PLAGIARISM

HOME / M.TECH / DOT NET/ PROJECTS

M.TECH DOT NET PROJECTS LIST 2018 - 19

S.No Code PROJECT TITLE Download Titles Action
1 CTDT701 CUSTOMER-SATISFACTION-AWARE OPTIMAL MULTISERVER CONFIGURATION FOR PROFIT MAXIMIZATION
IN CLOUD COMPUTING
2 CTDT702 ENABLING SEMANTIC SEARCH BASED ON CONCEPTUAL GRAPHS OVER ENCRYPTED OUTSOURCED DATA
3 CTDT703 GRAPH ENCRYPTION FOR TOP-K NEAREST KEYWORD SEARCH QUERIES ON CLOUD
4 CTDT704 KEYWORD SEARCH WITH ACCESS CONTROL OVER ENCRYPTED CLOUD DATA
5 CTDT705 PRIVACY PROTECTION BASED ACCESS CONTROL SCHEME IN CLOUD-BASED SERVICES
6 CTDT706 PRIVACY-PRESERVING MULTI-KEYWORD TOP-K SIMILARITY SEARCH OVER ENCRYPTED DATA
7 CTDT707 PRIVACY-PRESERVING SMART SEMANTIC SEARCH BASED ON CONCEPTUAL GRAPHS OVER ENCRYPTED
OUTSOURCED DATA
8 CTDT708 SEDASC: SECURE DATA SHARING IN CLOUDS
9 CTDT709 STRONG KEY-EXPOSURE RESILIENT AUDITING FOR SECURE CLOUD STORAGE
10 CTDT710 TAFC: TIME AND ATTRIBUTE FACTORS COMBINED ACCESS CONTROL FOR TIME-SENSITIVE DATA IN PUBLIC
CLOUD
11 CTDT711 USER DIFFERENTIATED VERIFIABLE FILE SEARCH ON THE CLOUD
12 CTDT712 VPSEARCH: ACHIEVING VERIFIABILITY FOR PRIVACY-PRESERVING MULTI-KEYWORD SEARCH OVER ENCRYPTED
CLOUD DATA
13 CTDT713 A MULTI-AGENT ADVANCED TRAVELER INFORMATION SYSTEM FOR OPTIMAL TRIP PLANNING IN A CO-MODAL
FRAMEWORK
14 CTDT714 CONTINUOUS TOP-K MONITORING ON DOCUMENT STREAMS
15 CTDT715 DETECTING STRESS BASED ON SOCIAL INTERACTIONS IN SOCIAL NETWORKS
16 CTDT716 DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
17 CTDT717 EFFICIENT KEYWORD-AWARE REPRESENTATIVE TRAVEL ROUTE RECOMMENDATION
18 CTDT718 FILTERING OUT INFREQUENT BEHAVIOR FROM BUSINESS PROCESS EVENT LOGS
19 CTDT719 GALLOP: GLOBAL FEATURE FUSED LOCATION PREDICTION FOR DIFFERENT CHECK-IN SCENARIOS
20 CTDT720 GENERATING QUERY FACETS USING KNOWLEDGE BASES
21 CTDT721 INFLUENCE MAXIMIZATION IN TRAJECTORY DATABASES
22 CTDT722 QUERY REORGANISATION ALGORITHMS FOR EFFICIENT BOOLEAN INFORMATION FILTERING
23 CTDT723 E2HRC: AN ENERGY-EFFICIENT HETEROGENEOUS RING CLUSTERING ROUTING PROTOCOL FOR WIRELESS
SENSOR NETWORKS
24 CTDT724 ENERGY EFFICIENT CLUSTERING ALGORITHM FOR MULTI-HOP WIRELESS SENSOR NETWORK USING TYPE-2
FUZZY LOGIC
25 CTDT725 ENERGY EFFICIENT MULTIPATH ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORK USING THE FITNESS
FUNCTION
26 CTDT726 LIGHTWEIGHT THREE-FACTOR AUTHENTICATION AND KEY AGREEMENT PROTOCOL FOR INTERNET-
INTEGRATED WIRELESS SENSOR NETWORKS
27 CTDT727 RESEARCH ON TRUST SENSING BASED SECURE ROUTING MECHANISM FOR WIRELESS SENSOR NETWORK
28 CTDT728 TRAFFIC DECORRELATION TECHNIQUES FOR COUNTERING A GLOBAL EAVESDROPPER IN WSNS
29 CTDT729 COOPERATIVE QUERY ANSWER AUTHENTICATION SCHEME OVER ANONYMOUS SENSING DATA
30 CTDT730 FASTGEO: EFFICIENT GEOMETRIC RANGE QUERIES ON ENCRYPTED SPATIAL DATA
31 CTDT731 NETSPAM: A NETWORK-BASED SPAM DETECTION FRAMEWORK FOR REVIEWS IN ONLINE SOCIAL MEDIA
32 CTDT732 PRIVACY-PRESERVING SELECTIVE AGGREGATION OF ONLINE USER BEHAVIOR DATA
33 CTDT733 SEARCH RANK FRAUD AND MALWARE DETECTION IN GOOGLE PLAY
34 CTDT734 LEVERAGING CROWDSOURCING FOR EFFICIENT MALICIOUS USERS DETECTION IN LARGE-SCALE SOCIAL
NETWORKS
35 CTDT735 SPFM: SCALABLE AND PRIVACY-PRESERVING FRIEND MATCHING IN MOBILE CLOUD
36 CTDT736 A NOVEL DATA HIDING ALGORITHM FOR HIGH DYNAMIC RANGE IMAGES
37 CTDT737 IMAGE RE-RANKING BASED ON TOPIC DIVERSITY
38 CTDT738 FLEXIBLE WILDCARD SEARCHABLE ENCRYPTION SYSTEM
39 CTDT739 TRANSACTIONAL BEHAVIOR VERIFICATION IN BUSINESS PROCESS AS A SERVICE CONFIGURATION

