year : 2021

A Scheme to Enhance the Security and Efficiency of MQTT Protocol

Cite this Research Publication : Dr. Harini N., Mani, S. M. Kannan, and M Bharatwaj, B., “A Scheme to Enhance the Security and Efficiency of MQTT Protocol”, Smart Innovation, Systems and Technologies, 2021.

Publisher : Smart Innovation, Systems and Technologies

Year : 2021

Investigating Peers in Social Networks: Reliable or Unreilable

Cite this Research Publication : Neethu M. R., Dr. Harini N., and Abirami K., “Investigating Peers in Social Networks: Reliable or Unreilable”, Advances in Distributed Computing and Machine Learning, vol. pp 173-180, 2021.

Publisher : Advances in Distributed Computing and Machine Learning

Year : 2020

Integrity Preserved Multifactor Authentication based Automated Ticketing System

Cite this Research Publication : S. S. Hari, Harini, G., P. Kumar, H., Vinod, K. V., and Dr. Harini N., “Integrity Preserved Multifactor Authentication based Automated Ticketing System”, International Journal of Advanced Science and Technology, 2020.

Publisher : International Journal of Advanced Science and Technology

Year : 2019

Diminishing Spread of False Message in Twitter using Block chain and Machine Learning

Cite this Research Publication : AlaguVignesh and Dr. Harini N., “Diminishing Spread of False Message in Twitter using Block chain and Machine Learning”, International Journal of Engineering and Advanced Technology, vol. 9, no. 1, pp. 4933-4937, 2019.

Publisher : International Journal of Engineering and Advanced Technology,

Year : 2019

A hybrid Scheme for Detecting Fake Accounts in Facebook

Cite this Research Publication : M. Smruthi and Dr. Harini N., “A hybrid Scheme for Detecting Fake Accounts in Facebook”, International Journal of Recent Technology and Engineering (IJRTE), vol. 7, no. 5S3, 2019.

Publisher : International Journal of Recent Technology and Engineering (IJRTE)

Year : 2019

Enhancing security of one time passwords in online banking systems

Cite this Research Publication : S. Hari, Kavinkumar, C., Niketh, G. K., and Dr. Harini N., “Enhancing security of one time passwords in online banking systems”, International Journal of Recent Technology and Engineering, vol. 7, pp. 319-324, 2019.

Publisher : International Journal of Recent Technology and Engineering

Year : 2019

A Model to Ensure Business Ethicsin Social Networks

Cite this Research Publication : Neethu M. R. and Dr. Harini N., “A Model to Ensure Business Ethicsin Social Networks”, International Journal of Scientific and Technology Research, vol. 8, no. 10, pp. 586-591, 2019.

Publisher : International Journal of Scientific and Technology Research

Year : 2019

Securing Images with Fingerprint Data using Steganography and Blockchain

Cite this Research Publication : S. Pramothini, Pavan, S., and Dr. Harini N., “Securing Images with Fingerprint Data using Steganography and Blockchain”, International Journal of Recent Technology and Engineering, vol. 7, no. 4, pp. 82-85, 2019.

Publisher : International Journal of Recent Technology and Engineering

Year : 2019

An enhanced scheme for authentication using OTP and QR code for MQTT protocol

Cite this Research Publication : A. P. Jayan, Balasubramani, A., Kaikottil, A., and Dr. Harini N., “An enhanced scheme for authentication using OTP and QR code for MQTT protocol”, International Journal of Recent Technology and Engineering, vol. 7, pp. 70-75, 2019.

Publisher : International Journal of Recent Technology and Engineering, Blue Eyes Intelligence Engineering and Sciences Publication,

Year : 2019

A secure scheme to manage complex password capable of overcoming human memory limitations

Cite this Research Publication : M. S. Srinivas, Manchikanti, B., G. Babu, C., and Dr. Harini N., “A secure scheme to manage complex password capable of overcoming human memory limitations”, International Journal of Recent Technology and Engineering, vol. 7, pp. 137-143, 2019.

