DOT NET PROJECTS TRAINING IN TRICHY

7
NETWORK S.N o Titles Code Yea r 1 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks SID0 1 201 3 2 Optimizing Link Sleeping Reconfigurations in ISP Networks with Off-Peak Time Failure Protection SID0 2 201 3 3 Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems SID0 3 201 3 4 Lightweight Location Verification Algorithms for Wireless Sensor Networks SID0 4 201 3 5 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks SID0 5 201 3 6 Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm SID0 6 201 3 7 Attribute-Aware Data Aggregation Using Potential- Based Dynamic Routing in Wireless Sensor Networks SID0 7 201 3 8 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks SID0 8 201 3 9 Centralized and Distributed Protocols for Tracker- Based Dynamic Swarm Management SID0 9 201 3 10 Efficient Two-Server Password-Only Authenticated Key Exchange SID1 0 201 3 11 Network Traffic Classification Using Correlation Information SID1 1 201 3 12 Cut Detection in Wireless Sensor Networks SID1 2 201 2 13 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks SID1 3 201 2 14 Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification SID1 4 201 2 15 ES-MPICH2: A Message Passing Interface with Enhanced Security SID1 5 201 2 16 Improving Energy Saving and Reliability in Wireless Sensor Networks Using a Simple CRT-Based Packet- Forwarding Solution SID1 6 201 2 17 Improving End-to-End Routing Performance of Greedy Forwarding in Sensor Networks SID1 7 201 2

description

 

Transcript of DOT NET PROJECTS TRAINING IN TRICHY

Page 1: DOT NET  PROJECTS TRAINING IN TRICHY

NETWORK

S.No Titles Code Year1 Using Fuzzy Logic Control to Provide Intelligent Traffic Management

Service for High-Speed NetworksSID01 2013

2 Optimizing Link Sleeping Reconfigurations in ISP Networks with Off-Peak Time Failure Protection

SID02 2013

3 Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems

SID03 2013

4 Lightweight Location Verification Algorithms for Wireless Sensor Networks

SID04 2013

5 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks

SID05 2013

6 Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm

SID06 2013

7 Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks

SID07 2013

8 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

SID08 2013

9 Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management

SID09 2013

10 Efficient Two-Server Password-Only Authenticated Key Exchange SID10 201311 Network Traffic Classification Using Correlation Information SID11 201312 Cut Detection in Wireless Sensor Networks SID12 201213 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile

SinksSID13 2012

14 Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification

SID14 2012

15 ES-MPICH2: A Message Passing Interface with Enhanced Security SID15 201216 Improving Energy Saving and Reliability in Wireless Sensor Networks

Using a Simple CRT-Based Packet-Forwarding SolutionSID16 2012

17 Improving End-to-End Routing Performance of Greedy Forwarding in Sensor Networks

SID17 2012

18 Privacy in VOIP Networks : Flow Analysis Attacks and Defense SID18 201219 Flexible Robust Group Key Agreement SID19 201120 Jamming-Aware Traffic Allocation for Multiple-Path Routing Using

Portfolio SelectionSID20 2011

Page 2: DOT NET  PROJECTS TRAINING IN TRICHY

NETWORK SECURITY

S.No Titles Code Year

1 To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks

SID21 2013

2 Privacy Preserving Data Sharing With Anonymous ID Assignment. SID22 20133 Distributed Detection in Mobile Access Wireless Sensor networks

Under Byzantine AttacksSID23 2013

4 Entrusting Private Computation and Data to Untrusted Networks SID24 20135 Privacy-Preserving Decentralized Key-Policy Attribute-Based

EncryptionSID25 2013

6 Security Analysis of a Single Sign-On Mechanismfor Distributed Computer Networks

SID26 2013

7 Fully Anonymous Profile Matching inMobile Social Networks SID27 20138 Secure Two-Party Differentially Private DataRelease for Vertically-

Partitioned DataSID28 2013

9 On the Performance of Byzantine Fault-Tolerant MapReduce SID29 201310 oPass: A User Authentication Protocol Resistant to Password

Stealing and Password Reuse AttacksSID30 2012

11 Revisiting Defenses against Large-Scale Online Password Guessing Attacks

SID31 2012

12 Secure Data Aggregation in Wireless Sensor Networks SID32 201213 Detecting and Resolving Firewall Policy Anomalies SID33 201214 Nymble: Blocking Misbehaving Users in Anonymizing Networks SID34 201115 A puzzle-Based Defense Strategy Against Flooding Attacks Using

Game TheorySID35 2010

S.NO TITLES CODE YEAR1 Localized Algorithms for Detection of Node Replication Attacks in

Mobile Sensor NetworksSID36 2013

2 A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model

SID37 2013

3 Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Cipher texts

SID38 2013

4 On Cooperative and Malicious Behaviors in Multi-relay Fading Channels SID39 20135 Recursive Linear and Differential Cryptanalysis of Ultra-light-weight