M.TECH DOT NET PROJECTS LIST 2016 - 17

S.No Code PROJECT TITLE Download Titles Action
1 CTDT601 CATCH YOU IF YOU MISBEHAVE: RANKED KEYWORD SEARCH RESULTS VERIFICATION IN CLOUD COMPUTING
2 CTDT602 CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION
IN CLOUD COMPUTING
3 CTDT603 CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY
RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS
4 CTDT604 DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
5 CTDT605 DYNAMIC-HASH-TABLE BASED PUBLIC AUDITING FOR SECURE CLOUD STORAGE
6 CTDT606 ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
7 CTDT607 FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES
8 CTDT608 IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN
PUBLIC CLOUD
9 CTDT609 KSF-OABE: OUTSOURCED ATTRIBUTE-BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR
CLOUD STORAGE
10 CTDT610 LEVERAGING DATA DEDUPLICATION TO IMPROVE THE PERFORMANCE OF PRIMARY STORAGE SYSTEMS IN
THE CLOUD
11 CTDT611 MMB CLOUD-TREE: AUTHENTICATED INDEX FOR VERIFIABLE CLOUD SERVICE SELECTION
12 CTDT612 TRUST-BUT-VERIFY: VERIFYING RESULT CORRECTNESS OF OUTSOURCED FREQUENT ITEM SET MINING
IN DATA-MINING-AS-A-SERVICE PARADIGM
13 CTDT613 A MIXED GENERATIVE-DISCRIMINATIVE BASED HASHING METHOD
14 CTDT614 PERSONALIZED TRAVEL SEQUENCE RECOMMENDATION ON MULTI-SOURCE BIG SOCIAL MEDIA
15 CTDT615 PRACTICAL APPROXIMATE K NEAREST NEIGHBOR QUERIES WITH LOCATION AND QUERY PRIVACY
16 CTDT616 TEXT MINING THE CONTRIBUTORS TO RAIL ACCIDENTS
17 CTDT617 USER-SERVICE RATING PREDICTION BY EXPLORING SOCIAL USERS’ RATING BEHAVIORS
18 CTDT618 CONTENT-ADAPTIVE STEGANOGRAPHY BY MINIMIZING STATISTICAL DETECTABILITY
19 CTDT619 SECURE REVERSIBLE IMAGE DATA HIDING OVER ENCRYPTED DOMAIN VIA KEY MODULATION
20 CTDT620 SECURING SIFT: PRIVACY-PRESERVING OUTSOURCING COMPUTATION OF FEATURE EXTRACTIONS OVER
ENCRYPTED IMAGE DATA
21 CTDT621 A JOINT TIME SYNCHRONIZATION AND LOCALIZATION DESIGN FOR MOBILE UNDERWATER SENSOR NETWORKS
22 CTDT622 DAGCM: A CONCURRENT DATA UPLOADING FRAMEWORK FOR MOBILE DATA GATHERING IN WIRELESS
SENSOR NETWORKS
23 CTDT623 SERVICE USAGE CLASSIFICATION WITH ENCRYPTED INTERNET TRAFFIC IN MOBILE MESSAGING APPS
24 CTDT624 TRAFFIC DECORRELATION TECHNIQUES FOR COUNTERING A GLOBAL EAVESDROPPER IN WSNS
25 CTDT625 WORAL: A WITNESS ORIENTED SECURE LOCATION PROVENANCE FRAMEWORK FOR MOBILE DEVICES
26 CTDT626 EFFICIENT CERTIFICATE LESS ACCESS CONTROL FOR WIRELESS BODY AREA NETWORKS
27 CTDT627 FINDING NONEQUIVALENT CLASSIFIERS IN BOOLEAN SPACE TO REDUCE TCAM USAGE
28 CTDT628 GEOGRAPHIC AND OPPORTUNISTIC ROUTING FOR UNDERWATER SENSOR NETWORKS
29 CTDT629 OPTIMIZING COST FOR ONLINE SOCIAL NETWORKS ON GEO-DISTRIBUTED CLOUDS
30 CTDT630 SECURE AND EFFICIENT DATA COMMUNICATION PROTOCOL FOR WIRELESS BODY AREA NETWORKS
31 CTDT631 AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS
32 CTDT632 REAL-TIME SEMANTIC SEARCH USING APPROXIMATE METHODOLOGY FOR LARGE-SCALE STORAGE SYSTEMS