Publisher : International Journal of Recent Technology and Engineering, Blue Eyes Intelligence Engineering and Sciences Publication

Year : 2018

Multi-factor Authentication using IMEI Encrypted Color QRcode

Cite this Research Publication : Dr. Harini N., Kumar, M., Ananthasayanam, A., Aravind, A., and Aravindh, R., “Multi-factor Authentication using IMEI Encrypted Color QRcode”, International Journal of Pure and Applied Mathematics, vol. 119, no. 12, pp. 13771 -13780, 2018.

Publisher : International Journal of Pure and Applied Mathematics

Year : 2018

Multi-factor authentication using IMEI encrypted color qr code

Publisher : International Journal of Pure and Applied Mathematics

Year : 2018

Multi-factor authentication scheme for online examination

Cite this Research Publication : N. Joshy, Kumar, M. G., Mukhilan, P., Prasad, V. M., Ramasamy, T., and Dr. Harini N., “Multi-factor authentication scheme for online examination”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1705-1712, 2018.

Publisher : International Journal of Pure and Applied Mathematics

Year : 2018

Securing iot devices by generating QR codes

Cite this Research Publication : P. S. Vaidhyesh, Mukund, W. N., G. Varshni, S., and Dr. Harini N., “Securing iot Devices by Generating QR Codes”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13743-13748, 2018.

Publisher : International Journal of Pure and Applied Mathematics

Year : 2018

Security in online games using blockchain

Cite this Research Publication : S. P. Dhevi, Subash, A. S., and Dr. Harini N., “Security in Online Games using Blockchain”, International Journal of Pure and Applied Mathematics, vol. 119, no. 15, pp. 1661-1669, 2018.

Publisher : International Journal of Pure and Applied Mathematics

Year : 2018

Securing conversation in online social networking

Cite this Research Publication : M. SivaYogitha, Gopal, P. R., and Harini, N., “Securing Conversation in Online Social Networking”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1639-1648, 2018.

Publisher : International Journal of Pure and Applied Mathematics, Academic Press

Year : 2018

Secure video transmission

Cite this Research Publication : K. Ramakrishna and Dr. Harini N., “Secure Video Transmission”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 1649-1659, 2018.

Publisher : International Journal of Pure and Applied Mathematics

Year : 2018

A scheme to enhance the security of MQTT protocol

Cite this Research Publication : A. P. Jayan and Dr. Harini N., “A Scheme to Enhance the Security of MQTT Protocol”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13975-13981, 2018.

Publisher : International Journal of Pure and Applied Mathematics

Year : 2018

Safe sonet: A framework for building trustworthy relationships

Cite this Research Publication : Neethu M. R. and Dr. Harini N., “Safe sonet: A Framework for Building Trustworthy Relationships”, International Journal of Engineering and Technology(UAE), vol. 7, pp. 57-62, 2018.

Publisher : International Journal of Engineering and Technology(UAE), Science Publishing Corporation Inc

Year : 2018

Secure Proxy Blind ECDS Algorithm for IoT

Cite this Research Publication : P. S. Vaidhyesh, Mukund, W. N., G Varshni, S., and Dr. Harini N., “Secure Proxy Blind ECDS Algorithm for IoT”, International Journal of Pure and Applied Mathematics , vol. 119, 2018.

Publisher : International Journal of Pure and Applied Mathematics.

Year : 2018

A hybrid infallible scheme for secure audio exchange

Cite this Research Publication : Dr. Harini N., M. Kumar, Ananthasayanam, A., Aravind, A., and Aravindh, R., “A hybrid infallible scheme for secure audio exchange”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13771-13780, 2018.

Publisher : International Journal of Pure and Applied Mathematics

Year : 2018

Evaluating efficiency of HMAC and digital signatures to enhance security in IoT

Cite this Research Publication : K. V. V. N. S. Kiran and Harini, N., “Evaluating Efficiency of HMAC and Digital Signatures to Enhance Security in IoT”, International Journal of Pure and Applied Mathematics, vol. 119, pp. 13991-13996, 2018.

