IEEE 2014 – 2015 JAVA TITLES
|
||
PROJECT CODE
|
TITLE
|
DOMAIN
|
LANJ1501
|
TEES: An Efficient Search Scheme
over Encrypted Data on Mobile Cloud
|
CLOUD COMPUTING
|
LANJ1502
|
DROPS: Division and Replication of
Data in Cloud for Optimal Performance and Security
|
CLOUD COMPUTING
|
LANJ1503
|
CloudArmor: Supporting Reputation-based Trust
Management for Cloud Services
|
CLOUD COMPUTING
|
LANJ1504
|
Audit-Free Cloud Storage via Deniable
Attribute-based Encryption
|
CLOUD COMPUTING
|
LANJ1505
|
Privacy
Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud
Computing
|
CLOUD COMPUTING
|
LANJ1506
|
Control Cloud Data Access Privilege and
Anonymity With Fully Anonymous
Attribute-Based
Encryption
|
CLOUD COMPUTING
|
LANJ1507
|
Key-Aggregate
Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
|
CLOUD COMPUTING
|
LANJ1508
|
Audit-Free
Cloud Storage via Deniable Attribute-based
Encryption
|
CLOUD COMPUTING
|
LANJ1509
|
A Hybrid Cloud Approach for Secure Authorized
Deduplication
|
CLOUD COMPUTING
|
LANJ1510
|
A Scalable
and Reliable Matching Service for Content-Based Publish/Subscribe Systems
|
CLOUD COMPUTING
|
LANJ1511
|
Enabling Cloud Storage Auditing with
Key-Exposure Resistance |
CLOUD COMPUTING
|
LANJ1512
|
Stealthy Denial of Service Strategy in Cloud
Computing
|
CLOUD COMPUTING
|
LANJ1513
|
Privacy-Preserving
Public Auditing for Regenerating-Code-Based Cloud Storage
|
CLOUD COMPUTING
|
LANJ1514
|
Enabling Fine-grained Multi-keyword
Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
|
CLOUD COMPUTING
|
LANJ1515
|
Cloud-Trust - a Security Assessment
Model for Infrastructure as a Service (IaaS) Clouds
|
CLOUD COMPUTING
|
LANJ1516
|
Circuit Cipher text-policy
Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud
Computing
|
CLOUD COMPUTING
|
LANJ1517
|
A
Dynamic Secure Group Sharing Framework In Public Cloud Computing
|
CLOUD COMPUTING
|
LANJ1518
|
Provable Multicopy Dynamic Data Possession in
Cloud Computing Systems
|
CLOUD COMPUTING
|
LANJ1519
|
Detecting Malicious Facebook Applications
|
NETWORKING
|
LANJ1520
|
Universal
Network Coding-Based Opportunistic Routing for Unicast
|
NETWORKING
|
LANJ1521
|
Maximizing
P2P File Access Availability in Mobile Ad Hoc Networks though Replication for
Efficient File Sharing
|
NETWORKING
|
LANJ1522
|
Scaling Social Media Applications Into
Geo-Distributed Clouds
|
NETWORKING
|
LANJ1523
|
Privacy-Preserving Quantification of
Cross-Domain Network Reachability
|
NETWORKING
|
LANJ1524
|
Privacy Policy Inference of
User-Uploaded Images on Content Sharing Sites
|
KNOWLEDGE & DATA ENGINEERING
|
LANJ1525
|
Tweet
Segmentation and Its Application to Named Entity Recognition
|
KNOWLEDGE & DATA ENGINEERING
|
LANJ1526
|
Best
Keyword Cover Search
|
KNOWLEDGE & DATA ENGINEERING
|
LANJ1527
|
On
Summarization and Timeline Generation for Evolutionary Tweet Streams
|
KNOWLEDGE & DATA ENGINEERING
|
LANJ1528
|
FOCS: Fast Overlapped Community Search
|
KNOWLEDGE & DATA ENGINEERING
|
LANJ1529
|
Co-Extracting
Opinion Targets and Opinion Words from Online Reviews Based on the Word
Alignment Model
|
KNOWLEDGE & DATA ENGINEERING
|
LANJ1530
|
Route-Saver: Leveraging Route APIs for Accurate
and Efficient Query Processing at Location-Based Services
|
KNOWLEDGE & DATA ENGINEERING
|
LANJ1531
|
Translating Relational Queries into
Spreadsheets
|
KNOWLEDGE & DATA ENGINEERING
|
LANJ1532
|
