TMKS Infotech
The Areana for ieee projects development and training | Home

2016-2017 ieee jAVA pROJECTS

2016-2017 IEEE CLOud computing H2016 and 2017 IEEE Projects List @ TMKS Infotech

Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services.Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users. For example, a cloud computer facility that serves European users during European business hours with a specific application (e.g., email) may reallocate the same resources to serve North American users during North America's business hours with a different application (e.g., a web server). This approach should maximize the use of computing power thus reducing environmental damage as well since less power, air conditioning, rack space, etc. are required for a variety of functions. With cloud computing, multiple users can access a single server to retrieve and update their data without purchasing licenses for different applications.
SlNo
Project Name
Abstract
YouTube Demo
 
CLOUD COMPUTING (2016-2017)
   
1 DeyPoS Deduplicatable Dynamic Proof of Storage for Multi-User Environments
Abstract
View

2 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity
Checking in Public Cloud
Abstract
View

3 Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams
under Multiple Keys
Abstract
View

4 Providing User Security Guarantees in Public Infrastructure Clouds
Abstract
View

5 EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud
Abstract
View

6 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
Abstract
View

7 An Efficient Privacy-Preserving Ranked Keyword Search Method
Abstract
View

8 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-
Based Encryption
Abstract
View

9 Malware Detection in Cloud Computing Infrastructures
Abstract
View

10 Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
Abstract
View

11 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Abstract
View
12 Identity-Based Encryption with Cloud Revocation Authority and Its Applications
Abstract
View

13 Fine Grained Two Factor Access Control for Web Based Cloud Computing
Services
Abstract
View

14 Protecting Your Right: Attribute-based Keyword Search with Fine-grained
Owner-enforced Search Authorization in the Cloud
Abstract
View

15 Secure Optimization Computation Outsourcing in Cloud Computing: A Case
Study of Linear Programming
Abstract
View

 

 

 

 

16 Diplo Cloud: Efficient and Scalable Management of RDF Data in the Cloud
Abstract
View

17 CDA Generation and Integration for Health Information Exchange Based on
Cloud Computing System
Abstract
View

18 Cloud workflow scheduling with deadlines and time slot availability
Abstract
View

19 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted
Cloud Data
Abstract
View

20 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
Abstract
View

21 CD Store: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via
Convergent Dispersal
Abstract
View

22 Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable
Delegation in Cloud Computing
Abstract
View

23 Cloud Armor Supporting Reputation-based Trust Management for Cloud
Services
Abstract
View

24 Privacy Preserving Ranked Multi Keyword Search for Multiple Data Owners in
Cloud Computing
Abstract
View

25 Reducing Fragmentation for In line De duplication Backup Storage via
Exploiting Backup History and Cache Knowledge
Abstract
View

26 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control
System in Public Cloud Storage
Abstract
View

27 An Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud
Computing
Abstract
View

28 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy
Re-Encryption Function for E-Health Clouds
Abstract
View

29 Dual Server Public Key Encryption With Keyword Search for Secure Cloud Storage
Abstract
View

30 Real-Time Semantic Search Using Approximate Methodology for Large Scale
Storage Systems
Abstract
View

31 Geometric Range Search on Encrypted Spatial Data
Abstract
View


32 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub
dictionaries over Encrypted Cloud Data
Abstract
View

33 Reducing Fragmentation for In-line De duplication Backup Storage via
Exploiting Backup History and Cache Knowledge
Abstract
View

34 SecRBAC: Secure data in the Clouds
Abstract
View

35 KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search
Function for Cloud Storage
Abstract
View

36 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
Abstract
View

37 Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
Abstract
View

38 A Privacy Preserving Outsourced Functional Computation Framework Across
Large-Scale Multiple Encrypted Domains
Abstract
View

39 A Modified Hierarchical Attribute-Based Encryption Access Control Method for
Mobile Cloud Computing
Abstract
View

40 Two Factor Data Security Protection Mechanism for Cloud Storage System
Abstract
View

41 PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncingand-
Sharing in Cloud
Abstract
View

42 Leveraging Data De duplication to Improve the Performance of Primary Storage
Systems in the Cloud
Abstract
View

43

Optimizing cost for online social networks on geo-distributed clouds

Abstract
View

44 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
Abstract
View

45 TTSA An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid
Clouds
Abstract
View

46 Encrypted Data Management with Deduplication in Cloud Computing
Abstract
View

47 Enabling Personalized Search over Encrypted Outsourced Data with Efficiency
Improvement
Abstract
View

48 Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
Abstract
View

49 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
Abstract
View

50

Dynamic Resource Allocation for MapReduce with Partitioning Skew

Abstract
View

51 Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to
Cloud Email
Abstract
View

