Sell Your Projects | My Account | Careers | [email protected] | Call: +91 9573777164

Java Secure Computing Projects

J17SC01A Scalable Approach to Joint Cyber Insurance and Security-asa-Service Provisioning in Cloud Computing2017
J17SC02Cryptographic Solutions for Credibility and Liability Issues of Genomic Data2017
J17SC03Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications2017
J17SC04Fault-Tolerant Adaptive Routing in Dragonfly Networks2017
J17SC05On the Security of a Variant of ElGamal Encryption Scheme2017
J17SC06Optimal Spot-Checking for Collusion Tolerance in Computer Grids2017
J17SC07Privacy Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data2017
J17SC08Privacy-Preserving Aggregate Queries for Optimal Location Selection2017
J17SC09Design and Implementation of the Ascend Secure Processor2017
J17SC10Efficient Delegated Private Set Intersection on Outsourced Private Datasets2017
J17SC11Privacy-Aware Caching in Information-Centric Networking2017
J17SC12FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data2017
J17SC13Cloud Data Auditing Techniques with a Focus on Privacy and Security2017
J17SC14On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification2017
J17SC15SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks2017
J17SC16Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection2017
J17SC17ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions2017
J16SC01MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection 2016
J16SC02Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2016
J16SC03Data Lineage in Malicious Environments 2016
J16SC04Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata 2016
J16SC05Resolving Multi-party Privacy Conflicts in Social Media 2016
J15SC01A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks.2015
J15SC02Time-Delayed Broadcasting for Defeating Inside Jammers2015
J15SC03An OS-level Framework for Anomaly Detection in Complex Software Systems2015
J15SC04Invalidating Idealized BGP Security Proposals and Countermeasures2015
J15SC05A Computational Dynamic Trust Model for User Authorization2015
J15SC06Continuous and Transparent User Identity Verification for Secure Internet Services2015
J15SC07Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts2015
J15SC08DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks2015
J15SC09Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints2015
J15SC10Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks2015
J15SC11Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers2015