33 CTDT633 DETECTING AND REMOVING WEB APPLICATION VULNERABILITIES WITH STATIC ANALYSIS AND DATA MINING
34 CTDT634 ID2S PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOLS
35 CTDT635 A DISTRIBUTED THREE-HOP ROUTING PROTOCOL TO INCREASE THE CAPACITY OF HYBRID WIRELESS
NETWORKS
36 CTDT636 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA.
37 CTDT637 AN ATTRIBUTE-ASSISTED RERANKING MODEL FOR WEB IMAGE SEARCH
38 CTDT638 AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS
39 CTDT639 AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKLY LABELED IMAGES
40 CTDT640 BEHAVIOR RULE SPECIFICATION-BASED INTRUSION DETECTION FOR SAFETY CRITICAL MEDICAL
CYBER PHYSICAL SYSTEMS
41 CTDT641 CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM
42 CTDT642 COLLISION TOLERANT AND COLLISION FREE PACKET SCHEDULING FOR UNDERWATER ACOUSTIC
LOCALIZATION
43 CTDT643 CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED
ENCRYPTION
44 CTDT644 COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS
45 CTDT645 DEFEATING JAMMING WITH THE POWER OF SILENCE: A GAME-THEORETIC ANALYSIS
46 CTDT646 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
47 CTDT647 DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
48 CTDT648 ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONARIES OVER
ENCRYPTED CLOUD DATA
49 CTDT649 ENERGY-AWARE LOAD BALANCING AND APPLICATION SCALING FOR THE CLOUD ECOSYSTEM
50 CTDT650 EYE GAZE TRACKING WITH A WEB CAMERA IN A DESKTOP ENVIRONMENT
51 CTDT651 GENERATING SEARCHABLE PUBLIC-KEY CIPHERTEXTS WITH HIDDEN STRUCTURES FOR FAST KEYWORD
SEARCH
52 CTDT652 IMPROVED PRIVACY-PRESERVING P2P MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS
53 CTDT653 KEY-RECOVERY ATTACKS ON KIDS, A KEYED ANOMALY DETECTION SYSTEM
54 CTDT654 LEARNING FINGERPRINT RECONSTRUCTION: FROM MINUTIAE TO IMAGE
55 CTDT655 LOCATION-AWARE AND PERSONALIZED COLLABORATIVE FILTERING FOR WEB SERVICE RECOMMENDATION
56 CTDT656 MOBILE DATA GATHERING WITH LOAD BALANCED CLUSTERING AND DUAL DATA UPLOADING IN WIRELESS
SENSOR NETWORKS.
57 CTDT657 MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
58 CTDT658 OPTIMAL CONFIGURATION OF NETWORK CODING IN AD HOC NETWORKS
59 CTDT659 PAGE: A PARTITION AWARE ENGINE FOR PARALLEL GRAPH COMPUTATION.
60 CTDT660 PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
61 CTDT661 PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC
NETWORKS
62 CTDT662 PSMPA: PATIENT SELF-CONTROLLABLE AND MULTI-LEVEL PRIVACY- PRESERVING COOPERATIVE
AUTHENTICATION IN DISTRIBUTED
63 CTDT663 QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
64 CTDT664 SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERS
65 CTDT665 SINGLE IMAGE SUPERRESOLUTION BASED ON GRADIENT PROFILE SHARPNESS
66 CTDT666 STEGANOGRAPHY USING REVERSIBLE TEXTURE SYNTHESIS
67 CTDT667 UNIVERSAL NETWORK CODING-BASED OPPORTUNISTIC ROUTING FOR UNICAST

