About Dotnet Project

IEEE DOTNET Project List 2018-2019

SNO           Projects List ABSTRACT
1 RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage
2 Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems
3 Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds
4 Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
5 A Multilevel Access Control Scheme for Data Security in Transparent Computing
7 Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
8 Cooperative Query Answer Authentication Scheme over Anonymous Sensing Data
9 Public Interest Analysis Based on Implicit Feedback of IPTV Users
10 SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks
11 Mobile Based Location Tracking without Internet Connectivity using Cloud Computing Environment
12 A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption
13 Quantifying Interdependent Privacy Risks with Location Data
14 SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks
15 Routing in Accumulative Multi-Hop Networks
16 Network Capability in Localizing Node Failures via End-to-End Path Measurements
17 E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks
18 Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network
19 Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network
20 Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic
20 Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic
21 Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor N
22 Follow But No Track Privacy Preserved Profile Publishing in Cyber Physical Social Systems
23 An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy
24 User Differentiated Verifiable File Search on the Cloud
25 Transactional Behavior Verification in Business Process as a Service Configuration
Phone Number
Email ID
College Name

Facebook Reviews

Follow Us On: