S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTDT701 | CUSTOMER-SATISFACTION-AWARE OPTIMAL MULTISERVER CONFIGURATION FOR PROFIT MAXIMIZATION IN CLOUD COMPUTING |
|
2 | CTDT702 | ENABLING SEMANTIC SEARCH BASED ON CONCEPTUAL GRAPHS OVER ENCRYPTED OUTSOURCED DATA | |
3 | CTDT703 | GRAPH ENCRYPTION FOR TOP-K NEAREST KEYWORD SEARCH QUERIES ON CLOUD | |
4 | CTDT704 | KEYWORD SEARCH WITH ACCESS CONTROL OVER ENCRYPTED CLOUD DATA | |
5 | CTDT705 | PRIVACY PROTECTION BASED ACCESS CONTROL SCHEME IN CLOUD-BASED SERVICES | |
6 | CTDT706 | PRIVACY-PRESERVING MULTI-KEYWORD TOP-K SIMILARITY SEARCH OVER ENCRYPTED DATA | |
7 | CTDT707 | PRIVACY-PRESERVING SMART SEMANTIC SEARCH BASED ON CONCEPTUAL GRAPHS OVER ENCRYPTED OUTSOURCED DATA |
|
8 | CTDT708 | SEDASC: SECURE DATA SHARING IN CLOUDS | |
9 | CTDT709 | STRONG KEY-EXPOSURE RESILIENT AUDITING FOR SECURE CLOUD STORAGE | |
10 | CTDT710 | TAFC: TIME AND ATTRIBUTE FACTORS COMBINED ACCESS CONTROL FOR TIME-SENSITIVE DATA IN PUBLIC CLOUD |
|
11 | CTDT711 | USER DIFFERENTIATED VERIFIABLE FILE SEARCH ON THE CLOUD | |
12 | CTDT712 | VPSEARCH: ACHIEVING VERIFIABILITY FOR PRIVACY-PRESERVING MULTI-KEYWORD SEARCH OVER ENCRYPTED CLOUD DATA |
|
13 | CTDT713 | A MULTI-AGENT ADVANCED TRAVELER INFORMATION SYSTEM FOR OPTIMAL TRIP PLANNING IN A CO-MODAL FRAMEWORK |
|
14 | CTDT714 | CONTINUOUS TOP-K MONITORING ON DOCUMENT STREAMS | |
15 | CTDT715 | DETECTING STRESS BASED ON SOCIAL INTERACTIONS IN SOCIAL NETWORKS | |
16 | CTDT716 | DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES | |
17 | CTDT717 | EFFICIENT KEYWORD-AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION | |
18 | CTDT718 | FILTERING OUT INFREQUENT BEHAVIOR FROM BUSINESS PROCESS EVENT LOGS | |
19 | CTDT719 | GALLOP: GLOBAL FEATURE FUSED LOCATION PREDICTION FOR DIFFERENT CHECK-IN SCENARIOS | |
20 | CTDT720 | GENERATING QUERY FACETS USING KNOWLEDGE BASES | |
21 | CTDT721 | INFLUENCE MAXIMIZATION IN TRAJECTORY DATABASES | |
22 | CTDT722 | QUERY REORGANISATION ALGORITHMS FOR EFFICIENT BOOLEAN INFORMATION FILTERING | |
23 | CTDT723 | E2HRC: AN ENERGY-EFFICIENT HETEROGENEOUS RING CLUSTERING ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS |
|
24 | CTDT724 | ENERGY EFFICIENT CLUSTERING ALGORITHM FOR MULTI-HOP WIRELESS SENSOR NETWORK USING TYPE-2 FUZZY LOGIC |
|
25 | CTDT725 | ENERGY EFFICIENT MULTIPATH ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORK USING THE FITNESS FUNCTION |
|
26 | CTDT726 | LIGHTWEIGHT THREE-FACTOR AUTHENTICATION AND KEY AGREEMENT PROTOCOL FOR INTERNET- INTEGRATED WIRELESS SENSOR NETWORKS |
|
27 | CTDT727 | RESEARCH ON TRUST SENSING BASED SECURE ROUTING MECHANISM FOR WIRELESS SENSOR NETWORK | |
28 | CTDT728 | TRAFFIC DECORRELATION TECHNIQUES FOR COUNTERING A GLOBAL EAVESDROPPER IN WSNS | |
29 | CTDT729 | COOPERATIVE QUERY ANSWER AUTHENTICATION SCHEME OVER ANONYMOUS SENSING DATA | |
30 | CTDT730 | FASTGEO: EFFICIENT GEOMETRIC RANGE QUERIES ON ENCRYPTED SPATIAL DATA | |
31 | CTDT731 | NETSPAM: A NETWORK-BASED SPAM DETECTION FRAMEWORK FOR REVIEWS IN ONLINE SOCIAL MEDIA | |
32 | CTDT732 | PRIVACY-PRESERVING SELECTIVE AGGREGATION OF ONLINE USER BEHAVIOR DATA | |
33 | CTDT733 | SEARCH RANK FRAUD AND MALWARE DETECTION IN GOOGLE PLAY | |
