Contact Us:09993897203
Email: dstarenainfo@gmail.com
1st Branch: 121,Malviya Nagar,
New Market,Bhopal-462003
2nd Branch:146/7/2 Premium Center
Zone-1,MP Nagar
Bhopal-462011
Arrow Registration
MATLAB,PHP,VHDL(VLSI),EMBEDDED SYSTEM,ANDROID WEBSITE DESIGN Industrial Training will be start Soon

Secure computing

CSE PROJECTS (2019-20)

Secure computing

S.NO TITLES Download
DST TO SC 01 A highly efficient side channel attack with profiling through relevance-learning on physical leakage information
DST TO SC 02 Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification
DST TO SC 03 Dynamic group-oriented provable data possession in the cloud
DST TO SC 04 Privacy-preserving attribute-based keyword search in shared multi-owner setting
DST TO SC 05 Crypt-dac: cryptographically enforced dynamic access control in the cloud
DST TO SC 06 Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
DST TO SC 07 Collusion defender: preserving subscribers’ privacy in publish and subscribe systems
DST TO SC 08 Searchable symmetric encryption with forward search privacy
DST TO SC 09 Towards thwarting template side-channel attacks in secure cloud deduplications
DST TO SC 010 Design of secure authenticated key management protocol for cloud computing environments
DST TO SC 011 Shakein: secure user authentication of smartphones with habitual single-handed shakes
DST TO SC 012 Madam: effective and efficient behavior-based android malware detection and prevention
DST TO SC 013 Energy-efficient query processing in web search engines
DST TO SC 014 Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification
DST TO SC 015 Privacy-preserving attribute-based keyword search in shared multi-owner setting
DST TO SC 016 Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
DST TO SC 017 Collusion defender: preserving subscribers’ privacy in publish and subscribe systems
DST TO SC 018 Searchable symmetric encryption with forward search privacy
DST TO SC 019 Design of secure authenticated key management protocol for cloud computing environments
DST TO SC 020 A highly efficient side channel attack with profiling through relevance-learning on physical leakage information

 




    Login Page

    Inquiry Form