Publisher : International Journal of Pure and Applied Mathematics

Year : 2016

CHATGAURD’-A System that Ensures Safe a Posting in Social Networking Sites

Cite this Research Publication : Dr. Harini N. and Suryapraba, “CHATGAURD’-A System that Ensures Safe a Posting in Social Networking Sites”, International Journal f Engineering and Technoloty, 2016.

Publisher : International Journal f Engineering and Technoloty

Year : 2016

A System to Screen Posts that Minimize user Frustration

Cite this Research Publication : Dr. Harini N. and , “A System to Screen Posts that Minimize user Frustration”, International Journal of Applied Engineering Research, vol. 11, no. 6, pp. 3944- 3949, 2016.

Publisher : International Journal of Applied Engineering Research

Year : 2015

Securing Information Transfer In Online Gaming

Cite this Research Publication : .G, S., and Dr. Harini N., “Securing Information Transfer In Online Gaming”, International Journal of Applied Engineering Research, vol. 10, pp. 2747-2751, 2015.

Publisher : International Journal of Applied Engineering Research

Year : 2015

Analysis of twitter feeds using natural language processing and machine learning

Cite this Research Publication : H. A. Raman, MuraliKrishnan, E., Abishek, M., SaiSandhesh, R., Vijaykanth, K., and Dr. Harini N., “Analysis of twitter feeds using natural language processing and machine learning”, International Journal of Applied Engineering Research, vol. 10, pp. 18911-18916, 2015.

Publisher : International Journal of Applied Engineering Research

Year : 2014

Vulnerability Analysis and Security System for NFC Enabled Mobile Phones

Cite this Research Publication : K. S., K., P., ,, ,, and Dr. Harini N., “Vulnerability Analysis and Security System for NFC Enabled Mobile Phones”, International Journal of Scientific Technology Research, vol. 3, pp. 207-210, 2014.

Publisher : International Journal of Scientific Technology Research

Year : 2013

Admission Control and Request Scheduling for Secured-concurrent-available Architecture

Cite this Research Publication : Dr. Harini N. and Padmanabhan, T. R., “Admission Control and Request Scheduling for Secured-concurrent-available Architecture”, International Journal of Computer Applications, vol. 63, pp. 24-30, 2013.

Publisher : International Journal of Computer Applications

Year : 2013

2CAuth: A new two factor authentication scheme using QR-code

Cite this Research Publication : Dr. Harini N. and Padmanabhan, T. R., “2CAuth: A new two factor authentication scheme using QR-code”, International Journal of Engineering and Technology, vol. 5, pp. 1087-1094, 2013.

Publisher : International Journal of Engineering and Technology

Year : 2010

Securing Cloud Environment

Cite this Research Publication : Dr. Harini N., Shyamala, C. K., and Padmanabhan, T. R., “Securing Cloud Environment”, Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives: Applications and Perspectives, p. 115, 2010.

Publisher : IGI Global

Conference Paper

Year : 2021

Prevention and Detection of SQL Injection Attacks Using Generic Decryption

Cite this Research Publication : A. R. Devi, D. Reddy, H. Siva Rami, T. Kumar, A., Sriraj, P., Sankar, P., and Dr. Harini N., “Prevention and Detection of SQL Injection Attacks Using Generic Decryption”, in Advances in Distributed Computing and Machine Learning, Singapore, 2021.

Publisher : Advances in Distributed Computing and Machine Learning, Singapore, 2021.

Year : 2020

Cloud Based Data Integrity model for Minimal Human Intervention using Smart Contracts

Cite this Research Publication : B. Saiharsha, Tharagesh, R. S. Sanjay, Kumar, S. V. Nikish, and Dr. Harini N., “Cloud Based Data Integrity model for Minimal Human Intervention using Smart Contracts”, in 2020 5th International Conference on Communication and Electronics Systems (ICCES), 2020.

Publisher : 2020 5th International Conference on Communication and Electronics Systems (ICCES)

Year : 2020

Secure Request Response (SRR): A Framework to Classify Trust/Distrust Relationships in Social Networking

Cite this Research Publication : Neethu M. R. and Dr. Harini N., “Secure Request Response (SRR): A Framework to Classify Trust/Distrust Relationships in Social Networking”, in Advances in Intelligent Systems and Computing, 307–317, 2020.