 

 

 

 

 

2016-2017 IEEE Android Projects

Android is a mobile operating system (OS) based on the Linux kernel and currently developed by Google. With a user interface based on direct manipulation, Android is designed primarily for touchscreen mobile devices such as smartphonesand tablet computers, with specialized user interfaces for televisions (Android TV), cars (Android Auto), and wrist watches (Android Wear). The OS uses touch inputs that loosely correspond to real-world actions, like swiping, tapping, pinching, and reverse pinching to manipulate on-screen objects, and a virtual keyboard. Despite being primarily designed for touchscreen input, it has also been used in game consoles, digital cameras, regular PCs, and other electronics. As of 2015, Android has the largest installed base of all operating systems.

SlNo
Project Name
Abstract
YouTube Demo
 
ANDROID(2016-2017)
   
1 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Abstract
View

2 Towards Information Diffusion in Mobile Social Networks
Abstract
View

3 Droid Detector: Android malware characterization and detection using deep
learning
Abstract
View

4 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced
Encrypted Data
Abstract
View

5 A Shoulder Surfing Resistant Graphical Authentication System
Abstract
View

6 Pass BY OP Bring Your Own Picture for Securing Graphical Passwords
Abstract
View

7 Privacy Preserving Location Sharing Services for Social Networks
Abstract
View

8

WORAL A Witness Oriented Secure Location Provenance Framework for
Mobile Devices.

Abstract
View

 

 

 

 

9

MADAM: Effective and Efficient Behavior-based Android Malware Detection
and Prevention.

Abstract
View

 

 

 

 

10

Designing a Secure Exam Management System (SEMS) for M-Learning
Environments

Abstract
View

 

 

 

 

11

Understanding Smartphone Sensor and App Data for Enhancing the Security of
Secret Questions

Abstract
View

 

 

 

 

12 ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware
Abstract
View

2016-2017 IEEE Data mining Projects

Data mining is a term from computer science. Sometimes it is also called knowledge discovery in databases (KDD). Data mining is about finding new information in a lot ofdata. The information obtained from data mining is hopefully both new and useful.In many cases, data is stored so it can be used later. The data is saved with a goal. For example, a store wants to save what has been bought. They want to do this to know how much they should buy themselves, to have enough to sell later. Saving this information, makes a lot of data. The data is usually saved in a database. The reason why data is saved iscalled the first use.

 
2016-2017 IEEE Data mining Projects
   
SlNo
Project Name
Abstract
YouTube Demo
1 Cold-Start Recommendation with Provable Guarantees: A Decoupled Approach
Abstract
View

2 Resolving Multi-party Privacy Conflicts in Social Media
Abstract
View

3 Quantifying Political Leaning from Tweets, Re tweets, and Re tweeters
Abstract
View

4 RSkNN: kNN Search on Road Networks by Incorporating Social Influence
Abstract
View

5 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
Abstract
View

6 A Novel Recommendation Model Regularized with User Trust and Item Ratings
Abstract
View

7 Automatically Mining Facets for Queries from Their Search Results
Abstract
View

8 Booster in High Dimensional Data Classification
Abstract
View

9 Connecting Social Media to E-Commerce Cold-Start Product Recommendation
Using Micro blogging Information
Abstract
View

10 Crowd sourcing for Top-K Query Processing over Uncertain Data Linkage
Abstract
View

11 Efficient Cache-Supported Path Planning on Roads
Abstract
View


12 Inverted Linear Quad tree: Efficient Top K Spatial Keyword Search
Abstract
View

13 kNNVWC An Efficient k-Nearest Neighbors Approach Based on Various-
Widths Clustering
Abstract
View

14 Location Aware Keyword Query Suggestion Based on Document Proximity
Abstract
View

15 Mining User-Aware Rare Sequential Topic Patterns in Document Streams
Abstract
View

16 Nearest Keyword Set Search in Multi-Dimensional Datasets
Abstract
View

17 Practical Approximate k Nearest Neighbor Queries with Location and Query
Privacy
Abstract
View

18 Sentiment Embeddings with Applications to Sentiment Analysis
Abstract
View

19 Topic Sketch Real-time Bursty Topic Detection from Twitter
Abstract
View
20 Top-k Dominating Queries on Incomplete Data
Abstract
View

