Dot Net project
Branch: Computer Science
Topic: DotNet Project
S NO | TITLE | DOWNLOAD |
DST MSR .NET 01 | Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps | |
DST MSR .NET 02 | Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs | |
DST MSR .NET 03 | WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices | |
DST MSR .NET 04 | DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks | |
DST MSR .NET 05 | EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data | |
DST MSR .NET 06 | A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor | |
DST MSR .NET 07 | Networks Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging | |
DST MSR .NET 08 | Apps ID2S Password-Authenticated Key Exchange Protocols | |
DST MSR .NET 09 | Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining | |
DST MSR .NET 010 | Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases | |
DST MSR .NET 011 | Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data | |
DST MSR .NET 012 | Content-Adaptive Steganography by Minimizing Statistical Detectability | |
DST MSR .NET 013 | Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation | |
DST MSR .NET 014 | Authenticated Key Exchange Protocols for Parallel Network File Systems | |
DST MSR .NET 015 | Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems | |
DST MSR .NET 016 | Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage Optimizing Cost | |
DST MSR .NET 017 | for Online Social Networks on Geo-Distributed Clouds | |
DST MSR .NET 018 | Secure and Efficient data communication protocol for Wireless Body Area Networks | |
DST MSR .NET 019 | Geographic and Opportunistic Routing for Underwater Sensor Networks | |
DST MSR .NET 020 | Efficient Certificate less Access Control for Wireless Body Area Networks | |
DST MSR .NET 021 | Personalized Travel Sequence Recommendation on Multi-Source Big Social Media | |
DST MSR .NET 022 | Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy | |
DST MSR .NET 023 | A Mixed Generative-Discriminative Based Hashing Method Text Mining the | |
DST MSR .NET 024 | Contributors to Rail Accidents | |
DST MSR .NET 025 | User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors | |
DST MSR .NET 026 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications | |
DST MSR .NET 027 | Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud | |
DST MSR .NET 028 | Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage | |
DST MSR .NET 029 | Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds | |
DST MSR .NET 030 | A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud | |
DST MSR .NET 031 | Data MMB cloud-tree: Authenticated Index for Verifiable Cloud Service Selection | |
DST MSR .NET 032 | Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services | |
DST MSR .NET 033 | Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud | |
DST MSR .NET 034 | Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing | |
DST MSR .NET 035 | Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Item set Mining in Data-Mining-As-a-Service Paradigm | |
DST MSR .NET 036 | Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public | |
DST MSR .NET 037 | Cloud Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates | |
DST MSR .NET 038 | Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing | |
DST MSR .NET 039 | KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage | |
DST MSR .NET 040 | Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
S NO | TITLE | DOWNLOAD |
DST MSR .NET 01 | Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps | |
DST MSR .NET 02 | Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs | |
DST MSR .NET 03 | WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices | |
DST MSR .NET 04 | DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks | |
DST MSR .NET 05 | EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data | |
DST MSR .NET 06 | A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor | |
DST MSR .NET 07 | Networks Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging | |
DST MSR .NET 08 | Apps ID2S Password-Authenticated Key Exchange Protocols | |
DST MSR .NET 09 | Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining | |
DST MSR .NET 010 | Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases | |
DST MSR .NET 011 | Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data | |
DST MSR .NET 012 | Content-Adaptive Steganography by Minimizing Statistical Detectability | |
DST MSR .NET 013 | Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation | |
DST MSR .NET 014 | Authenticated Key Exchange Protocols for Parallel Network File Systems | |
DST MSR .NET 015 | Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems | |
DST MSR .NET 016 | Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage Optimizing Cost | |
DST MSR .NET 017 | for Online Social Networks on Geo-Distributed Clouds | |
DST MSR .NET 018 | Secure and Efficient data communication protocol for Wireless Body Area Networks | |
DST MSR .NET 019 | Geographic and Opportunistic Routing for Underwater Sensor Networks | |
DST MSR .NET 020 | Efficient Certificate less Access Control for Wireless Body Area Networks | |
DST MSR .NET 021 | Personalized Travel Sequence Recommendation on Multi-Source Big Social Media | |
DST MSR .NET 022 | Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy | |
DST MSR .NET 023 | A Mixed Generative-Discriminative Based Hashing Method Text Mining the | |
DST MSR .NET 024 | Contributors to Rail Accidents | |
DST MSR .NET 025 | User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors | |
DST MSR .NET 026 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications | |
DST MSR .NET 027 | Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud | |
DST MSR .NET 028 | Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage | |
DST MSR .NET 029 | Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds | |
DST MSR .NET 030 | A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud | |
DST MSR .NET 031 | Data MMB cloud-tree: Authenticated Index for Verifiable Cloud Service Selection | |
DST MSR .NET 032 | Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services | |
DST MSR .NET 033 | Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud | |
DST MSR .NET 034 | Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing | |
DST MSR .NET 035 | Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Item set Mining in Data-Mining-As-a-Service Paradigm | |
DST MSR .NET 036 | Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public | |
DST MSR .NET 037 | Cloud Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates | |
DST MSR .NET 038 | Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing | |
DST MSR .NET 039 | KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage | |
DST MSR .NET 040 | Dynamic and Public Auditing with Fair Arbitration for Cloud Data |