Sl.No Project Code Secure Computing Project Titles Year Enquiry
1ECAND_1611 VULHUNTER: Toward Discovering Vulnerabilities in Android Applications 2015
2ECAND_1612 Privacy-Preserving Relative Location Based Services for Mobile Users 2015
3ECAND_1613 Context-Based Access Control Systems for Mobile Devices 2015
4ECNS2_1640 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks 2015
5ECNS2_1641 Time-Delayed Broadcasting for Defeating Inside Jammers 2015
6ECJAV_1644 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2015
7ECJAV_1645 Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers 2015
8ECJAV_1646 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints 2015
9ECJAV_1647 Continuous and Transparent User Identity Verification for Secure Internet Services 2015
10ECJAV_1648 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks 2015
11ECJAV_1649 A Computational Dynamic Trust Model for User Authorization 2015
12ECJAV_1650 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks 2015
13ECJAV_1651 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Network 2015
14ECDOT_1624 Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search 2015
15ECDOT_1625 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System 2015
16ECDOT_1626 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints 2015
17ECDOT_1627 Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems 2015