21 Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Item set
Mining in Data-mining-as-a-service Paradigm
Abstract
View

22 Quality-Aware Sub graph Matching Over Inconsistent Probabilistic Graph
Databases
Abstract
View

23 Cross-Platform Identification of Anonymous Identical Users in Multiple Social
Media Networks
Abstract
View

24 NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic
Social Media Networks
Abstract
View

25 MAVE: Multilevel wrApper Verification systEm
Abstract
View

26 Personalized travel sequence recommendation on multi score Big social media
Abstract
View

27 A Mixed Generative-Discriminative Based Hashing Method
Abstract
View

28 Text mining to the contributors to rail accidents
Abstract
View

29 User-Service Rating Prediction by Exploring Social Users' Rating Behaviors
Abstract
View

30 Domain-Sensitive Recommendation with User-Item Subgroup Analysis
Abstract
View

31 Efficient Algorithms for Mining Top-K High Utility Item sets
Abstract
View

32 Using Hash tag Graph-Based Topic Model to Connect Semantically-Related
Words Without Co-Occurrence in Micro blogs
Abstract
View

33 Relevance Feedback Algorithms Inspired By Quantum Detection
Abstract
View

34 A Comprehensive Study on Willingness Maximization for Social Activity
Planning with Quality Guarantee
Abstract
View

35 Crawling Hidden Objects with kNN Queries
Abstract
View

36 Rating Prediction based on Social Sentiment from Textual Reviews
Abstract
View

37 Adaptive Processing for Distributed Skyline Queries over Uncertain Data
Abstract
View

 

 

 

 

38 Efficient R-Tree Based Indexing Scheme for Server-Centric Cloud Storage
System
Abstract
View

 

 

 

 

39 Top-Down XML Keyword Query Processing
Abstract
View

 

 

 

 

40 Understanding Short Texts through Semantic Enrichment and Hashing
Abstract
View

 

 

 

 

41 Processing Incomplete k Nearest Neighbor Search
Abstract
View

42 Building an intrusion detection system using a filter-based feature selection
algorithm
Abstract
View

 

 

 

 

2016-2017 IEEE network security Projects

A network security policy, or NSP, is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document itself is usually several pages long and written by a committee. A security policy goes far beyond the simple idea of "keep the bad guys out". It's a very complex document, meant to govern data access, web-browsing habits, use of passwords and encryption, emailattachments and more. It specifies these rules for individuals or groups of individuals throughout the company.

SlNo
Project Name
Abstract
YouTube Demo
 

NETWORK SECURITY (2016-2017)

   
1 Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
Abstract
View

2 Trust Agent-Based Behavior Induction in Social Networks
Abstract
View


3 Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
Abstract
View

4 Measuring the Influence of Perceived Cybercrime Risk on Online Service
Avoidance
Abstract
View

5 Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based
Scheme
Abstract
View

6 Hierarchical and Shared Access Control
Abstract
View

7 Hidden Cipher text Policy Attribute Based Encryption under Standard
Assumptions
Abstract
View

8 GeTrust: A guarantee-based trust model in Chord-based P2P networks
Abstract
View

9 FRoDO: Fraud Resilient Device for Off-line micro-payments
Abstract
View


10 Formal Verification of the xDAuth Protocol
Abstract
View

11 Fast Detection of Transformed Data Leaks
Abstract
View

12 Privacy-Preserving Outsourced Association Rule Mining on Vertically
Partitioned Databases
Abstract
View

13 Inference Attack on Browsing History of Twitter Users using Public Click
Analytics and Twitter Metadata
Abstract
View

14 Data Lineage in Malicious Environments
Abstract
View

15 ID2S Password Authenticated key exchange protocol
Abstract
View

17 Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising
Auto-Encoder
Abstract
View

18 Profiling Online Social Behaviors for Compromised Account Detection
Abstract
View

19 Privacy-Preserving Utility Verification of the Data Published by Non-interactive
Differentially Private Mechanisms
Abstract
View

20 Detecting and Removing Web Application Vulnerabilities with Static Analysis
and Data Mining
Abstract
View

21 Geometric Range Search on Encrypted Spatial Data
Abstract
View

22 Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based
Scheme
Abstract
View

23 Optimized Search-and-Compute Circuits and Their Application to Query
Evaluation on Encrypted Data
Abstract
View

 

 

 

 

2016-2017 IEEE adhoc networks Projects

A wireless ad hoc network (WANET) is a decentralized type of wireless network.The network is ad hoc because it does not rely on a pre existing infrastructure, such asrouters in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, so the determination of which nodes forward data is made dynamically on the basis of network connectivity. In addition to the classic routing, ad hoc networks can use flooding for forwarding data.

