DOT NET PROJECTS TRAINING IN TRICHY
-
Upload
siddhi-soft-solutions -
Category
Documents
-
view
200 -
download
0
description
Transcript of DOT NET PROJECTS TRAINING IN TRICHY
NETWORK
S.No Titles Code Year1 Using Fuzzy Logic Control to Provide Intelligent Traffic Management
Service for High-Speed NetworksSID01 2013
2 Optimizing Link Sleeping Reconfigurations in ISP Networks with Off-Peak Time Failure Protection
SID02 2013
3 Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems
SID03 2013
4 Lightweight Location Verification Algorithms for Wireless Sensor Networks
SID04 2013
5 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks
SID05 2013
6 Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
SID06 2013
7 Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks
SID07 2013
8 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
SID08 2013
9 Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management
SID09 2013
10 Efficient Two-Server Password-Only Authenticated Key Exchange SID10 201311 Network Traffic Classification Using Correlation Information SID11 201312 Cut Detection in Wireless Sensor Networks SID12 201213 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile
SinksSID13 2012
14 Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification
SID14 2012
15 ES-MPICH2: A Message Passing Interface with Enhanced Security SID15 201216 Improving Energy Saving and Reliability in Wireless Sensor Networks
Using a Simple CRT-Based Packet-Forwarding SolutionSID16 2012
17 Improving End-to-End Routing Performance of Greedy Forwarding in Sensor Networks
SID17 2012
18 Privacy in VOIP Networks : Flow Analysis Attacks and Defense SID18 201219 Flexible Robust Group Key Agreement SID19 201120 Jamming-Aware Traffic Allocation for Multiple-Path Routing Using
Portfolio SelectionSID20 2011
NETWORK SECURITY
S.No Titles Code Year
1 To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks
SID21 2013
2 Privacy Preserving Data Sharing With Anonymous ID Assignment. SID22 20133 Distributed Detection in Mobile Access Wireless Sensor networks
Under Byzantine AttacksSID23 2013
4 Entrusting Private Computation and Data to Untrusted Networks SID24 20135 Privacy-Preserving Decentralized Key-Policy Attribute-Based
EncryptionSID25 2013
6 Security Analysis of a Single Sign-On Mechanismfor Distributed Computer Networks
SID26 2013
7 Fully Anonymous Profile Matching inMobile Social Networks SID27 20138 Secure Two-Party Differentially Private DataRelease for Vertically-
Partitioned DataSID28 2013
9 On the Performance of Byzantine Fault-Tolerant MapReduce SID29 201310 oPass: A User Authentication Protocol Resistant to Password
Stealing and Password Reuse AttacksSID30 2012
11 Revisiting Defenses against Large-Scale Online Password Guessing Attacks
SID31 2012
12 Secure Data Aggregation in Wireless Sensor Networks SID32 201213 Detecting and Resolving Firewall Policy Anomalies SID33 201214 Nymble: Blocking Misbehaving Users in Anonymizing Networks SID34 201115 A puzzle-Based Defense Strategy Against Flooding Attacks Using
Game TheorySID35 2010
S.NO TITLES CODE YEAR1 Localized Algorithms for Detection of Node Replication Attacks in
Mobile Sensor NetworksSID36 2013
2 A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
SID37 2013
3 Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Cipher texts
SID38 2013
4 On Cooperative and Malicious Behaviors in Multi-relay Fading Channels SID39 20135 Recursive Linear and Differential Cryptanalysis of Ultra-light-weight
Authentication ProtocolsSID40 2013
6 Fingerprint Combination for Privacy Protection SID41 2013INFORMATION SECURITY
MOBILE COMPUTING
S.No TITLES CODE YEAR
1 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
SID42 2013
2 DT-MAC: An Efficient and Scalable Medium Access Control Protocol for Wireless Networks
SID43 2013
3 Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks
SID44 2013
