Sei sulla pagina 1di 3

DOT NET Projects Titles

S.N
O

DOT NET Project Titles

Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation

Consistency as a Service: Auditing Cloud Consistency

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory


and Implementation

Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

10

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

11

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

12

A Cocktail Approach for Travel Package Recommendation

13

An Empirical Performance Evaluation of Relational Keyword Search Techniques

14

LARS*: An Efficient and Scalable Location-Aware Recommender System

15

Product Aspect Ranking and Its Applications

16

Secure Mining of Association Rules in Horizontally Distributed Databases

17

Supporting Privacy Protection in Personalized Web Search

18

TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality

19

Typicality-Based Collaborative Filtering Recommendation

20

Captcha as Graphical PasswordsA New Security Primitive Based on Hard AI Problems

21

Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic

22

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

23

A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in


Delay-Tolerant Networks

24

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation


Analysis

25

An Error-Minimizing Framework for Localizing Jammers in Wireless Networks

26

Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area


Networks

27

Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks

28

Multicast Capacity in MANET with Infrastructure Support

29

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

30

Transmission-Efficient Clustering Method for Wireless Sensor Networks Using


Compressive Sensing

31

A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks

32

Autonomous Mobile Mesh Networks

33

DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater


Sensor Networks

34

Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs

35

Preserving Location Privacy in Geosocial Applications

36

Web Image Re-Ranking Using Query-Specific Semantic Signatures

37

Click Prediction for Web Image Reranking Using Multimodal Sparse Coding

38

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error


Clustering and Random Permutation

39

Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted
Cloud Data Supporting Synonym Query

40

Collaborative Online Multitask Learning

41

Personalized Recommendation Combining User Interest and Social Circle

42

Optimal Coordination of Mobile Sensors for Target Tracking Under Additive and
Multiplicative Noises

43

Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail

44

Fault Tolerant Localization and Tracking of Multiple Sources in WSNs Using Binary Data

45

A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks

46

Distributed Channel Allocation Protocols for Wireless Sensor Networks

47

A Food Recognition System for Diabetic Patients Based on an Optimized Bag-of-Features


Model

48

Keylogging-resistant Visual Authentication Protocols

49

Online Payment System using Steganography and Visual Cryptography

50

Sharing Visual Secrets in Single Image Random Dot Stereograms

51

Uniform Embedding for Efficient JPEG Steganography

52

Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation

53

An Overlay-Based Data Mining Architecture Tolerant to Physical Network Disruptions

54

Streaming Solutions for Fine-Grained Network Traffic Measurements and Analysis

55

Localization-Oriented Network Adjustment in Wireless Ad Hoc and Sensor Networks

56

A Hybrid Cloud Approach for Secure Authorized Deduplication

Potrebbero piacerti anche