Sl.No |
PROJECT TITLE |
DOMAIN |
1 |
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage. |
Dotnet/Java |
2 |
Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks. |
Dotnet/Java |
3 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. |
Dotnet/Java |
4 |
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. |
Dotnet/Java |
5 |
An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration. |
Dotnet/Java |
6 |
Privacy Concerns for Photo Sharing in Online Social Networks |
Dotnet/Java |
7 |
A Biometric Key Generation Method Based on Semisupervised Data Clustering. |
Dotnet/Java |
8 |
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization. |
Dotnet/Java |
9 |
Prefetching-Based Data Dissemination in Vehicular Cloud Systems. |
Dotnet/Java |
10 |
Enabling Cloud Storage Auditing with Key-Exposure Resistance. |
Dotnet/Java |
11 |
CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes |
Dotnet/Java |
12 |
A New Bio-cryptosystem-oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion. |
Dotnet/Java |
13 |
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking. |
Dotnet/Java |
14 |
A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval. |
Dotnet/Java |
15 |
Linear Round Bit-Decomposition of Secret-Shared Values. |
Dotnet/Java |
16 |
Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud. |
Dotnet/Java |
17 |
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext. |
Dotnet/Java |
18 |
Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Itemsets. |
Dotnet/Java |
19 |
Secure Outsourced Biometric Authentication With Performance Evaluation on Smart phones. |
Dotnet/Java |
20 |
Is Interactional Dissynchrony a Clue to Deception?Insights From Automated Analysis of Nonverbal Visual Cues. |
Dotnet/Java |
21 |
Query Specific Rank Fusion for Image Retrieval. |
Dotnet/Java |
22 |
Distributed Database Management Techniques for Wireless Sensor Networks |
Dotnet/Java |
23 |
Packet Scheduling for Real-Time Surveillance in Multihop Wireless Sensor Networks With Lossy Channels. |
Dotnet/Java |
24 |
Effective Key Management in Dynamic Wireless Sensor Networks. |
Dotnet/Java |
25 |
Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks |
Dotnet/Java |
26 |
The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities |
Dotnet/Java |
27 |
Packet Delivery Ratio/Cost in MANETs With Erasure Coding and Packet Replication |
Dotnet/Java |
28 |
A Hierarchical Account-Aided Reputation Management System for MANETs |
Dotnet/Java |
29 |
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing |
Dotnet/Java |
30 |
Presentation Attack Detection for Face Recognition using Light Field Camera |
Dotnet/Java |
31 |
Fusion of MS and PAN Images Preserving Spectral Quality. |
Dotnet/Java |
32 |
Automatic Cloud Detection for All-Sky Images Using Super pixel Segmentation |
Dotnet/Java |
33 |
Combining Left and Right Palmprint Images for More Accurate Personal Identification. |
Dotnet/Java |
34 |
Towards Large-Scale Histopathological Image Analysis: Hashing-Based Image Retrieval. |
Dotnet/Java |
35 |
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments.. |
Dotnet/Java |