SlNo
Project Name
Abstract
YouTube Demo
 
ADHOC NETWORKS & MANET's (2016-2017)
   
1 Top-k Query Processing and Malicious Node Identification Based on Node
Grouping in MANETs
Abstract
View

2 Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
Abstract
View

2016-2017 IEEE wireless sensor networks Projects

A wireless sensor network (WSN) (sometimes called a wireless sensor and actor network(WSAN)) are spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on.

SlNo
Project Name
Abstract
YouTube Demo
 
WIRELESS SENSOR NETWORKS (2016-2017)
   
1 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
Abstract
View

2 Dynamic Cluster Head Selection Method for Wireless Sensor Network
Abstract
View

3

Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With
Obstacle

Abstract
View

4 CANS Towards Congestion-Adaptive and Small Stretch Emergency Navigation
with WSNs
Abstract
View

5 DaGCM A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks
Abstract
View

6 iPath Path Inference in Wireless Sensor Networks
Abstract
View

2016-2017 IEEE mobile computing Projects

Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. Hardware includes mobile devices or device components.Mobile software deals with the characteristics and requirements of mobile applications.

SlNo
Project Name
Abstract
YouTube Demo
 
MOBILE COMPUTING(2016-2017)
   
1 Service Usage Classification with Encrypted Internet Traffic in Mobile
Messaging Apps
Abstract
View

2 Filtering of Brand-related Microblogs using Social-Smooth Multiview
Embedding
Abstract
View

3 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach    

 

4 Secure Overlay Routing Using Key Pre-Distribution A Linear Distance Optimization Approach
Abstract
View

 

 

 

5 Towards Information Diffusion in Mobile Social Networks
Abstract
View


6 Design and Analysis of an Efficient Friend-to-Friend Content Dissemination
System
Abstract
View

 

 

 

 

8 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
Abstract
View

8 DaGCM A Current Data Uploading framework for mobile data gathering in
wireless sensor networks
Abstract
View

9

Traffic De correlation Techniques for Countering a Global Eavesdropper in
WSNs

Abstract
View

10

WORAL A Witness Oriented Secure Location Provenance Framework for
Mobile Devices

Abstract
View

 

 

 

 

 

11

EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced
Encrypted Data

Abstract
View

 

2016-2017 IEEE parallel and distributed Projects

Distributed computing is a field of computer science that studies distributed systems. A distributed system is a software system in which components located on networked computers communicate and coordinate their actions by passing messages.The components interact with each other in order to achieve a common goal. Three significant characteristics of distributed systems are: concurrency of components, lack of a global clock, and independent failure of components.Examples of distributed systems vary from SOA-based systems to massively multiplayer online games to peer-to-peer applications.

SlNo
Project Name
Abstract
YouTube Demo
 
PARALLEL AND DISTRIBUTED (2016-2017)
   
1 A Hop-by-Hop Routing Mechanism for Green Internet
Abstract
View

2 POST Exploiting Dynamic Sociality for Mobile Advertising in Vehicular
Networks
Abstract
View

 

 

 

 

3 The Server Provisioning Problem for Continuous Distributed Interactive
Applications
Abstract
View

4 Real-time Semantic Search using Approximate Methodology for Large-scale
Storage Systems
Abstract
View

5 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted
Cloud Data
Abstract
View

6 An Efficient Privacy-Preserving Ranked Keyword Search Methody
Abstract
View

7 Continuous Answering Holistic Queries over Sensor Networks
Abstract
View

 

 

 

 

8 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
Abstract
View

9 The Server Provisioning Problem for Continuous Distributed Interactive
Applications
Abstract
View

10 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher
texts
Abstract
View

11 Authenticated Key Exchange Protocols for Parallel Network File Systems
Abstract
View

 

2016-2017 IEEE image processing Projects

LoIn imaging science, image processing is processing of images using mathematical operations by using any form of signal processing for which the input is an image, such as a photograph or video frame; the output of image processing may be either an image or a set of characteristics or parameters related to the image. Most image-processing techniques involve treating the image as a two-dimensional signal and applying standard signal-processing techniques to it.