M.TECH DOT NET PROJECTS LIST 2015 - 16

S.No Code PROJECT TITLE Download Titles Action
1 CTDT501 A DISTRIBUTED THREE-HOP ROUTING PROTOCOL TO INCREASE THE CAPACITY OF HYBRID WIRELESS
NETWORKS
2 CTDT502 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA.
3 CTDT503 AN ATTRIBUTE-ASSISTED RERANKING MODEL FOR WEB IMAGE SEARCH
4 CTDT504 AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS
5 CTDT505 AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKLY LABELED IMAGES
6 CTDT506 BEHAVIOR RULE SPECIFICATION-BASED INTRUSION DETECTION FOR SAFETY CRITICAL MEDICAL CYBER
PHYSICAL SYSTEMS
7 CTDT507 CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM
8 CTDT508 COLLISION TOLERANT AND COLLISION FREE PACKET SCHEDULING FOR UNDERWATER ACOUSTIC
LOCALIZATION
9 CTDT509 CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED
ENCRYPTION
10 CTDT510 COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS
11 CTDT511 DEFEATING JAMMING WITH THE POWER OF SILENCE: A GAME-THEORETIC ANALYSIS
12 CTDT512 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
13 CTDT513 DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
14 CTDT514 ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONARIES OVER
ENCRYPTED CLOUD DATA
15 CTDT515 ENERGY-AWARE LOAD BALANCING AND APPLICATION SCALING FOR THE CLOUD ECOSYSTEM
16 CTDT516 EYE GAZE TRACKING WITH A WEB CAMERA IN A DESKTOP ENVIRONMENT
17 CTDT517 GENERATING SEARCHABLE PUBLIC-KEY CIPHERTEXTS WITH HIDDEN STRUCTURES FOR FAST KEYWORD
SEARCH
18 CTDT518 IMPROVED PRIVACY-PRESERVING P2P MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS
19 CTDT519 KEY-RECOVERY ATTACKS ON KIDS, A KEYED ANOMALY DETECTION SYSTEM
20 CTDT520 LEARNING FINGERPRINT RECONSTRUCTION: FROM MINUTIAE TO IMAGE
21 CTDT521 LOCATION-AWARE AND PERSONALIZED COLLABORATIVE FILTERING FOR WEB SERVICE RECOMMENDATION
22 CTDT522 MOBILE DATA GATHERING WITH LOAD BALANCED CLUSTERING AND DUAL DATA UPLOADING IN WIRELESS
SENSOR NETWORKS.
23 CTDT523 MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
24 CTDT524 OPTIMAL CONFIGURATION OF NETWORK CODING IN AD HOC NETWORKS
25 CTDT525 PAGE: A PARTITION AWARE ENGINE FOR PARALLEL GRAPH COMPUTATION.
26 CTDT526 PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
27 CTDT527 PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC
NETWORKS
28 CTDT528 PSMPA: PATIENT SELF-CONTROLLABLE AND MULTI-LEVEL PRIVACY- PRESERVING COOPERATIVE
AUTHENTICATION IN DISTRIBUTED
29 CTDT529 QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
30 CTDT530 SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERS
31 CTDT531 SINGLE IMAGE SUPERRESOLUTION BASED ON GRADIENT PROFILE SHARPNESS
32 CTDT532 STEGANOGRAPHY USING REVERSIBLE TEXTURE SYNTHESIS
33 CTDT533 UNIVERSAL NETWORK CODING-BASED OPPORTUNISTIC ROUTING FOR UNICAST
34 CTDT534 A COCKTAIL APPROACH FOR TRAVEL PACKAGE RECOMMENDATION
35 CTDT535 A PROBABILISTIC MISBEHAVIOR DETECTION SCHEME TOWARDS EFFICIENT TRUST ESTABLISHMENT IN