Authentication ProtocolsSID40 2013

6 Fingerprint Combination for Privacy Protection SID41 2013INFORMATION SECURITY

MOBILE COMPUTING

Page 3: DOT NET  PROJECTS TRAINING IN TRICHY

S.No TITLES CODE YEAR

1 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

SID42 2013

2 DT-MAC: An Efficient and Scalable Medium Access Control Protocol for Wireless Networks

SID43 2013

3 Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks

SID44 2013

4 Vampire Attacks :Draining Life from Wireless Ad Hoc Sensor Networks

SID45 2013

5 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

SID46 2013

6 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

SID47 2013

7 Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach

SID48 2013

8 Capacity of Hybrid Wireless Mesh Networks with Random APs SID49 20139 Joint Optimal Sensor Selection and Scheduling in Dynamic

Spectrum Access NetworksSID50 2013

10 Path Selection under Budget Constraints in Multihop Cognitive Radio Networks

SID51 2013

11 Understanding the Interaction between Packet Forwarding and Channel Access in Multiphop Wireless Networks

SID52 2012

12 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks

SID53 2012

13 On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling

SID54 2012

14 Adaptive Selective Verification : An Efficient Adaptive Countermeasure to Thwart DOS Attacks

SID55 2012

15 Privacy-Preserving Universal Authentication Protocol for Wireless Communication

SID56 2011

16 ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks

SID57 2011

17 Network Coding Based Privacy Preserving Against Traffic Analysis in Multi-Hop Wireless

SID58 2011

DATA MINING

Page 4: DOT NET  PROJECTS TRAINING IN TRICHY

S.NO TITLES CODE YEAR

1 Spatial Query Integrity with Voronoi Neighbors SID59 2013

2 Enabling Multilevel Trust in Privacy Preserving Data Mining SID60 2013

3 CDAMA: Concealed Data Aggregation Scheme for Multiple

Applications in Wireless Sensor Networks

SID61 2013

4 Supporting Search-As-You-Type Using SQL in Databases SID62 2013

5 Annotating Search Results from Web Databases SID63 2013

6 Protecting Sensitive Labels in Social Network Data

Anonymization

SID64 2013

7 Modeling Noisy Annotated Data with Application to Social

Annotation

SID65 2013

8 Halite: Fast and Scalable Multi resolution Local-Correlation

Clustering

SID66 2013

9 U-Skyline: A New Skyline Query for Uncertain Databases SID67 2013

10 Optimal Route Queries with Arbitrary order Constraints SID68 2013

11 Efficient Service Skyline Computation for Composite Service Selection

SID69 2013

12 A System to Filter Unwanted Messages from OSN User Walls SID70 2013

13 Slicing: A New Approach for Privacy Preserving Data Publishing SID71 2012

14 Incremental Information Extraction Using Relational Databases SID72 2012

15 Maximum Ambiguity-Based Sample Selection in Fuzzy Decision Tree Induction

SID73 2012

16 Mono-chromatic and Bio-chromatic Reverse Top-K Queries SID74 2011

17 Data leakage Detection SID75 2011

18 Ranking Spatial Data by Quality Preferences SID76 2011

19 Authenticated Multistep Nearest Neighbor Search SID77 2011

20 Learning to Adapt Web Information Extraction Knowledge and

Discovering New Attributes Via a Bayesian Approach

SID78 2010

CLOUD COMPUTING

S.No TITLES CODE YEAR

Page 5: DOT NET  PROJECTS TRAINING IN TRICHY

1 Privacy-Preserving Public Auditing for Secure Cloud Storage SID79 2013

2 Scalable and Secure Sharing of Personal Health Records in Cloud

Computing Using Attribute-Based Encryption

SID80 2013

3 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in

the Cloud

SID81 2013

4 Dynamic Resource Allocation Using Virtual Machines For Cloud

Computing Environment

SID82 2013

5 A Privacy Leakage Upper Bound Constraint-Based Approach for

Cost-Effective Privacy Preserving of Intermediate Data Sets in

Cloud

SID83 2013

6 Error-Tolerant Resource Allocation and Payment Minimization

for Cloud System

SID84 2013

7 Optimal Multi server Configuration for Profit Maximization in

Cloud Computing

SID85 2013

8 Enabling Dynamic Data and Indirect Mutual Trust for Cloud

Computing Storage Systems

SID86 2013

9 A Load Balancing Model Based on Cloud Partitioning for the

Public Cloud

SID87 2013

10 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming

and Efficient Social Video Sharing in the Clouds

SID88 2013

11 Toward Secure and Dependable Storage Services in Cloud

Computing

SID89 2012

12 A Secure Erasure Code-Based Cloud Storage System with Secure

Data Forwarding

SID90 2012

13 Enabling Public Auditability and Data Dynamics for Storage

Security in Cloud Computing

SID91 2011