Upload
tmks-infotech
View
88
Download
2
Embed Size (px)
Citation preview
2015 IEEE Java, Android Projects,TMKS InfoTech, Bangalore#1510,Sri Gowri Shankara Complex, 2nd Floor,MKK Road, Near Harishchandra Ghat, Mariyappanapalya, Rajajinagar 2nd Stage, Bangalore - 560021. Contact :: K.Manjunath -- 09535866270Sl.NoProject TitleYear
Cloud Computing
1Identity-based Encryption with Outsourced Revocation in Cloud Computing2015
2Cloud Armor Supporting Reputation-based Trust Management for Cloud Services2015
3SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks2015
4Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation2015
5Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds2015
6Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds2015
7Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption2015
8A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing2015
9A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data2015
10Audit Free Cloud Storage via Deniable Attribute based Encryption2015
11CHARM: A Cost-efficient Multi cloud Data Hosting Scheme with High Availability2015
12Demystifying the Clouds: Harnessing Resource Utilization Models for Cost Effective Infrastructure Alternatives2015
13Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing2015
14Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud2015
15Combining Efficiency, Fidelity, and Flexibility in Resource Information Services2015
16Cost-Effective Authentic and Anonymous Data Sharing with Forward Security2015
17Enabling Cloud Storage Auditing with Key Exposure Resistance2015
18Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem2015
19Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage2015
20OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices2015
21Privacy Preserving Public Auditing for Regenerating Code Based Cloud Storage2015
22Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud2015
23Provable Multi copy Dynamic Data Possession in Cloud Computing Systems2015
24Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation2015
25Reactive Resource Provisioning Heuristics for Dynamic Data flows on Cloud Infrastructure2015
26Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing2015
27EnDAS: Efficient Encrypted Data Search as a Mobile Cloud 2015
28Secure Auditing and De duplicating Data in Cloud2015
29Secure Distributed De duplication Systems with Improved Reliability2015
30Public Integrity Auditing for Dynamic Data Sharing with Multi User Modification2015
31A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems2015
32Cloud-Trust a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds2015
33Cloud-Based Multimedia Content Protection System2015
34A secure data self-destructing scheme in cloud computing2015
35Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage2015
36A Hybrid Cloud Approach for Secure Authorized De duplication2015
37Stealthy Denial of Service Strategy in Cloud Computing2015
38A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud2015
39An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration2015
40Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data2015
41Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing2015
42SelCSP: A Framework to Facilitate Selection of Cloud Service Providers2015
43Guest Editorial: Recommendation Techniques for Services Computing and Cloud Computing2015
44PSMPA: Patient Self-Controllable and Multi-Level Privacy Preserving Cooperative Authentication in Distributed m- Healthcare Cloud Computing System2015
45MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework2015
46Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications2015
47A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data2015
48Enabling Fine grained Multi keyword Search Supporting Classified Sub dictionaries over Encrypted Cloud Computing2015
49Service Reducing Fragmentation for In-line De duplication Backup Storage via Exploiting Backup History and Cache Knowledge2015
50On the Security of Data Access Control for Multi Authority cloud storage systems2015
51
52More Titles Updating Soon!!!
Network Security & Secure Computing
1Key recovery Attacks on KIDS, a Keyed Anomaly Detection System2015
2Authenticated Key Exchange Protocols for Parallel Network File Systems2015
3CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes2015
4My Privacy My Decision Control of Photo Sharing on Online Social Networks2015
5Passive IP Trace back: Disclosing the Locations of IP Spoofers from Path Backscatter2015
6Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword Search2015
7Software Puzzle: A Countermeasure to Resource-Inflated Denial of- Service Attacks2015
8Secure Distributed De duplication Systems with Improved Reliability2015
9Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils2015
10Group Key Agreement with Local Connectivity2015
11Key Updating for Leakage Resiliency with Application to AES Modes of Operation2015
12A Computational Dynamic Trust Model for User Authorization2015
13Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts2015
14Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems2015
15Continuous and Transparent User Identity Verification for Secure Internet Services2015
16Data Lineage in Malicious Environments2015
17Secure Spatial Top-k Query Processing via Un trusted Location- Based Service Providers2015
18DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks2015
19Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints2015
More Titles Updating Soon!!!
Data Mining
1Towards Effective Bug Triage with Software Data Reduction Techniques2015
2Active Learning for Ranking through Expected Loss Optimization2015
3Discovery of Ranking Fraud for Mobile Apps2015
4k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data2015
5Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions2015
6PAGE: A Partition Aware Engine for Parallel Graph Computation2015
7Query Aware Determinization of Uncertain Objects2015
8RRW - A Robust and Reversible Watermarking Technique for Relational Data2015
9Rule-Based Method for Entity Resolution2015
102015
11Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces2015
12Best Keyword Cover Search2015
13Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model2015
14Context-Based Diversification for Keyword Queries over XML Data2015
15Malware Propagation in Large-Scale Networks2015
16On Summarization and Timeline Generation for Evolutionary Tweet Streams2015
17Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites2015
18Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection2015
19Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services2015
20Scalable Constrained Spectral Clustering2015
21Tweet Segmentation and Its Application to Named Entity Recognition2015
22Tracking Temporal Community Strength in Dynamic Networks2015
23Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services2015
24Making Digital Artifacts on the Web Verifiable and Reliable2015
25Privacy Policy Inference of User Uploaded Images on Content Sharing Sites2015
26Structured Learning from Heterogeneous Behavior for Social Identity Linkage2015
27Sub graph Matching with Set Similarity in a Large Graph Database2015
28Tweet Segmentation and Its Application to Named Entity Recognition2015
More Titles Updating Soon!!!
