You are on page 1of 2

DOTNET2012

S.No. 1 2 Project Title A New Cell Counting Based Attack Against Tor. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks. Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs. Query Planning for Continuous Aggregation Queries Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms. Robust Face-Name Graph Matching for Movie Character Identify. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency DOMINE TECH .NET .NET

Networking Wireless Communications Image Processing

.NET

Image processing

.NET

Secure Computing Data Mining Networking

.NET .NET .NET

6 7

Image Processing

.NET

Cloud computing International Conference Image processing Parallel & Distributed Systems

.NET

10

.NET

11

.NET

12

.NET

13

Topology control in mobile ad hoc networks with

Mobile

.NET

cooperative communications 14 Secure And Efficient Handover Authentication Based On Bilinear Pairing Functions Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs

Computing Secure Computing Parallel & Distributed Systems


.NET .NET

15

16 17

Latency Equalization as a New Network Service Primitive Efficient audit service outsourcing for data integrity in clouds Fair Torrent A Deficit Based Distributed Algorithm to Ensure Fairness in peer to peer Systems Network Assisted Mobile Computing with Optimal Uplink Query Processing

Networking Systems & Software Networking Mobile Computing Parallel & Distributed Systems

.NET .NET

18

.NET

19

.NET

20

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks Towards Secure and Dependable Storage Services in Cloud Computing Joint Relay and Jammer Selection for Secure Two-Way Relay Networks

.NET

21 22

Cloud Computing Information Forensics& Security

23 24

Automatic Reconfiguration for Large-Scale Reliable Storage Systems Expert Discovery and Interactions in Mixed Service-Oriented Systems

Secure Computing Service Computing

You might also like