PAGE: A Partition Aware Engine for Parallel Graph Computation |
KNOWLEDGE & DATA ENGINEERING
|
LANJ1533
|
Efficient Enforcement of Action-aware
Purpose-based Access Control within Relational Database Management Systems
|
KNOWLEDGE & DATA ENGINEERING
|
LANJ1534
|
Friendbook: A
Semantic-Based Friend Recommendation System for Social Networks
|
MOBILE COMPUTING
|
LANJ1535
|
User-Defined
Privacy Grid System for Continuous Location-Based Services
|
MOBILE COMPUTING
|
LANJ1536
|
DaGCM: A Concurrent Data Uploading Framework
for Mobile Data Gathering in Wireless Sensor Networks
|
MOBILE COMPUTING
|
LANJ1537
|
A New Multiple Service Key Management Scheme
for Secure Wireless Mobile Multicast
|
MOBILE COMPUTING
|
LANJ1538
|
A privacy-preserving framework for managing
mobile ad requests and billing information
|
MOBILE COMPUTING
|
LANJ1539
|
Practical Secret Key Agreement for Full-Duplex
Near Field Communications
|
MOBILE COMPUTING
|
LANJ1540
|
DDSGA: A Data-Driven Semi-Global Alignment
Approach for Detecting Masquerade Attacks
|
SECURE COMPUTING
|
LANJ1541
|
Deleting
Secret Data with Public Verifiability
|
SECURE COMPUTING
|
LANJ1542
|
Key-recovery Attacks on KIDS, a Keyed Anomaly
Detection System
|
SECURE COMPUTING
|
LANJ1543
|
My Privacy My Decision: Control of Photo
Sharing on Online Social Networks
|
SECURE COMPUTING
|
LANJ1544
|
A Trust-based Privacy-Preserving Friend
Recommendation Scheme for Online Social Networks
|
SECURE COMPUTING
|
LANJ1545
|
Between Worlds: Securing Mixed
JavaScript/ActionScript Multi-party Web Content
|
SECURE COMPUTING
|
LANJ1546
|
Improved Privacy-Preserving P2P Multimedia
Distribution Based on Recombined Fingerprints
|
SECURE COMPUTING
|
LANJ1547
|
Contributory
Broadcast Encryption with Efficient Encryption and Short Ciphertexts
|
SECURE COMPUTING
|
LANJ1548
|
A Computational Dynamic Trust Model for User
Authorization
|
SECURE COMPUTING
|
LANJ1549
|
A Proximity-aware Interest-clustered P2P File
Sharing System
|
PARALLEL & DISTRIBUTED SYSTEMS
|
LANJ1550
|
CAMF: Context-aware Message Forwarding in
Selfish Mobile Social Networks
|
PARALLEL & DISTRIBUTED SYSTEMS
|
LANJ1546
|
Secure
Distributed Deduplication Systems with ImprovedReliability
|
PARALLEL & DISTRIBUTED SYSTEMS
|
LANJ1547
|
A General Scalable and Elastic
Content-Based Publish/Subscribe Service
|
PARALLEL & DISTRIBUTED SYSTEMS
|
LANJ1548
|
Goodput-Aware Load Distribution for
Real-Time Traffic over Multipath Networks
|
PARALLEL & DISTRIBUTED SYSTEMS
|
LANJ1549
|
Software
Puzzle: A Countermeasure to Resource-Inflated Denial of-Service Attacks
|
INFORMATION
FORENSICS AND
SECURITY
|
LANJ1550
|
Key Updating
for Leakage Resiliency with Application to AES Modes of Operation
|
INFORMATION
FORENSICS AND
SECURITY
|
LANJ1551
|
Generating
Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword
Search
|
INFORMATION
FORENSICS AND
SECURITY
|
2015-2016 IEEE PROJECT TITLES for M.E.,M.Tech.,B.E.,B.Tech.,M.Phil.,MCA, 2015 IEEE Projects base papers, project center in coimbatore, Bulk IEEE Projects,2015 IEEE projects, MCA projects in coimbatore, IEEE 2015 projects, 2015 IEEE Projects base papers, Application projects, Real time projects, Software Development,2015 IEEE Java projects, 2015 IEEE dotnet projects, 2015 Android IEEE Projects,Android projects,best project center in Coimbatore
2015 IEEE Projects
Subscribe to:
Posts (Atom)
No comments:
Post a Comment