34 | CTDT734 | LEVERAGING CROWDSOURCING FOR EFFICIENT MALICIOUS USERS DETECTION IN LARGE-SCALE SOCIAL NETWORKS |
|
35 | CTDT735 | SPFM: SCALABLE AND PRIVACY-PRESERVING FRIEND MATCHING IN MOBILE CLOUD | |
36 | CTDT736 | A NOVEL DATA HIDING ALGORITHM FOR HIGH DYNAMIC RANGE IMAGES | |
37 | CTDT737 | IMAGE RE-RANKING BASED ON TOPIC DIVERSITY | |
38 | CTDT738 | FLEXIBLE WILDCARD SEARCHABLE ENCRYPTION SYSTEM | |
39 | CTDT739 | TRANSACTIONAL BEHAVIOR VERIFICATION IN BUSINESS PROCESS AS A SERVICE CONFIGURATION |
S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTDT601 | CATCH YOU IF YOU MISBEHAVE: RANKED KEYWORD SEARCH RESULTS VERIFICATION IN CLOUD COMPUTING | |
2 | CTDT602 | CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN CLOUD COMPUTING |
|
3 | CTDT603 | CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS |
|
4 | CTDT604 | DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA | |
5 | CTDT605 | DYNAMIC-HASH-TABLE BASED PUBLIC AUDITING FOR SECURE CLOUD STORAGE | |
6 | CTDT606 | ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES | |
7 | CTDT607 | FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES | |
8 | CTDT608 | IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD |
|
9 | CTDT609 | KSF-OABE: OUTSOURCED ATTRIBUTE-BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE |
|
10 | CTDT610 | LEVERAGING DATA DEDUPLICATION TO IMPROVE THE PERFORMANCE OF PRIMARY STORAGE SYSTEMS IN THE CLOUD |
|
11 | CTDT611 | MMB CLOUD-TREE: AUTHENTICATED INDEX FOR VERIFIABLE CLOUD SERVICE SELECTION | |
12 | CTDT612 | TRUST-BUT-VERIFY: VERIFYING RESULT CORRECTNESS OF OUTSOURCED FREQUENT ITEM SET MINING IN DATA-MINING-AS-A-SERVICE PARADIGM |
|
13 | CTDT613 | A MIXED GENERATIVE-DISCRIMINATIVE BASED HASHING METHOD | |
14 | CTDT614 | PERSONALIZED TRAVEL SEQUENCE RECOMMENDATION ON MULTI-SOURCE BIG SOCIAL MEDIA | |
15 | CTDT615 | PRACTICAL APPROXIMATE K NEAREST NEIGHBOR QUERIES WITH LOCATION AND QUERY PRIVACY | |
16 | CTDT616 | TEXT MINING THE CONTRIBUTORS TO RAIL ACCIDENTS | |
17 | CTDT617 | USER-SERVICE RATING PREDICTION BY EXPLORING SOCIAL USERS’ RATING BEHAVIORS | |
18 | CTDT618 | CONTENT-ADAPTIVE STEGANOGRAPHY BY MINIMIZING STATISTICAL DETECTABILITY | |
19 | CTDT619 | SECURE REVERSIBLE IMAGE DATA HIDING OVER ENCRYPTED DOMAIN VIA KEY MODULATION | |
20 | CTDT620 | SECURING SIFT: PRIVACY-PRESERVING OUTSOURCING COMPUTATION OF FEATURE EXTRACTIONS OVER ENCRYPTED IMAGE DATA |
|
21 | CTDT621 | A JOINT TIME SYNCHRONIZATION AND LOCALIZATION DESIGN FOR MOBILE UNDERWATER SENSOR NETWORKS | |
22 | CTDT622 | DAGCM: A CONCURRENT DATA UPLOADING FRAMEWORK FOR MOBILE DATA GATHERING IN WIRELESS SENSOR NETWORKS |
|
23 | CTDT623 | SERVICE USAGE CLASSIFICATION WITH ENCRYPTED INTERNET TRAFFIC IN MOBILE MESSAGING APPS | |
24 | CTDT624 | TRAFFIC DECORRELATION TECHNIQUES FOR COUNTERING A GLOBAL EAVESDROPPER IN WSNS | |
25 | CTDT625 | WORAL: A WITNESS ORIENTED SECURE LOCATION PROVENANCE FRAMEWORK FOR MOBILE DEVICES | |
26 | CTDT626 | EFFICIENT CERTIFICATE LESS ACCESS CONTROL FOR WIRELESS BODY AREA NETWORKS | |
27 | CTDT627 | FINDING NONEQUIVALENT CLASSIFIERS IN BOOLEAN SPACE TO REDUCE TCAM USAGE | |
28 | CTDT628 | GEOGRAPHIC AND OPPORTUNISTIC ROUTING FOR UNDERWATER SENSOR NETWORKS | |
29 | CTDT629 | OPTIMIZING COST FOR ONLINE SOCIAL NETWORKS ON GEO-DISTRIBUTED CLOUDS | |
