Elysium technologies dependable secure computing 2016 17 titles

Page 1



2016-17 IEEE Project Dependable Secure Computing Titles

ID

Titles

ETPL DSC -001

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers

ETPL DSC -002

Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks

ETPL DSC -003

PROVEST: Provenance-based Trust Model for Delay Tolerant Networks

ETPL DSC -004

Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection

ETPL DSC -005

GeTrust: A guarantee-based trust model in Chord-based P2P networks

ETPL DSC -006

Attribute-based Access Control for ICN Naming Scheme

ETPL DSC -007

Risk Assessment in Social Networks based on User Anomalous Behaviour

ETPL DSC -008

ETPL DSC -010

Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs

ETPL DSC -011

Privacy Protection for Wireless Medical Sensor Data

ETPL DSC -012

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments

ETPL DSC -013

Sequence Diagram Aided Privacy Policy Specification

ETPL DSC -014

Historical Spectrum Sensing Data Mining for Cognitive Radio Enabled Vehicular AdHoc Networks PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications

ETPL DSC -009

ETPL DSC -015 ETPL DSC -016 ETPL DSC -017

MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks Trustworthy Parking Communities: Helping Your Neighbor to Find a Space

ETPL DSC -018

GeTrust: A guarantee-based trust model in Chord-based P2P networks

ETPL DSC -019

Malware Detection in Cloud Computing Infrastructures

ETPL DSC -020

Group Key Agreement with Local Connectivity

ETPL DSC -021

Risk Assessment in Social Networks based on User Anomalous Behaviour

ETPL DSC -022

Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks Developing Dependable and Secure Cloud Applications

ETPL DSC -023

Domain Name Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.