Secure computing
CSE PROJECTS (2019-20)
Secure computing
S.NO | TITLES | Download |
DST TO SC 01 | A highly efficient side channel attack with profiling through relevance-learning on physical leakage information | |
DST TO SC 02 | Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification | |
DST TO SC 03 | Dynamic group-oriented provable data possession in the cloud | |
DST TO SC 04 | Privacy-preserving attribute-based keyword search in shared multi-owner setting | |
DST TO SC 05 | Crypt-dac: cryptographically enforced dynamic access control in the cloud | |
DST TO SC 06 | Revocable identity-based broadcast proxy re-encryption for data sharing in clouds | |
DST TO SC 07 | Collusion defender: preserving subscribers’ privacy in publish and subscribe systems | |
DST TO SC 08 | Searchable symmetric encryption with forward search privacy | |
DST TO SC 09 | Towards thwarting template side-channel attacks in secure cloud deduplications | |
DST TO SC 010 | Design of secure authenticated key management protocol for cloud computing environments | |
DST TO SC 011 | Shakein: secure user authentication of smartphones with habitual single-handed shakes | |
DST TO SC 012 | Madam: effective and efficient behavior-based android malware detection and prevention | |
DST TO SC 013 | Energy-efficient query processing in web search engines | |
DST TO SC 014 | Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification | |
DST TO SC 015 | Privacy-preserving attribute-based keyword search in shared multi-owner setting | |
DST TO SC 016 | Revocable identity-based broadcast proxy re-encryption for data sharing in clouds | |
DST TO SC 017 | Collusion defender: preserving subscribers’ privacy in publish and subscribe systems | |
DST TO SC 018 | Searchable symmetric encryption with forward search privacy | |
DST TO SC 019 | Design of secure authenticated key management protocol for cloud computing environments | |
DST TO SC 020 | A highly efficient side channel attack with profiling through relevance-learning on physical leakage information |