30 | CTDT630 | SECURE AND EFFICIENT DATA COMMUNICATION PROTOCOL FOR WIRELESS BODY AREA NETWORKS | |
31 | CTDT631 | AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS | |
32 | CTDT632 | REAL-TIME SEMANTIC SEARCH USING APPROXIMATE METHODOLOGY FOR LARGE-SCALE STORAGE SYSTEMS | |
33 | CTDT633 | DETECTING AND REMOVING WEB APPLICATION VULNERABILITIES WITH STATIC ANALYSIS AND DATA MINING | |
34 | CTDT634 | ID2S PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOLS | |
35 | CTDT635 | A DISTRIBUTED THREE-HOP ROUTING PROTOCOL TO INCREASE THE CAPACITY OF HYBRID WIRELESS NETWORKS |
|
36 | CTDT636 | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA. | |
37 | CTDT637 | AN ATTRIBUTE-ASSISTED RERANKING MODEL FOR WEB IMAGE SEARCH | |
38 | CTDT638 | AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS | |
39 | CTDT639 | AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKLY LABELED IMAGES | |
40 | CTDT640 | BEHAVIOR RULE SPECIFICATION-BASED INTRUSION DETECTION FOR SAFETY CRITICAL MEDICAL CYBER PHYSICAL SYSTEMS |
|
41 | CTDT641 | CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM | |
42 | CTDT642 | COLLISION TOLERANT AND COLLISION FREE PACKET SCHEDULING FOR UNDERWATER ACOUSTIC LOCALIZATION |
|
43 | CTDT643 | CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION |
|
44 | CTDT644 | COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS | |
45 | CTDT645 | DEFEATING JAMMING WITH THE POWER OF SILENCE: A GAME-THEORETIC ANALYSIS | |
46 | CTDT646 | DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS | |
47 | CTDT647 | DISCOVERY OF RANKING FRAUD FOR MOBILE APPS | |
48 | CTDT648 | ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONARIES OVER ENCRYPTED CLOUD DATA |
|
49 | CTDT649 | ENERGY-AWARE LOAD BALANCING AND APPLICATION SCALING FOR THE CLOUD ECOSYSTEM | |
50 | CTDT650 | EYE GAZE TRACKING WITH A WEB CAMERA IN A DESKTOP ENVIRONMENT | |
51 | CTDT651 | GENERATING SEARCHABLE PUBLIC-KEY CIPHERTEXTS WITH HIDDEN STRUCTURES FOR FAST KEYWORD SEARCH |
|
52 | CTDT652 | IMPROVED PRIVACY-PRESERVING P2P MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS | |
53 | CTDT653 | KEY-RECOVERY ATTACKS ON KIDS, A KEYED ANOMALY DETECTION SYSTEM | |
54 | CTDT654 | LEARNING FINGERPRINT RECONSTRUCTION: FROM MINUTIAE TO IMAGE | |
55 | CTDT655 | LOCATION-AWARE AND PERSONALIZED COLLABORATIVE FILTERING FOR WEB SERVICE RECOMMENDATION | |
56 | CTDT656 | MOBILE DATA GATHERING WITH LOAD BALANCED CLUSTERING AND DUAL DATA UPLOADING IN WIRELESS SENSOR NETWORKS. |
|
57 | CTDT657 | MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH | |
58 | CTDT658 | OPTIMAL CONFIGURATION OF NETWORK CODING IN AD HOC NETWORKS | |
59 | CTDT659 | PAGE: A PARTITION AWARE ENGINE FOR PARALLEL GRAPH COMPUTATION. | |
60 | CTDT660 | PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES | |
61 | CTDT661 | PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS |
|
62 | CTDT662 | PSMPA: PATIENT SELF-CONTROLLABLE AND MULTI-LEVEL PRIVACY- PRESERVING COOPERATIVE AUTHENTICATION IN DISTRIBUTED |
|
63 | CTDT663 | QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS | |
64 | CTDT664 | SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERS | |
65 | CTDT665 | SINGLE IMAGE SUPERRESOLUTION BASED ON GRADIENT PROFILE SHARPNESS | |
