IEEE PROJECTS .NET 2012

1 CPD1201 A New Cell Counting Based Attack Against Tor
NETWORKING
2 CPD1202 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
WIRELESS COMMUNICATIONS
3 CPD1203 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
IMAGE PROCESSING
4 CPD1204 Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points
IMAGE PROCESSING
5 CPD1205 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
SECURE COMPUTING
6 CPD1206 Query Planning for Continuous Aggregation Queries
DATA MINING
7 CPD1207 Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
NETWORKING
8 CPD1208 Robust Face-Name Graph Matching for Movie Character Identify
IMAGE PROCESSING
9 CPD1209 Scalable and Secure Sharing of Personal Health Records in using Attribute-based Encryption
PARALLEL & DISTRIBUTED SYSTEMS
10 CPD1210 Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
INTERNATIONAL CONFERENCE
11 CPD1211 Protecting Location Privacy Sensor Networks Against a Global Eavesdropper
MOBILE COMPUTING
12 CPD1212 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
PARALLEL & DISTRIBUTED SYSTEMS
13 CPD1213 Topology control in mobile ad hoc networks with cooperative communications
MOBILE COMPUTING
14 CPD1214 Secure And Efficient Handover Authentication Based On Bilinear Pairing Functions
SECURE COMPUTING
15 CPD1215 Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs
PARALLEL & DISTRIBUTED SYSTEMS
16 CPD1216 Latency Equalization as a New Network Service Primitive
NETWORKING
17 CPD1217 Efficient audit service outsourcing for data integrity in clouds
SYSTEMS & SOFTWARE
18 CPD1218 Fair Torrent A Deficit � Based Distributed Algorithm to Ensure Fairness in peer to peer Systems
NETWORKING
19 CPD1219 Automatic Reconfiguration for Large Scale Reliable Storage Systems
SECURE COMPUTING
20 CPD1220 BECAN:A Bandwidth Efficient Cooperative Authentication Scheme
PARALLEL & DISTRIBUTED SYSTEMS
21 CPD1221 Expert Discovery and Interactions in Mixed Service Oriented Systems
SERVICES COMPUTING
22 CPD1222 Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
INFORMATION FORENSICS & SECURITY
23 CPD1223 Towards Secure and Dependable Storage Services in Cloud Computing
SERVICES COMPUTING
24 CPD1224 Network Assisted Mobile Computing with Optimal Uplink Query Processing
MOBILE COMPUTING
25 CPD1225 Revisiting Defenses against Large-Scale Online Password Guessing Attacks
SECURE COMPUTING
26 CPD1226 Automatic Image Equalization and Contrast Enhancement Using Gaussian Mixture Modeling
IMAGE PROCESSING
27 CPD1227 Cashing in on the Cache in the Cloud
CLOUD COMPUTING
28 CPD1228 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
CLOUD COMPUTING
29 CPD1229 An Online Learning Approach to Occlusion Boundary Detection
IMAGE PROCESSING
30 CPD1230 Creating Evolving User Behavior Profiles Automatically
KNOWLEDGE & DATA ENGINEERING
31 CPD1231 Enhanced Data Security Model for Cloud Computing
CLOUD COMPUTING
32 CPD1232 Security From Single to Multi-Clouds
CLOUD COMPUTING
33 CPD1233 Catching Packet Droppers & Modifiers in Wireless Sensor Networks
PARALLEL & DISTRIBUTED SYSTEMS
34 CPD1234 On The Security & Efficiency of Content Distribution via Network Coding
SECURE COMPUTING
35 CPD1235 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
MOBILE COMPUTING
36 CPD1236 Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism
SECURE COMPUTING
37 CPD1237 emi Supervised Biased Maximum Margin Analysis for Interactive Image Retrieval
IMAGE PROCESSING