About Oracle Project


SNO Projects List ABSTRACT
1 Secure Optimization Computation Outsourcing in Cloud Computing A Case Study of Linear Programming
2 ID2S Password Authenticated Key Exchange Protocols
3 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
4 CSecure Data Sharing in Cloud Computing Using Revocable Storage Identity Based Encryption
5 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
6 SeDas A DeyPoS Deduplicatable Dynamic Proof of Storage for Multi User Environments
7 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud
8 Secure Auditing and Deduplicating Data in Cloud
9 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
10 Relevance Feedback Algorithms Inspired By Quantum Detection
11 Top k Dominating Queries on Incomplete Data
12 Cross Domain Sentiment Classification Using Sentiment Sensitive Embeddings
13 Crowdsourcing for Top-K Query Processing over Uncertain Data
14 Understanding Short Texts through Semantic Enrichment and Hashing
15 Sentiment Embeddings with Applications to Sentiment Analysis
16 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
17 RSkNN kNN Search on Road Networks by Incorporating Social Influence
18 A Novel Recommendation Model Regularized with User Trust and Item Ratings
19 TopicSketch: Real-Time Bursty Topic Detection from Twitter
20 Top-Down XML Keyword Query Processing
21 Inverted Linear Quadtree Efficient Top K Spatial Keyword Search
22 Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
23 Analysis of customer churn prediction in telecom industry using decision trees and logistic regression
34 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
25 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
26 Dual Server Public Key Encryption with keyword search for secure cloud storage
27 Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially
28 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
29 Hidden Ciphertext Policy Attribute Based Encryption under Standard Assumptions
30 Hidden Ciphertext Policy Attribute Based Encryption under Standard Assumptions
31 Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
32 Profiling Online Social Behaviors for Compromised Account Detection
33 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
34 CloudArmor Supporting Reputation based Trust Management for Cloud Services
35 An Efficient Privacy Preserving Ranked Keyword Search Method
36 Protecting Your Right Attribute based Keyword Search with Finegrained Owner
37 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud
38 A Secure Anti Collusion Data Sharing Scheme for Dynamic Groups in Cloud
39 A Secure and Dynamic Multi keyword Ranked search scheme over Encrypted Cloud Data
40 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
41 Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted
42 An enhanced system to identify mischievous social malwares on Facebook applications
43 Social Friend Recommendation Based on Multiple Network Correlation
44 Privacy Preserving Location Sharing Services for Social Networks
45 STAMP Enabling Privacy Preserving Location Proofs for Mobile Users
46 Detecting Malicious Facebook Applications
47 Answering Approximate Queries over XML Data
48 EPLQ Efficient Privacy Preserving Location Based Query Over Outsourced Encrypted Data
49 Mapping Bug Reports to Relevant Files A Ranking Model, a Fine Grained Benchmark, and Feature Evaluate
50 Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
51 Trust Agent-Based Behavior Induction in Social Networks
Phone Number
Email ID
College Name

Facebook Reviews

Follow Us On: