ENGINEERING PROJECT
TOPICS LIST :
Location Based Application :
A Location-
and Diversity-aware News Feed System for Mobile Users.
ALTERDROID:
Differential Fault Analysis of Obfuscated Smartphone Malware
Context-Based
Access Control Systems for Mobile Devices.
Cooperative
Positioning and Tracking in Disruption Tolerant Networks.
CWC: A
Distributed Computing Infrastructure Using Smartphones.
Energy-Efficient
Fault-Tolerant Data Storage and Processing in Mobile Cloud.
Extend Your Journey: Considering Signal Strength and Fluctuation in
Location-Based Applications.
Privacy-Preserving
Relative Location Based Services for Mobile Users.
Smartphone-Based
Wound Assessment System for Patients with Diabetes.
The Impact
of API Change- and Fault-Proneness on the User Ratings of Android Apps.
Time-and-Energy-Aware Computation Offloading in Handheld Devices to
Coprocessors and Clouds.
User
Privacy and Data Trustworthiness in Mobile Crowd Sensing.
User-Defined
Privacy Grid System for Continuous Location-Based Services.
VULHUNTER:
Toward Discovering Vulnerabilities in Android Applications.
Cloud Computing :
A Hybrid
Cloud Approach for Secure Authorized Deduplication
A Profit
Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
A Scalable
and Reliable Matching Service for Content-Based Publish/Subscribe Systems
A Secure
and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
A Secure
Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
An
Authenticated Trust and Reputation Calculation and Management System for Cloud
and Sensor Networks Integration
Audit-Free
Cloud Storage via Deniable Attribute-based Encryption
Circuit
Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation
in Cloud Computing
CloudArmor:
Supporting Reputation-based Trust Management for Cloud Services
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous
Attribute-Based Encryption
Enabling
Cloud Storage Auditing With Key-Exposure Resistance
Enabling Fine-grained Multi-keyword Search Supporting Classified
Sub-dictionaries over Encrypted Cloud Data
Identity-Based
Encryption with Outsourced Revocation in Cloud Computing
Key-Aggregate
Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
Privacy
Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud
Computing
Privacy-Preserving
Public Auditing for Regenerating-Code-Based Cloud Storage
Provable
Multicopy Dynamic Data Possession in Cloud Computing Systems
Public
Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
Secure
Auditing and Deduplicating Data in Cloud
Stealthy
Denial of Service Strategy in Cloud Computing
No comments:
Post a Comment