Sl.No |
PROJECT TITLE |
DOMAIN |
1 |
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks. |
Dotnet/Java |
2 |
Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs. |
Dotnet/Java |
3 |
EAACK—A Secure Intrusion-Detection System for MANETs. |
Dotnet/Java |
4 |
Multitouch Gesture-Based Authentication. |
Dotnet/Java |
5 |
A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers. |
Dotnet/Java |
6 |
Security evaluation of pattern classifiers under attack |
Dotnet/Java |
7 |
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds. |
Dotnet/Java |
8 |
Security evaluation of pattern classifiers under attack. |
Dotnet/Java |
9 |
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. |
Dotnet/Java |
10 |
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks. |
Dotnet/Java |
11 |
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks. |
Dotnet/Java |
12 |
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism. |
Dotnet/Java |
13 |
Image Fusion with Guided Filtering. |
Dotnet/Java |
14 |
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases. |
Dotnet/Java |
15 |
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds. |
Dotnet/Java |
16 |
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. |
Dotnet/Java |
17 |
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption. |
Dotnet/Java |
18 |
Revisiting Defenses against Large-Scale Online Password Guessing Attacks. |
Dotnet/Java |
19 |
oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attack. |
Dotnet/Java |
20 |
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks. |
Dotnet/Java |
21 |
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques. |
Dotnet/Java |
22 |
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis. |
Dotnet/Java |
23 |
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems. |
Dotnet/Java |
24 |
A Novel Anti Phishing Framework based on Visual Cryptography. |
Dotnet/Java |
25 |
Resilient Identity Crime Detection. |
Dotnet/Java |
26 |
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments |
Dotnet/Java |
27 |
Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition |
Dotnet/Java |
28 |
Harvesting Image Database From Web. |
Dotnet/Java |
29 |
A Business Model for cloud computing Based on a Separate Encryption and Decryption Services. |
Dotnet/Java |
30 |
One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases. |
Dotnet/Java |
31 |
PMSE: A Personalized Mobile Search Engine |
Dotnet/Java |
32 |
An Empirical Performance Evaluation of Relational Keyword Search Techniques |
Dotnet/Java |
33 |
Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme |
Dotnet/Java |
34 |
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality |
Dotnet/Java |
35 |
Teaching RFID Information Systems Security. |
Dotnet/Java |
36 |
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks |
Dotnet/Java |
37 |
Secure Continuous Aggregation in Wireless Sensor Networks |
Dotnet/Java |
38 |
Privacy-Preserving Authenticated Key-Exchange Over Internet. |
Dotnet/Java |
39 |
Customer Relationship Management System based on Data mining Technique. |
Dotnet/Java |