Secure Computing Projects
SN PROJECT TITLES       Download Titles ACTION
1 MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
2 Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
3 Data Lineage in Malicious Environments
4 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
5 Resolving Multi-party Privacy Conflicts in Social Media
6 Content adaptive stenography by reducing statistical dectability
7 Detecting Malicious Web Links and Identifying Their Attack Types
8 Forensic Analysis of E-mail Date and Time Spoofing
Download Titles
1 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks.
2 Time-Delayed Broadcasting for Defeating Inside Jammers
3 An OS-level Framework for Anomaly Detection in Complex Software Systems
4 Invalidating Idealized BGP Security Proposals and Countermeasures
5 A Computational Dynamic Trust Model for User Authorization
6 Continuous and Transparent User Identity Verification for Secure Internet Services
7 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
8 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
9 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
10 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
11 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers
12 Cost-Aware_SEcure_Routing_(CASER)_Protocol_Design_for_Wireless_Sensor_Networks
1 Hiding in the Mobile Crowd Location Privacy through Collaboration
2 MOSES Supporting and Enforcing Security Profiles on Smart phones
3 Mobiflage Deniable Storage Encryption for Mobile Devices
4 Generating Summary Risk Scores for Mobile Applications
5 Effective Risk Communication for Android Apps
6 A Denial of Service Attack to UMTS Networks Using SIM Less Devices
7 A Large Scale Study of the Time Required to Compromise a Computer System
8 Fault Tolerant Network Interfaces for Networks-on-Chip
9 K Zero Day Safety A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
10 Robustness Analysis of Embedded Control Systems with Respect to Signal Perturbations
11 Secure Two Party Differentially Private Data Release for Vertically Partitioned Data
12 Security Games for Node Localization through Verifiable Multilateration
13 Authorization Control for a Semantic Data Repository through an Inference Policy Engine
14 Discovery and Resolution of Anomalies in Web Access Control Policies
15 Formal Analysis of Secure Neighbor Discovery in Wireless Networks
16 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
17 Efficient and Privacy Aware Data Aggregation in Mobile Sensing
18 PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks
19 Top k Query Result Completeness Verification in Tiered Sensor Networks
20 Ensuring the Performance of Apache HTTP Server Affected by Aging
21 Human Effects of Enhanced Privacy Management Models
22 Analysis of Field Data on Web Security Vulnerabilities Private Searching on Streaming
24 Private Searching on Streaming Data Based on Keyword Frequency
1 EAACK A Secure Intrusion-Detection System for MANET
2 Privacy Preserving Data Sharing With Anonymous ID Assignment
3 Identity Based Secure Distributed Data Storage Schemes
4 Security Analysis of a Single Sign-On Mechanism for Distributed Computer
5 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable links
6 SORT A Self ORganizing Trust Model for Peer to Peer Systems
7 NICE Network Intrusion Detection and Countermeasure Selection in Virtual
8 Securing Class Initialization in Java like Languages
9 WARNINGBIRD A Near Real time Detection System for Suspicious URLs in Twitter stream
10 Two tales of privacy in online social networks
11 Secure Encounter based Mobile Social Networks Requirements Designs
12 Twitsper Tweeting Privately
13 Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless
14 Cross Domain Privacy Preserving Cooperative Firewall Optimization
15 CAM Cloud Assisted Privacy Preserving Mobile Health Monitoring
16 Extracting Spread Spectrum Hidden Data from Digital Media
17 Utility Privacy Tradeoff in Databases An Information theoretic Approach
18 Extracting Spread Spectrum Hidden Data from Digital Media Spectrum Hidden
1 A Novel Security Scheme for online banking based on virtual machine
2 Design and Implementation of TARF a trust aware routing framework for wsn
3 Ensuring Distributed Accontability for data sharing in clouds
4 Nymble Blocking Misbehaving Users in Anonymizing Networks
5 SMS A Study of the Short Message Service of a Nationwide Cellular
6 Risk Aware Mitigation for MANET routing attacks
1 Modeling and Detection of Camouflaging Worm
2 Secure Communications Over Wireless Broadcast Networks Stability
Call us : (+91) 9030333433 / 08772261612
Mail us :
Mail us :