66 | CTDT666 | STEGANOGRAPHY USING REVERSIBLE TEXTURE SYNTHESIS | |
67 | CTDT667 | UNIVERSAL NETWORK CODING-BASED OPPORTUNISTIC ROUTING FOR UNICAST |
S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTDT501 | A DISTRIBUTED THREE-HOP ROUTING PROTOCOL TO INCREASE THE CAPACITY OF HYBRID WIRELESS NETWORKS |
|
2 | CTDT502 | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA. | |
3 | CTDT503 | AN ATTRIBUTE-ASSISTED RERANKING MODEL FOR WEB IMAGE SEARCH | |
4 | CTDT504 | AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS | |
5 | CTDT505 | AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKLY LABELED IMAGES | |
6 | CTDT506 | BEHAVIOR RULE SPECIFICATION-BASED INTRUSION DETECTION FOR SAFETY CRITICAL MEDICAL CYBER PHYSICAL SYSTEMS |
|
7 | CTDT507 | CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM | |
8 | CTDT508 | COLLISION TOLERANT AND COLLISION FREE PACKET SCHEDULING FOR UNDERWATER ACOUSTIC LOCALIZATION |
|
9 | CTDT509 | CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION |
|
10 | CTDT510 | COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS | |
11 | CTDT511 | DEFEATING JAMMING WITH THE POWER OF SILENCE: A GAME-THEORETIC ANALYSIS | |
12 | CTDT512 | DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS | |
13 | CTDT513 | DISCOVERY OF RANKING FRAUD FOR MOBILE APPS | |
14 | CTDT514 | ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONARIES OVER ENCRYPTED CLOUD DATA |
|
15 | CTDT515 | ENERGY-AWARE LOAD BALANCING AND APPLICATION SCALING FOR THE CLOUD ECOSYSTEM | |
16 | CTDT516 | EYE GAZE TRACKING WITH A WEB CAMERA IN A DESKTOP ENVIRONMENT | |
17 | CTDT517 | GENERATING SEARCHABLE PUBLIC-KEY CIPHERTEXTS WITH HIDDEN STRUCTURES FOR FAST KEYWORD SEARCH |
|
18 | CTDT518 | IMPROVED PRIVACY-PRESERVING P2P MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS | |
19 | CTDT519 | KEY-RECOVERY ATTACKS ON KIDS, A KEYED ANOMALY DETECTION SYSTEM | |
20 | CTDT520 | LEARNING FINGERPRINT RECONSTRUCTION: FROM MINUTIAE TO IMAGE | |
21 | CTDT521 | LOCATION-AWARE AND PERSONALIZED COLLABORATIVE FILTERING FOR WEB SERVICE RECOMMENDATION | |
22 | CTDT522 | MOBILE DATA GATHERING WITH LOAD BALANCED CLUSTERING AND DUAL DATA UPLOADING IN WIRELESS SENSOR NETWORKS. |
|
23 | CTDT523 | MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH | |
24 | CTDT524 | OPTIMAL CONFIGURATION OF NETWORK CODING IN AD HOC NETWORKS | |
25 | CTDT525 | PAGE: A PARTITION AWARE ENGINE FOR PARALLEL GRAPH COMPUTATION. | |
26 | CTDT526 | PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES | |
27 | CTDT527 | PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS |
|
28 | CTDT528 | PSMPA: PATIENT SELF-CONTROLLABLE AND MULTI-LEVEL PRIVACY- PRESERVING COOPERATIVE AUTHENTICATION IN DISTRIBUTED |
|
29 | CTDT529 | QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS | |
30 | CTDT530 | SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERS | |
31 | CTDT531 | SINGLE IMAGE SUPERRESOLUTION BASED ON GRADIENT PROFILE SHARPNESS | |
32 | CTDT532 | STEGANOGRAPHY USING REVERSIBLE TEXTURE SYNTHESIS | |
33 | CTDT533 | UNIVERSAL NETWORK CODING-BASED OPPORTUNISTIC ROUTING FOR UNICAST | |
34 | CTDT534 | A COCKTAIL APPROACH FOR TRAVEL PACKAGE RECOMMENDATION | |
