IEEE 2015-2016
JAVA TITLES
BE,B.TECH,ME, M.TECH, MSC,MCAPROJECTS
XT-001
|
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via
Cloud Storage
|
2015
|
CloudComputing
|
XT-002
|
Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable
Delegation in Cloud Computing
|
2015
|
CloudComputing
|
XT-003
|
Panda: Public Auditing for Shared Data with Efficient User Revocation
in the Cloud
|
2015
|
CloudComputing
|
XT-004
|
CloudArmor: Supporting Reputation-based Trust Management for Cloud
Services
|
2015
|
CloudComputing
|
XT-005
|
2015
|
CloudComputing
|
|
XT-006
|
Control Cloud Data Access Privilege and Anonymity With Fully
Anonymous Attribute-Based Encryption
|
2015
|
CloudComputing
|
XT-007
|
Provable multi copy dynamic data possession in cloud computing system
|
2015
|
Cloud Computing
|
XT-008
|
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
|
2015
|
CloudComputing
|
XT-009
|
A Distortion-Resistant Routing Framework for Video Traffic in
Wireless Multihop Networks
|
2015
|
Networking
|
XT-010
|
A Proximity-Aware Interest-Clustered P2P File Sharing System
|
2015
|
Networking
|
XT-011
|
Detecting Malicious Facebook Applications
|
2015
|
Networking
|
XT-012
|
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks
though Replication for Efficient File Sharing
|
2015
|
Networking
|
XT-013
|
A secure anti-collision data sharing scheme for dynamic groups in the
cloud
|
2015
|
Distributed Computing
|
XT-014
|
Cost-Effective Authentic and Anonymous Data Sharing with Forward
Security
|
2015
|
Distributed Computing
|
XT-015
|
Asymmetric Social Proximity Based Private Matching Protocols for
Online Social Networks
|
2015
|
Distributed Computing
|
XT-016
|
A Computational Dynamic Trust Model for User Authorization
|
2015
|
Secure Computing
|
XT-017
|
A Lightweight Secure Scheme for Detecting Provenance Forgery and
Packet Drop Attacks in Wireless Sensor Networks
|
2015
|
Secure Computing
|
XT-018
|
Continuous and Transparent User Identity Verification for Secure
Internet Services
|
2015
|
Secure Computing
|
XT-019
|
Secure Data Aggregation Technique for Wireless Sensor Networks in the
Presence of Collusion Attacks
|
2015
|
Secure Computing
|
XT-020
|
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting
Masquerade Attacks
|
2015
|
Secure Computing
|
XT-021
|
Designing High Performance Web-Based Computing Services to Promote
Telemedicine Database Management System
|
2015
|
Secure Computing
|
XT-022
|
Location-Aware and Personalized Collaborative Filtering for Web
Service Recommendation
|
2015
|
Service Computing
|
XT-023
|
A Feature-Based Framework for Developing and Provisioning
Customizable Web Services
|
2015
|
Service Computing
|
XT-024
|
Automatic Web Service Composition Based on Uncertainty Execution
Effects
|
2015
|
Service Computing
|
XT-025
|
Constructing a Global Social Service Network for Better Quality of
Web Service Discovery
|
2015
|
Service Computing
|
XT-026
|
Unified Collaborative and Content-Based Web Service Recommendation
|
2015
|
Service Computing
|
XT-027
|
A Computational Dynamic Trust Model for User Authorization
|
2015
|
Service Computing
|
XT-028
|
Context-Based Diversification for Keyword Queries over XML Data
|
2015
|
Data Mining
|
XT-029
|
Privacy Policy Inference of User-Uploaded Images on Content Sharing
Sites
|
2015
|
Data Mining
|
XT-030
|
Scalable Constrained Spectral Clustering
|
2015
|
Data Mining
|
XT-031
|
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query
Processing at Location-Based Services
|
2015
|
Data Mining
|
XT-032
|
Tweet Segmentation and Its Application to Named Entity Recognition
|
2015
|
Data Mining
|