Mobile Computing
1A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks2015
2Optimum Power Allocation in Sensor Networks for Active Radar Applications2015
3Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks2015
4Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks2015
5User-Defined Privacy Grid System for Continuous Location-Based Services2015
6Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks2015
7Towards Information Diffusion in Mobile Social Networks2015
8Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks2015
9Minimizing Transmission Cost for Third-Party Information Exchange with Network Coding2015
10More Titles Updating Soon!!!2015
Wireless Sensor Networks
1Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks2015
2Data Collection in Multi Application Sharing Wireless Sensor Networks2015
3A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks2015
4Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks2015
5Effective Key Management in Dynamic Wireless Sensor Networks2015
6Congestion Aware Load Balancing for Multi radio Wireless Mesh Network2015
7Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks2015
8Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks2015
9An Efficient Distributed Trust Model for Wireless Sensor Networks2015
10Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks2015
11Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs2015
12Efficient Coverage and Connectivity Preservation With Load Balance for Wireless Sensor Networks2015
13Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks2015
142015
15More Titles Updating Soon!!!2015
Android Projects
1Cooperative Positioning and Tracking in Disruption Tolerant Networks2015
2Friend book A Semantic-based Friend Recommendation System for Social Networks2015
3Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications2015
4A Location and Diversity aware News Feed System for Mobile Users2015
5ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware2015
6Towards Information Diffusion in Mobile Social Networks2015
7Privacy-Preserving Relative Location Based Services for Mobile Users2015
8Smartphone-Based Wound Assessment System for Patients with Diabetes2015
9User Privacy and Data Trustworthiness in Mobile Crowd Sensing2015
10User-Defined Privacy Grid System for Continuous Location-Based Services2015
11VULHUNTER: Toward Discovering Vulnerabilities in Android Applications2015
12The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps2015
13Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds2015
14Context-Based Access Control Systems for Mobile Devices2015
15Extend Your Journey Considering Signal Strength and Fluctuation in Location Based Applications2015
16CWC: A Distributed Computing Infrastructure Using Smart phones2015
More Titles Updating Soon!!!
Adhoc Networks & VANET & MANET
1Efficient Data Query in Intermittently Connected Mobile Ad Hoc Social Networks2015
2Defending Against Collaborative Attacks by Malicious Nodes in MANETs A Cooperative Bait Detection Approach2015
3Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing2015
4Optimal Configuration of Network Coding in Ad Hoc Networks2015
5Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks2015
6Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks2015
72015
82015
Networking and Service Computing,Secure Computing
1Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces2015
2Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword Search2015
3Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils2015
4Detecting Malicious Face book Applications2015
5A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks2015
6A Proximity-Aware Interest-Clustered P2P File Sharing System2015
7Universal Network Coding-Based Opportunistic Routing for Unicast2015
8Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization2015
9My Privacy My Decision: Control of Photo Sharing on Online Social Networks2015
10Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation2015
11Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis2015
Image Processing and Multimedia
1Learning to Rank Image Tags with Limited Training Examples2015
2 An Attribute assisted Re ranking Model for Web Image Search 2015
3EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval2015
4Steganography Using Reversible Texture Synthesis2015
5Query Aware Determinization of Uncertain Objects2015
6Detection and Rectification of Distorted Fingerprints2015
7Learning Fingerprint Reconstruction: From Minutiae to Image2015
8Multi view Alignment Hashing for Efficient Image Search2015
9Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images2015
102015
Parallel and Distributed System
1A Computational Dynamic Trust Model for User Authorization2015
2Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks2015
3Authenticated Key Exchange Protocols for Parallel Network File Systems2015
4Cost-Effective Authentic and Anonymous Data Sharing with Forward Security2015
5Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds2015
6Data Collection in Multi-Application Sharing Wireless Sensor Networks2015
7Reducing Fragmentation for In-line De duplication Backup Storage via Exploiting Backup History2015
8Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds2015
9Secure Distributed De duplication Systems with Improved Reliability2015
10Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks2015
11A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
12Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
More Titles Updating Soon !!!
SERVICE COMPUTING
1Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation2015
2A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services2015
3Guest Editorial: Recommendation Techniques for Services Computing and Cloud Computing2015
4Diversifying Web Service Recommendation Results via Exploring Service Usage History2015
5A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values2015
6Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces2015
More Titles Updating Soon !!!