2017 – 2018 Final Year Projects :: Dependable Secure Computing – Titles & Abstracts

Titles 2017 – 2018 :: Dependable Secure Computing Projects
ETPL DSC – 001 |
A Novel Class of Robust Covert Channels Using Out-of-Order Packets |
ETPL DSC – 002 |
An Efficient Lattice Based Multi-Stage Secret Sharing Scheme |
ETPL DSC – 003 |
Defending Against Web Application Attacks: Approaches, Challenges and Implications |
ETPL DSC – 004 |
Design and Implementation of the Ascend Secure Processor |
ETPL DSC – 005 |
Efficient and Privacy-Preserving Min and k th Min Computations in Mobile Sensing Systems |
ETPL DSC – 006 |
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping |
ETPL DSC – 007 |
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs |
ETPL DSC – 008 |
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
ETPL DSC – 009 |
High Performance and High Scalable Packet Classification Algorithm for Network Security Systems |
ETPL DSC – 010 |
Leveraging Compression-based Graph Mining for Behavior-based Malware Detection |
ETPL DSC – 011 |
My Privacy My Decision: Control of Photo Sharing on Online Social Networks |
ETPL DSC – 012 |
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices |
ETPL DSC – 013 |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
ETPL DSC – 014 |
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids |
ETPL DSC – 015 |
Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing |
ETPL DSC – 016 |
Efficient Delegated Private Set Intersection on Outsourced Private Datasets |
ETPL DSC – 017 |
Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks |
ETPL DSC – 018 |
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing |
ETPL DSC – 019 |
Privacy-Preserving Aggregate Queries for Optimal Location Selection |
ETPL DSC – 020 |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
ETPL DSC – 021 |
Fault-Tolerant Adaptive Routing in Dragonfly Networks |
ETPL DSC – 022 |
On the Security of a Variant of ElGamal Encryption Scheme |
ETPL DSC – 023 |
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing |
ETPL DSC – 024 |
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications |
ETPL DSC – 025 |
Privacy-Preserving Aggregate Queries for Optimal Location Selection |
ETPL DSC – 026 |
Fault-Tolerant Adaptive Routing in Dragonfly Networks |
ETPL DSC – 027 |
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data |
ETPL DSC – 028 |
Design and Implementation of the Ascend Secure Processor |
ETPL DSC – 029 |
Privacy-Aware Caching in Information-Centric Networking |
ETPL DSC – 030 |
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation |
ETPL DSC – 031 |
Design and Implementation of SecPod, A Framework for Virtualization-based Security Systems |
ETPL DSC – 032 |
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
ETPL DSC – 033 |
Secure and Efficient Initialization and Authentication Protocols for SHIELD |