Publisher : Advances in Intelligent Systems and Computing

Year : 2014

An Improved Authentication Scheme Using Colour QR Codes

Cite this Research Publication : Dr. Senthil Kumar M., Aishwarya, M., K. Vaishnavi, S., Sukanya, R., Aiswariya, C., and Dr. Harini N., “An Improved Authentication Scheme Using Colour QR Codes”, in Proceedings of International conference on Adaptive Technologies for Sustainable Growth (ICATS-2014), 2014, pp. 65-72.

Publisher : Proceedings of International conference on Adaptive Technologies for Sustainable Growth (ICATS-2014)

Year : 2012

A secured-concurrent-available architecture for improving performance of web servers

Cite this Research Publication : Dr. Harini N. and Padmanabhan, T. R., “A Secured-Concurrent-Available Architecture for Improving Performance of Web Servers”, in Wireless Networks and Computational Intelligence, Berlin, Heidelberg, 2012, vol. 292 CCIS, pp. 621-631.

Publisher : Wireless Networks and Computational Intelligence, Springer Berlin Heidelberg

Conference Proceedings

Year : 2019

Analysis of web workload on QoS to assist capacity

Cite this Research Publication : K. Abirami, Dr. Harini N., Vaidhyesh, P., and Kumar, P., “Analysis of Web Workload on QoS to Assist Capacity”, Lecture Notes in Computational Vision and Biomechanics. pp. 573-582, 2019.

Publisher : Lecture Notes in Computational Vision and Biomechanics

Year : 2018

Securing image posts in social networking sites

Cite this Research Publication : Neethu M. R. and Dr. Harini N., “Securing image Posts in Social Networking Sites”, Lecture Notes in Computational Vision and Biomechanics, vol. 28. Springer Netherlands, pp. 79-91, 2018.

Publisher : Lecture Notes in Computational Vision and Biomechanics

Year : 2015

Analysis of Web Server Performance based on Scheduling Algorithms

Cite this Research Publication : Radeshkumaran and Dr. Harini N., “Analysis of Web Server Performance based on Scheduling Algorithms”, In proceedings of IEEE 2nd International Conference on Knowledge Collaboration in Engineering,( ICKCE-2015. 2015.

Publisher : proceedings of IEEE 2nd International Conference on Knowledge Collaboration in Engineering,( ICKCE-2015

Year : 2014

Performance Analysis of Multi-Factor Authentication

Cite this Research Publication : R. Sikha and Dr. Harini N., “Performance Analysis of Multi-Factor Authentication”, In Proceedings of International conference on Advances in Computer Communications and information science, (ACCIS-14). pp. 282-290, 2014.

Publisher : In Proceedings of International conference on Advances in Computer Communications and information science, (ACCIS-14)

Year : 2008

Arithmetic on Elliptic Curves Over Finite Fields

Cite this Research Publication : Dr. Shyamala C. K., Dr. Harini N., and Padmanabhan, T. R. Dr., “Arithmetic on Elliptic Curves Over Finite Fields”, National Conference on Advanced Computing Technologies, ACT '08. pp. 25-26, 2008.

Publisher : National Conference on Advanced Computing Technologies, ACT '08

Book Chapter

Year : 2021

Multi-task data driven modelling based on transfer learned features in deep learning for biomedical application

Cite this Research Publication : H. N., B., R., V, S., V., K. Menon, E.A., G., V.V., S. Variyar, and Dr. Soman K. P., “Multi-task data driven modelling based on transfer learned features in deep learning for biomedical application”, in Lecture Notes in Networks and Systems, vol. 171, 2021.

Publisher : Lecture Notes in Networks and Systems

Book

Year : 2011

Cryptography and Security

Cite this Research Publication : T. R. Padmanabhan, Dr. Shyamala C. K., and Dr. Harini N., Cryptography and Security. Wiley India , 2011, p. 560.

Publisher : Wiley India

Admissions Apply Now