SlNo
Project Name
Abstract
YouTube Demo
 
IMAGE PROCESSING(2016-2017)
   
 

 

1

A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer
Networks

Abstract
View

2 Online Multi-Modal Distance Metric Learning with Application to Image
Retrieval
Abstract
View

3 Secure Reversible Image Data Hiding over Encrypted Domain via Key
Modulation
Abstract
View

4 Social Friend Recommendation Based on Multiple Network Correlation
Abstract
View

5 User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors
Abstract
View

6 A Locality Sensitive Low-Rank Model for Image Tag Completion
Abstract
View

7 Pass BY OP Bring Your Own Picture for Securing Graphical Passwords
Abstract
View

8 Reversible Data Hiding in Encrypted Images by Reversible Image
Transformation
Abstract
View

9 Tag Based Image Search by Social Re-ranking
Abstract
View

10 Semantic Discriminative Metric Learning for Image Similarity Measurement
Abstract
View

 

 

 

 

11 Semantic Concept Co-occurrence Patterns for Image Annotation and Retrieval
Abstract
View

12 Multi-Modal Event Topic Model for Social Event Analysis
Abstract
View

13 Learning from Weak and Noisy Labels for Semantic Segmentation
Abstract
View

 

 

 

 

14 Content Adaptive Steganography by Minimizing Statistical Detectability
Abstract
View

15 Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature
Extractions Over Encrypted Image Data
Abstract
View

 

 

 

 

16 Learning of Multimodal Representations With Random Walks on the Click
Graph
Abstract
View

17 Web Image Search Re-ranking with Click-based Similarity and Typicality
Abstract
View

18 Enhancing Sketch-Based Image Retrieval by Re-Ranking and Relevance
Feedback
Abstract
View

19 Filtering of Brand-related Microblogs using Social-Smooth Multiview
Embedding
Abstract
View

20 TagBook: A Semantic Video Representation without Supervision for Event
Detection
Abstract
View

2016-2017 IEEE networking Projects

A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices pass data to each other along network links (data connections). Data is transferred in the form of packets. The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.

SlNo
Project Name
Abstract
YouTube Demo
 
NETWORKING& SERVICE COMPUTING(2016-2017)
   
       
1 A Shoulder Surfing Resistant Graphical Authentication System
Abstract
View
2 Achieving Flatness: Selecting the Honey words from Existing User Passwords
Abstract
View

3 A Stable Approach for Routing Queries in Unstructured P2P Networks
Abstract
View

4 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
Abstract
View

5 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Abstract
View

6 FRoDO Fraud Resilient Device for Off-Line Micro-Payments
Abstract
View

7 Profiling Online Social Behaviors for Compromised Account Detection
Abstract
View

8 Data Lineage in Malicious Environments
Abstract
View

9 Detecting Malicious Face book Applications
Abstract
View

10 Group Key Agreement with Local Connectivity
Abstract
View

11

ID2S Password-Authenticated Key Exchange Protocols

Abstract
View

12 Mitigating Cross-Site Scripting Attacks with a Content Security Policy
Abstract
View

13 Fast and Scalable Range Query Processing With Strong Privacy Protection for
Cloud Computing
Abstract
View

 

 

 

 

14 Graph Regularized Feature Selection with Data Reconstruction
Abstract
View

 

 

 

 

15 SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web
Interfaces
Abstract
View

16 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Abstract
View

17 Efficient Certificate less Access Control for Wireless Body Area networks
Abstract
View

18 Personalizing Sample Databases With Facebook Information to Increase Intrinsic
Motivation
Abstract
View

19 Geographic and opportunistic routing for underwater sensor networks
Abstract
View

 

 

 

 

20 Optimizing cost for online social networks on geo-distributed clouds
Abstract
View

21 Secure and Efficient Data Communication Protocol for Wireless Body Area
Networks
Abstract
View

 

 

 

 

 

 

 

 

 

 

 

Design and developed by TMKS Infotech --- web templates Developers
Supported by tmksinfotech.com