4 Vampire Attacks :Draining Life from Wireless Ad Hoc Sensor Networks
SID45 2013
5 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
SID46 2013
6 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
SID47 2013
7 Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach
SID48 2013
8 Capacity of Hybrid Wireless Mesh Networks with Random APs SID49 20139 Joint Optimal Sensor Selection and Scheduling in Dynamic
Spectrum Access NetworksSID50 2013
10 Path Selection under Budget Constraints in Multihop Cognitive Radio Networks
SID51 2013
11 Understanding the Interaction between Packet Forwarding and Channel Access in Multiphop Wireless Networks
SID52 2012
12 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
SID53 2012
13 On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling
SID54 2012
14 Adaptive Selective Verification : An Efficient Adaptive Countermeasure to Thwart DOS Attacks
SID55 2012
15 Privacy-Preserving Universal Authentication Protocol for Wireless Communication
SID56 2011
16 ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks
SID57 2011
17 Network Coding Based Privacy Preserving Against Traffic Analysis in Multi-Hop Wireless
SID58 2011
DATA MINING
S.NO TITLES CODE YEAR
1 Spatial Query Integrity with Voronoi Neighbors SID59 2013
2 Enabling Multilevel Trust in Privacy Preserving Data Mining SID60 2013
3 CDAMA: Concealed Data Aggregation Scheme for Multiple
Applications in Wireless Sensor Networks
SID61 2013
4 Supporting Search-As-You-Type Using SQL in Databases SID62 2013
5 Annotating Search Results from Web Databases SID63 2013
6 Protecting Sensitive Labels in Social Network Data
Anonymization
SID64 2013
7 Modeling Noisy Annotated Data with Application to Social
Annotation
SID65 2013
8 Halite: Fast and Scalable Multi resolution Local-Correlation
Clustering
SID66 2013
9 U-Skyline: A New Skyline Query for Uncertain Databases SID67 2013
10 Optimal Route Queries with Arbitrary order Constraints SID68 2013
11 Efficient Service Skyline Computation for Composite Service Selection
SID69 2013
12 A System to Filter Unwanted Messages from OSN User Walls SID70 2013
13 Slicing: A New Approach for Privacy Preserving Data Publishing SID71 2012
14 Incremental Information Extraction Using Relational Databases SID72 2012
15 Maximum Ambiguity-Based Sample Selection in Fuzzy Decision Tree Induction
SID73 2012
16 Mono-chromatic and Bio-chromatic Reverse Top-K Queries SID74 2011
17 Data leakage Detection SID75 2011
18 Ranking Spatial Data by Quality Preferences SID76 2011
19 Authenticated Multistep Nearest Neighbor Search SID77 2011
20 Learning to Adapt Web Information Extraction Knowledge and
Discovering New Attributes Via a Bayesian Approach
SID78 2010
CLOUD COMPUTING
S.No TITLES CODE YEAR
1 Privacy-Preserving Public Auditing for Secure Cloud Storage SID79 2013
2 Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
SID80 2013
3 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in
the Cloud
SID81 2013
4 Dynamic Resource Allocation Using Virtual Machines For Cloud
Computing Environment
SID82 2013
5 A Privacy Leakage Upper Bound Constraint-Based Approach for
Cost-Effective Privacy Preserving of Intermediate Data Sets in
Cloud
SID83 2013
6 Error-Tolerant Resource Allocation and Payment Minimization
for Cloud System
SID84 2013
7 Optimal Multi server Configuration for Profit Maximization in
Cloud Computing
SID85 2013
8 Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
SID86 2013
9 A Load Balancing Model Based on Cloud Partitioning for the
Public Cloud
SID87 2013
10 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming
and Efficient Social Video Sharing in the Clouds
SID88 2013
11 Toward Secure and Dependable Storage Services in Cloud
Computing
SID89 2012
12 A Secure Erasure Code-Based Cloud Storage System with Secure
Data Forwarding
SID90 2012
13 Enabling Public Auditability and Data Dynamics for Storage
Security in Cloud Computing
SID91 2011