• HOME
  • IEEE Projects
    • IEEE Projects 2017 Dot Net Projects
    • IEEE Projects 2017 Java Projects
    • IEEE Projects 2016 Dot Net Projects
    • IEEE Projects 2016 Java Projects
    • IEEE Projects 2015
    • IEEE Projects 2014
      • IEEE 2014 Java Projects
        • IEEE Projects 2014 For Cse in Data Mining Java
        • IEEE Projects 2014 For Cse in cloud computing Java
        • IEEE Projects 2014 For Cse in Image Processing Java
        • IEEE Projects 2014 For Cse in Mobile Computing Java
        • IEEE Projects 2014 For Cse in Networking Java
        • IEEE Projects 2014 For Cse in Network Security Java
        • IEEE Projects 2014 For Cse in Software Engineering Java
      • IEEE 2014 Dotnet Projects
        • IEEE Projects 2014 For Cse in Data Mining Dotnet
        • IEEE Projects 2014 For Cse in Cloud Computing Dotnet
        • IEEE Projects 2014 For Cse in Netwoking Dotnet
        • IEEE Projects 2014 For Cse in Netwok Security Dotnet
    • IEEE Projects 2013
      • IEEE 2013 JAVA Projects
      • IEEE 2013 Dotnet Projects
    • IEEE Projects 2012
      • IEEE 2012 JAVA Projects
      • IEEE 2012 Dotnet Projects
    • IEEE Projects 2011
      • IEEE 2011 JAVA Projects
      • IEEE 2011 Dotnet Projects
    • IEEE Projects 2010
  • Power Electronics Projects
    • IEEE Projects 2015 For Power Electronics
    • IEEE Projects 2014 For Power Electronics
    • IEEE 2013 Power Electronics Projects
  • EMBEDDED Projects
    • IEEE Projects 2015 For Embedded Systems
    • IEEE 2013 Embedded Projects
  • Matlab Projects
    • IEEE 2013 Image Processing Projects
    • IEEE 2013 Power Electronics Projects
    • IEEE 2013 Communication Projects
  • NS2 Projects

Phd Projects | IEEE Project | IEEE Projects 2020-19 in Trichy & Chennai

IEEE Projects Trichy, Best IEEE Project Centre Chennai, Final Year Projects in Trichy - We Provide IEEE projects 2018 - 2019 , IEEE 2018 Java Projects for M.E/M.Tech, IEEE 2018 Dot net Projects for B.E/B.Tech, IEEE 2018 Power electronics Projects Engineering & Diploma Students, Matlab, Embedded, NS2 Projects
  • HOME
  • IEEE 2017 DOT NET PROJECT TITLES
  • IEEE 2017 JAVA PROJECT TITLES
  • CONTACT US

A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks

August 30, 2011 by IeeeAdmin

Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monitoring system for wireless sensor networks. In our system, we design two in-network location anonymization algorithms, namely, resource and quality-aware algorithms, that aim to enable the system to provide high-quality location monitoring […]

Filed Under: IEEE 2011 PROJECTS Tagged With: bulk ieee projects 2011, IEEE Projects 2011, ieee projects 2011 for be cse, ieee projects 2011 for cse, ieee projects 2011 for it, ieee projects 2011 for mca, ieee projects 2011 for me cse, ieee projects 2011 in Mobile computing, java ieee projects 2011

Vulnerability Analysis in SOA-Based Business Processes

August 25, 2011 by IeeeAdmin

Business processes and services can more flexibly be combined when based upon standards. However, such flexible compositions practically always contain vulnerabilities, which imperil the security and dependability of processes. Vulnerability management tools require patterns to find or monitor vulnerabilities. Such patterns have to be derived from vulnerability types. Existing analysis methods such as attack trees […]

Filed Under: IEEE 2011 PROJECTS Tagged With: bulk ieee projects 2011, IEEE Projects 2011, ieee projects 2011 for be cse, ieee projects 2011 for cse, ieee projects 2011 for it, ieee projects 2011 for mca, ieee projects 2011 for me cse, ieee projects 2011 in Software Engineering, java ieee projects 2011

Improved Division by Invariant Integers

August 25, 2011 by IeeeAdmin

This paper considers the problem of dividing a two-word integer by a single-word integer, together with a few extensions and applications. Due to lack of efficient division instructions in current processors, the division is performed as a multiplication using a precomputed single-word approximation of the reciprocal of the divisor, followed by a couple of adjustment […]

