IEEE PROJECTS .NET 2016

1 CPD1601 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
CLOUD COMPUTING
2 CPD1602 Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
CLOUD COMPUTING
3 CPD1603 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
CLOUD COMPUTING
4 CPD1604 Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
CLOUD COMPUTING
5 CPD1605 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
CLOUD COMPUTING
6 CPD1606 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
CLOUD COMPUTING
7 CPD1607 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
CLOUD COMPUTING
8 CPD1608 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
CLOUD COMPUTING
9 CPD1609 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
CLOUD COMPUTING
10 CPD1610 KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
CLOUD COMPUTING
11 CPD1611 Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud
CLOUD COMPUTING
12 CPD1612 MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
CLOUD COMPUTING
13 CPD1613 Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm
CLOUD COMPUTING
14 CPD1614 A Mixed Generative-Discriminative Based Hashing Method
DATA MINING
15 CPD1615 Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
DATA MINING
16 CPD1616 Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
DATA MINING
17 CPD1617 Text Mining the Contributors to Rail Accidents
DATA MINING
18 CPD1618 User-Service Rating Prediction by Exploring Social Users Rating Behaviors
DATA MINING
19 CPD1619 Efficient Certificate less Access Control for Wireless Body Area Networks
NETWORKING
20 CPD1620 Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage
NETWORKING
21 CPD1621 Geographic and Opportunistic Routing for Underwater Sensor Networks
NETWORKING
22 CPD1622 Optimizing Cost for Online Social Networks on Geo-Distributed Clouds
NETWORKING
23 CPD1623 Secure and Efficient data communication protocol for Wireless Body Area Networks
NETWORKING
24 CPD1624 A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks
MOBILE COMPUTING
25 CPD1625 DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks
MOBILE COMPUTING
26 CPD1626 Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
MOBILE COMPUTING
27 CPD1627 Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
MOBILE COMPUTING
28 CPD1628 WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
MOBILE COMPUTING
29 CPD1629 Authenticated Key Exchange Protocols for Parallel Network File Systems
PARALLEL & DISTRIBUTED SYSTEMS
30 CPD1630 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage System
PARALLEL & DISTRIBUTED SYSTEMS
31 CPD1631 Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
SECURE COMPUTING
32 CPD1632 ID2S Password-Authenticated Key Exchange Protocols
SECURE COMPUTING
33 CPD1633 Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
INFORMATION FORENSICS & SECURITY
34 CPD1634 Content-Adaptive Steganography by Minimizing Statistical Detectability
IMAGE PROCESSING
35 CPD1635 Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
IMAGE PROCESSING
36 CPD1636 Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data
IMAGE PROCESSING
37 CPD1637 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
IOT (INTERNET OF THINGS)
38 CPD1638 Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
SERVICE COMPUTING