DELAY-TOLERANT NETWORKS
36 CTDT536 A QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL FOR HYBRID WIRELESS NETWORKS
37 CTDT537 A SYSTEM FOR DENIAL-OF-SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
38 CTDT538 AN EMPIRICAL PERFORMANCE EVALUATION OF RELATIONAL KEYWORD SEARCH TECHNIQUES
39 CTDT539 AN ERROR-MINIMIZING FRAMEWORK FOR LOCALIZING JAMMERS IN WIRELESS NETWORKS
40 CTDT540 AUTONOMOUS MOBILE MESH NETWORKS
41 CTDT541 BALANCING PERFORMANCE, ACCURACY, AND PRECISION FOR SECURE CLOUD TRANSACTIONS
42 CTDT542 BUILDING CONFIDENTIAL AND EFFICIENT QUERY SERVICES IN THE CLOUD WITH RASP DATA PERTURBATION
43 CTDT543 CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS
44 CTDT544 CERTIFICATE LESS REMOTE ANONYMOUS AUTHENTICATION SCHEMES FOR WIRELESS BODY AREA
NETWORKS
45 CTDT545 CLICK PREDICTION FOR WEB IMAGE RERANKING USING MULTIMODAL SPARSE CODING
46 CTDT546 CONSISTENCY AS A SERVICE: AUDITING CLOUD CONSISTENCY
47 CTDT547 CONTENT CACHING AND SCHEDULING IN WIRELESS NETWORKS WITH ELASTIC AND INELASTIC TRAFFIC
48 CTDT548 DA-SYNC: A DOPPLER-ASSISTED TIME-SYNCHRONIZATION SCHEME FOR MOBILE UNDERWATER SENSOR
NETWORKS
49 CTDT549 DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS
50 CTDT550 DESIGNING AN EFFICIENT IMAGE ENCRYPTION-THEN COMPRESSION SYSTEM VIA PREDICTION ERROR
CLUSTERING AND RANDOM PERMUTATION
51 CTDT551 DISTRIBUTED, CONCURRENT, AND INDEPENDENT ACCESS TO ENCRYPTED CLOUD DATABASES
52 CTDT552 EFFICIENT DATA QUERY IN INTERMITTENTLY-CONNECTED MOBILE AD HOC SOCIAL NETWORKS
53 CTDT553 ENABLING DATA INTEGRITY PROTECTION IN REGENERATING-CODING-BASED CLOUD STORAGE: THEORY
AND IMPLEMENTATION
54 CTDT554 IDENTITY-BASED DISTRIBUTED PROVABLE DATA POSSESSION IN MULTI-CLOUD STORAGE
55 CTDT555 KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE
56 CTDT556 LARS*: AN EFFICIENT AND SCALABLE LOCATION-AWARE RECOMMENDER SYSTEM
57 CTDT557 LEVERAGING SOCIAL NETWORKS FOR P2P CONTENT-BASED FILE SHARING IN DISCONNECTED MANETS
58 CTDT558 MULTICAST CAPACITY IN MANET WITH INFRASTRUCTURE SUPPORT
59 CTDT559 PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE CLOUD
60 CTDT560 PRESERVING LOCATION PRIVACY IN GEO SOCIAL APPLICATIONS
61 CTDT561 PRODUCT ASPECT RANKING AND ITS APPLICATIONS
62 CTDT562 SCALABLE DISTRIBUTED SERVICE INTEGRITY ATTESTATION FOR SOFTWARE-AS-A-SERVICE CLOUDS
63 CTDT563 SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS
64 CTDT564 SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS
65 CTDT565 SECURE MINING OF ASSOCIATION RULES IN HORIZONTALLY DISTRIBUTED DATABASES
66 CTDT566 SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
67 CTDT567 TRANSMISSION-EFFICIENT CLUSTERING METHOD FOR WIRELESS SENSOR NETWORKS USING COMPRESSIVE
SENSING
68 CTDT568 TYPICALITY-BASED COLLABORATIVE FILTERING RECOMMENDATION

M.TECH DOT NET PROJECTS LIST 2014 - 15

S.No Code PROJECT TITLE Download Titles Action
1 CTDT1
2 CTDT502
3 CTDT503
4 CTDT504