Filed Under: IEEE 2011 PROJECTS Tagged With: bulk ieee projects 2011, IEEE Projects 2011, ieee projects 2011 for be cse, ieee projects 2011 for cse, ieee projects 2011 for it, ieee projects 2011 for mca, ieee projects 2011 for me cse, ieee projects 2011 in Network Security, java ieee projects 2011

Privacy-Preserving Updates to Anonymous and Confidential Databases

August 22, 2011 by IeeeAdmin

Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also,suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly,allowing Alice to directly read the contents […]

Filed Under: IEEE 2011 PROJECTS Tagged With: bulk ieee projects 2011, IEEE Projects 2011, ieee projects 2011 for be cse, ieee projects 2011 for cse, ieee projects 2011 for it, ieee projects 2011 for mca, ieee projects 2011 for me cse, ieee projects 2011 in Network Security, java ieee projects 2011

Nymble: Blocking Misbehaving Users in Anonymizing Networks

August 20, 2011 by IeeeAdmin

Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites. Web site administrators routinely rely […]

Filed Under: IEEE 2011 PROJECTS Tagged With: bulk ieee projects 2011, IEEE Projects 2011, ieee projects 2011 for be cse, ieee projects 2011 for cse, ieee projects 2011 for it, ieee projects 2011 for mca, ieee projects 2011 for me cse, ieee projects 2011 in Network Security, java ieee projects 2011

Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking

August 16, 2011 by IeeeAdmin

Network-based intruders seldom attack their victims directly from their own computer. Often, they stage their attacks through intermediate “stepping stones” in order to conceal their identity and origin. To identify the source of the attack behind the stepping stone(s), it is necessary to correlate the incoming and outgoing flows or connections of a stepping stone. […]

Filed Under: IEEE 2011 PROJECTS Tagged With: bulk ieee projects 2011, IEEE Projects 2011, ieee projects 2011 for be cse, ieee projects 2011 for cse, ieee projects 2011 for it, ieee projects 2011 for mca, ieee projects 2011 for me cse, ieee projects 2011 in Network Security, java ieee projects 2011

Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks

August 13, 2011 by IeeeAdmin

Data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the use of fault tolerance mechanisms through […]

Filed Under: IEEE 2011 PROJECTS Tagged With: IEEE Projects in Trichy

A Tamper-Resistant Programming Language System

August 11, 2011 by IeeeAdmin

An important and recurring security scenario involves the need to carry out trusted computations in the context of untrusted environments. It is shown how a tamper-resistant interpreter for a programming language-currently Lisp 1.5-combined with the use of a secure coprocessor can address this problem. This solution executes the interpreter on the secure coprocessor while the […]

Filed Under: IEEE 2011 PROJECTS Tagged With: .net ieee projects 2011, bulk ieee projects 2011, IEEE Projects 2011, ieee projects 2011 for be cse, ieee projects 2011 for cse, ieee projects 2011 for it, ieee projects 2011 for mca, ieee projects 2011 for me cse, ieee projects 2011 in Network Security

A Policy Enforcing Mechanism for Trusted Ad Hoc Networks

August 6, 2011 by IeeeAdmin

To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However, enforcing policies in MANETs is challenging because they lack the infrastructure and trusted entities encountered in traditional distributed systems. This paper presents the design and implementation of a policy […]

Filed Under: IEEE 2011 PROJECTS Tagged With: bulk ieee projects 2011, IEEE Projects 2011, ieee projects 2011 for be cse, ieee projects 2011 for cse, ieee projects 2011 for it, ieee projects 2011 for mca, ieee projects 2011 for me cse, ieee projects 2011 in Network Security, java ieee projects 2011

A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks

August 3, 2011 by IeeeAdmin

We target a two-tier sensor network with resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sensor nodes and answer the queries from the network owner. The reliance on master nodes for data storage and query processing raises serious concerns about both data confidentiality […]

Filed Under: IEEE 2011 PROJECTS Tagged With: bulk ieee projects 2011, IEEE Projects 2011, ieee projects 2011 for be cse, ieee projects 2011 for cse, ieee projects 2011 for it, ieee projects 2011 for mca, ieee projects 2011 for me cse, ieee projects 2011 in networking, java ieee projects 2011

  • « Previous Page
  • 1
  • …
  • 94
  • 95
  • 96
  • 97
  • 98
  • …
  • 108
  • Next Page »

Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in