2016-17 IEEE Project Dependable Secure Computing Titles
ID
Titles
ETPL DSC -001
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers
ETPL DSC -002
Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks
ETPL DSC -003
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
ETPL DSC -004
Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection
ETPL DSC -005
GeTrust: A guarantee-based trust model in Chord-based P2P networks
ETPL DSC -006
Attribute-based Access Control for ICN Naming Scheme
ETPL DSC -007
Risk Assessment in Social Networks based on User Anomalous Behaviour
ETPL DSC -008
ETPL DSC -010
Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs
ETPL DSC -011
Privacy Protection for Wireless Medical Sensor Data
ETPL DSC -012
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
ETPL DSC -013
Sequence Diagram Aided Privacy Policy Specification
ETPL DSC -014
Historical Spectrum Sensing Data Mining for Cognitive Radio Enabled Vehicular AdHoc Networks PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications
ETPL DSC -009
ETPL DSC -015 ETPL DSC -016 ETPL DSC -017
MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
ETPL DSC -018
GeTrust: A guarantee-based trust model in Chord-based P2P networks
ETPL DSC -019
Malware Detection in Cloud Computing Infrastructures
ETPL DSC -020
Group Key Agreement with Local Connectivity
ETPL DSC -021
Risk Assessment in Social Networks based on User Anomalous Behaviour
ETPL DSC -022
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks Developing Dependable and Secure Cloud Applications
ETPL DSC -023
Domain Name Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing Dependable secure computing