Sl.No |
PROJECT TITLE |
DOMAIN |
1 |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing. |
Dotnet/Java |
2 |
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners inCloud Computing. |
Dotnet/Java |
3 |
A Shoulder Surfing Resistant Graphical Authentication System. |
Dotnet/Java |
4 |
Fingerprint Liveness Detection from Single Image Using Low-Level Features and Shape Analysis. |
Dotnet/Java |
5 |
A person authentication system based on RFID tags and a cascade of face recognition algorithms. |
Dotnet/Java |
6 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
Dotnet/Java |
7 |
Ontology-Based Search of Genomic Metadata. |
Dotnet/Java |
8 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services. |
Dotnet/Java |
9 |
Online Resource Scheduling Under Concave Pricing for Cloud Computing. |
Dotnet/Java |
10 |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption. |
Dotnet/Java |
11 |
Authenticated Key Exchange Protocols for Parallel Network File Systems |
Dotnet/Java |
12 |
Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography. |
Dotnet/Java |
13 |
Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing . |
Dotnet/Java |
14 |
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud. |
Dotnet/Java |
15 |
A Novel Recommendation Model Regularized with User Trust and Item Ratings. |
Dotnet/Java |
16 |
Automatically Mining Facets for Queries from Their Search Results. |
Dotnet/Java |
17 |
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information. |
Dotnet/Java |
18 |
Mining User-Aware Rare Sequential Topic Patterns in Document Streams. |
Dotnet/Java |
19 |
Rating Prediction based on Social Sentiment from Textual Reviews. |
Dotnet/Java |
20 |
Location Aware Keyword Query Suggestion Based on Document Proximity. |
Dotnet/Java |
21 |
Crowdsourcing for Top-K Query Processing over Uncertain Data. |
Dotnet/Java |
22 |
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users. |
Dotnet/Java |
23 |
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks. |
Dotnet/Java |
24 |
A Stable Approach for Routing Queries in Unstructured P2P Networks |
Dotnet/Java |
25 |
Detecting Malicious Facebook Applications. |
Dotnet/Java |
26 |
FRoDO: Fraud Resilient Device for Off-line micro-payments. |
Dotnet/Java |
27 |
Profiling Online Social Behaviors for Compromised Account Detection. |
Dotnet/Java |
28 |
Resolving Multi-Party Privacy Conflicts in Social Media. |
Dotnet/Java |
29 |
Profiling Online Social Behaviors for Compromised Account Detection. |
Dotnet/Java |
30 |
Online Multi-modal Distance Metric Learning with Application to Image Retrieval. |
Dotnet/Java |
31 |
User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors. |
Dotnet/Java |
32 |
Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-grained Benchmark, and Feature Evaluation. |
Dotnet/Java |
33 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing. |
Dotnet/Java |
34 |
A Holistic Approach to Distributed Dimensionality Reduction of Big Data. |
Dotnet/Java |
35 |
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Discovery Framework for Assisted Healthcare. |
Dotnet/Java |
36 |
Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing. |
Dotnet/Java |
37 |
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds. |
Dotnet/Java |
38 |
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming . |
Dotnet/Java |
39 |
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation. |
Dotnet/Java |
40 |
Prefetching-Based Data Dissemination in Vehicular Cloud Systems |
Dotnet/Java |
41 |
DROPS: Division and Replication of Data in the Cloud for Optimal Performance and Security. |
Dotnet/Java |
42 |
Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption. |
Dotnet/Java |
43 |
Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs |
Dotnet/Java |
44 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
Dotnet/Java |
45 |
Thwarting Selfish Behavior in 802.11 WLANs |
Dotnet/Java |
46 |
2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET |
Dotnet/Java |
47 |
FD4C: Automatic Fault Diagnosis Framework for Web Applications in Cloud Computing. |
Dotnet/Java |
48 |
Answering Pattern Queries Using Views |
Dotnet/Java |
49 |
Scalable Feature Matching by Dual Cascaded Scalar Quantization for Image Retrieval. |
Dotnet/Java |
50 |
Local Bit-plane Decoded Pattern: A Novel Feature Descriptor for Biomedical Image Retrieval |
Dotnet/Java |
51 |
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
|
Dotnet/Java |