Projects List will be updated soon
- A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
- Cloud-Based Multimedia Content Protection System
- Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
- Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
- Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
- A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
- Provable Multi copy Dynamic Data Possession in Cloud Computing Systems
- I-sieve: An Inline High Performance Deduplication System Used in Cloud Storage
- Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
- Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
NETWORK SECURITY AND SECURE COMPUTING
- Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
- Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation
- DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
- Key recovery Attacks on KIDS, a Keyed Anomaly Detection System
DATA MINING
- k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
- RRW - A Robust and Reversible Watermarking Technique for Relational Data
- Efficient Reverse Top-k Boolean Spatial Keyword Queries on Road Networks
- Discovery of Ranking Fraud for Mobile Apps
NETWORKING AND SERVICE COMPUTING
- A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
- Statistical Dissemination Control in Large Machine-to-Machine Communication Networks
- Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
- Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
IMAGE PROCESSING AND MULTIMEDIA
- Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images
- Detection and Rectification of Distorted Fingerprints
- Efficient Reverse Top-k Boolean Spatial Keyword Queries on Road Networks
- Privacy Preserving Detection of Sensitive Data Exposure
Recent Placement
-
Name:Harish
Company : Quadwave Consulting -
Name:Rajshekhar
Company : iGate -
Name:Shwetha Balurgi
Company : iGate -
Name:
Company : -
Name:Snehal
Company : Quadwave Cosnsulting -
Name:Biswajeet
Company : ISPG -
Name:Jitheesh
Company : ISPG -
Name:Shashil Kumar
Company : iGate -
Name:Shruthi
Company : Quadwave Cosnsulting -
Name: Mahalakshmi
Company : Tayana -
Name: Nandini
Company : Huawei India Ltd. -
Name: Ravi Kumar Yadav
Company : Quadwave Consulting. -
Name: Varsha Patil
Company : Cupola Technologies. -
Name: Sunil Benur
Company : Quadwave Consulting. -
Name: Dhanashri Desai
Company : Huawei India Ltd. -
Name: Pranav Kumar
Company : Cupola Technologies. -
Name: Meghana
Company : iGate. -
Name: Suresh Kumar
Company : iGate.
Students Testimonials
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|