35 | CTDT535 | A PROBABILISTIC MISBEHAVIOR DETECTION SCHEME TOWARDS EFFICIENT TRUST ESTABLISHMENT IN DELAY-TOLERANT NETWORKS |
|
36 | CTDT536 | A QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL FOR HYBRID WIRELESS NETWORKS | |
37 | CTDT537 | A SYSTEM FOR DENIAL-OF-SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS | |
38 | CTDT538 | AN EMPIRICAL PERFORMANCE EVALUATION OF RELATIONAL KEYWORD SEARCH TECHNIQUES | |
39 | CTDT539 | AN ERROR-MINIMIZING FRAMEWORK FOR LOCALIZING JAMMERS IN WIRELESS NETWORKS | |
40 | CTDT540 | AUTONOMOUS MOBILE MESH NETWORKS | |
41 | CTDT541 | BALANCING PERFORMANCE, ACCURACY, AND PRECISION FOR SECURE CLOUD TRANSACTIONS | |
42 | CTDT542 | BUILDING CONFIDENTIAL AND EFFICIENT QUERY SERVICES IN THE CLOUD WITH RASP DATA PERTURBATION | |
43 | CTDT543 | CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS | |
44 | CTDT544 | CERTIFICATE LESS REMOTE ANONYMOUS AUTHENTICATION SCHEMES FOR WIRELESS BODY AREA NETWORKS |
|
45 | CTDT545 | CLICK PREDICTION FOR WEB IMAGE RERANKING USING MULTIMODAL SPARSE CODING | |
46 | CTDT546 | CONSISTENCY AS A SERVICE: AUDITING CLOUD CONSISTENCY | |
47 | CTDT547 | CONTENT CACHING AND SCHEDULING IN WIRELESS NETWORKS WITH ELASTIC AND INELASTIC TRAFFIC | |
48 | CTDT548 | DA-SYNC: A DOPPLER-ASSISTED TIME-SYNCHRONIZATION SCHEME FOR MOBILE UNDERWATER SENSOR NETWORKS |
|
49 | CTDT549 | DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS | |
50 | CTDT550 | DESIGNING AN EFFICIENT IMAGE ENCRYPTION-THEN COMPRESSION SYSTEM VIA PREDICTION ERROR CLUSTERING AND RANDOM PERMUTATION |
|
51 | CTDT551 | DISTRIBUTED, CONCURRENT, AND INDEPENDENT ACCESS TO ENCRYPTED CLOUD DATABASES | |
52 | CTDT552 | EFFICIENT DATA QUERY IN INTERMITTENTLY-CONNECTED MOBILE AD HOC SOCIAL NETWORKS | |
53 | CTDT553 | ENABLING DATA INTEGRITY PROTECTION IN REGENERATING-CODING-BASED CLOUD STORAGE: THEORY AND IMPLEMENTATION |
|
54 | CTDT554 | IDENTITY-BASED DISTRIBUTED PROVABLE DATA POSSESSION IN MULTI-CLOUD STORAGE | |
55 | CTDT555 | KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE | |
56 | CTDT556 | LARS*: AN EFFICIENT AND SCALABLE LOCATION-AWARE RECOMMENDER SYSTEM | |
57 | CTDT557 | LEVERAGING SOCIAL NETWORKS FOR P2P CONTENT-BASED FILE SHARING IN DISCONNECTED MANETS | |
58 | CTDT558 | MULTICAST CAPACITY IN MANET WITH INFRASTRUCTURE SUPPORT | |
59 | CTDT559 | PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE CLOUD | |
60 | CTDT560 | PRESERVING LOCATION PRIVACY IN GEO SOCIAL APPLICATIONS | |
61 | CTDT561 | PRODUCT ASPECT RANKING AND ITS APPLICATIONS | |
62 | CTDT562 | SCALABLE DISTRIBUTED SERVICE INTEGRITY ATTESTATION FOR SOFTWARE-AS-A-SERVICE CLOUDS | |
63 | CTDT563 | SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS | |
64 | CTDT564 | SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS | |
65 | CTDT565 | SECURE MINING OF ASSOCIATION RULES IN HORIZONTALLY DISTRIBUTED DATABASES | |
66 | CTDT566 | SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH | |
67 | CTDT567 | TRANSMISSION-EFFICIENT CLUSTERING METHOD FOR WIRELESS SENSOR NETWORKS USING COMPRESSIVE SENSING |
|
68 | CTDT568 | TYPICALITY-BASED COLLABORATIVE FILTERING RECOMMENDATION |
S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTDT1 | ||
2 | CTDT502 | ||
3 | CTDT503 | ||
4 | CTDT504 |
© 2011-20 Conscience Technologies - All Rights Reserved