1. www.projectsatbangalore.com
Mob: 9591912372
projectsatbangalore@gmail.com
IEEE 2013 - 2014 TITLES – .NET
1. A New Cell-Counting-Based Attack Against To
2. A Novel Anti Phishing Framework Based On Visual Cryptography
3. AMPLE An Adaptive Traffic Engineering System Based on Virtual
Routing Topologies
4. Automatic Image Equalization and Contrast Enhancement Using
Gaussian Mixture Modeling
5. Automatic Reconfiguration for Large-Scale Reliable Storage
Systems
6. BECAN A Bandwidth-Efficient Cooperative Authentication Scheme
for Filtering Injected False Data in Wireless Sensor Networks
7. Cashing in on the Cache in the Cloud
8. Compressed-Sensing-Enabled Video Streaming for Wireless
Multimedia Sensor Networks
9. Data Hiding in Audio Signal A Review
10. Data mining for XML query-answering support
11. Defenses Against Large Scale Online Password Guessing Attacks
By Using Persuasive Click Points
12. Design and Implementation of TARF A Trust-Aware Routing
Framework for WSNs
13. Efficient audit service outsourcing for data integrity in clouds
14. Efficient Computation of Range Aggregates against Uncertain
Location Based Queries
15. Enabling Secure and Efficient Ranked Keyword Search over
Outsourced Cloud Data
16. Expert Discovery and Interactions in Mixed Service-Oriented
Systems
2. www.projectsatbangalore.com
Mob: 9591912372
projectsatbangalore@gmail.com
17. FairTorrent A Deficit-based Distributed Algorithm to Ensure
Fairness in Peer-to-Peer Systems
18. Grouping-Enhanced Resilient Probabilistic En-Route Filtering of
Injected False Data in WSNs
19. Horizontal Aggregations in SQL to Prepare Data Sets for Data
Mining Analysis
20. Joint Relay and Jammer Selection for Secure Two-Way Relay
Networks
21. Latency Equalization as a New Network Service Primitive
22. Multibiometric Cryptosystems Based on Feature-Level Fusion
23. Network Assisted Mobile Computing with Optimal Uplink Query
Processing
24. One Size Does Not Fit All Towards User- and Query-Dependent
Ranking For Web Databases
25. Optimal Source-Based Filtering of Malicious Traffic
26. Publishing Search Logs – A Comparative Study of Privacy
Guarantees
27. Query Planning for Continuous Aggregation Queries over a
Network of Data Aggregator
28. Revisiting Defenses against Large-Scale Online Password
Guessing Attacks
29. Robust Face-Name Graph Matching for Movie Character
Identification
30. Robustness of Offline Signature Verification Based on Gray Level
Features
31. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption
32. Scalable Learning of Collective Behavior
3. www.projectsatbangalore.com
Mob: 9591912372
projectsatbangalore@gmail.com
33. Secure and Efficient Handover Authentication Based on Bilinear
Pairing Functions
34. Securing Node Capture Attacks for Hierarchical Data Aggregation
in Wireless Sensor Networks
35. Semi supervised Biased Maximum Margin Analysis for Interactive
Image Retrieval
36. Sleep Scheduling for Critical Event Monitoring in Wireless Sensor
Networks
37. SPOC:A Secure and Privacy-preserving Opportunistic Computing
Framework for Mobile-Healthcare Emergency
38. Topology Control In Mobile Ad Hoc Networks With Cooperative
Communications
39. Towards Secure and Dependable Storage Services in Cloud
Computing
40. Tree-Based Mining for Discovering Patterns of Human Interaction
in Meetings
41. View-invariant action recognition based on Artificial Neural
Networks