Vous êtes sur la page 1sur 6

<table width="100%" border="1" cellpadding="0" cellspacing="0" style="border:so

lid 1px #616161;">


<tr height="35">
<td colspan="7" width="85%" align="center" valign="middle" style=" fontweight: bold;color:blue; font-family: Verdana; font-size: 28px; ">
National Institute Live Projects
</td>
</tr>
<tr height="35">
<td colspan="6" width="85%" align="left" style="color:#003399;">
<strong> Phone Number : 040 - 42224125 / 9966884929 / 7386823813</s
trong>
</td>
<td width="15%" align="middle" style="color:#003399;">
<strong>E-Mail : nationalinstitutenip@gmail.com</strong>
</td>
</tr>
<tr height="35">
<td colspan="6" width="85%" align="left" style="color:#2b66c9;">
Downloaded List :<strong> Projects / M.Tech
/ CSE / DSP/DIP</strong>
</td>
<td width="15%" align="middle" style="color:#2b66c9;">
<strong>20-06-2016</strong>
</td>
</tr>
</table>
<table width="100%" border="1" cellpadding="0" cellspacing="0" style="border:sol
id 1px #616161;">
<tr height="35">
<th align="center" width="4%">S.No </th>
<th colspan="6" align="center" class="tdl5">Name</th>
</tr>
<tr height="35">
<td align="center">1</td>
<td colspan="6" align="left" class="tdl5">CLOUD COMPUTING
</td>
</tr>
<tr height="35">
<td align="center">2</td>
<td colspan="6" align="left" class="tdl5">Identity-based Encrypt
ion with Outsourced Revocation in Cloud Computing
</td>
</tr>
<tr height="35">
<td align="center">3</td>
<td colspan="6" align="left" class="tdl5">Public Integrity Audit
ing for Shared Dynamic Cloud Data with Group User Revocation
</td>
</tr>
<tr height="35">
<td align="center">4</td>
<td colspan="6" align="left" class="tdl5">Key-Aggregate Searchab
le Encryption (KASE) for Group Data Sharing via Cloud Storage
</td>
</tr>
<tr height="35">
<td align="center">5</td>
<td colspan="6" align="left" class="tdl5">A Secure and Dynamic M
ulti-keyword Ranked Search Scheme over Encrypted Cloud Data

</td>
</tr>
<tr height="35">
<td align="center">6</td>
<td colspan="6" align="left" class="tdl5">Secure Auditing and De
duplicating Data in Cloud
</td>
</tr>
<tr height="35">
<td align="center">7</td>
<td colspan="6" align="left" class="tdl5">A Secure Anti-Collusio
n Data Sharing Scheme for Dynamic Groups in the Cloud
</td>
</tr>
<tr height="35">
<td align="center">8</td>
<td colspan="6" align="left" class="tdl5">Audit-Free Cloud Stora
ge via Deniable Attribute-based Encryption
</td>
</tr>
<tr height="35">
<td align="center">9</td>
<td colspan="6" align="left" class="tdl5">Provable Multi copy Dy
namic Data Possession in Cloud Computing Systems
</td>
</tr>
<tr height="35">
<td align="center">10</td>
<td colspan="6" align="left" class="tdl5">Circuit Cipher text-po
licy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Compu
tin</td>
</tr>
<tr height="35">
<td align="center">11</td>
<td colspan="6" align="left" class="tdl5">Control Cloud Data Acc
ess Privilege and Anonymity With Fully Anonymous
</td>
</tr>
<tr height="35">
<td align="center">12</td>
<td colspan="6" align="left" class="tdl5">Attribute-Based Encryp
tion
</td>
</tr>
<tr height="35">
<td align="center">13</td>
<td colspan="6" align="left" class="tdl5">Enabling Cloud Storage
Auditing with Key-Exposure Resistance
</td>
</tr>
<tr height="35">
<td align="center">14</td>
<td colspan="6" align="left" class="tdl5">Enabling Fine-grained
Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud
Da</td>
</tr>
<tr height="35">
<td align="center">15</td>
<td colspan="6" align="left" class="tdl5">Privacy-Preserving Pub
lic Auditing for Regenerating-Code-Based Cloud Storage

</td>
</tr>
<tr height="35">
<td align="center">16</td>
<td colspan="6" align="left" class="tdl5">Panda: Public Auditing
for Shared Data with Efficient User Revocation in the Cloud
</td>
</tr>
<tr height="35">
<td align="center">17</td>
<td colspan="6" align="left" class="tdl5">SelCSP: A Framework to
Facilitate Selection of Cloud Service Providers
</td>
</tr>
<tr height="35">
<td align="center">18</td>
<td colspan="6" align="left" class="tdl5">T-Broker: A Trust-Awar
e Service Brokering Scheme for Multiple Cloud Collaborative Services
</td>
</tr>
<tr height="35">
<td align="center">19</td>
<td colspan="6" align="left" class="tdl5">EnDAS: Efficient Encry
pted Data Search as a Mobile Cloud Service
</td>
</tr>
<tr height="35">
<td align="center">20</td>
<td colspan="6" align="left" class="tdl5">On the Security ofData
Access Control for Multiauthority CloudStorageSystems
</td>
</tr>
<tr height="35">
<td align="center">21</td>
<td colspan="6" align="left" class="tdl5">Security Analysis on O
ne-to-Many OrderPreserving Encryption Based Cloud data Search
</td>
</tr>
<tr height="35">
<td align="center">22</td>
<td colspan="6" align="left" class="tdl5">A Profit Maximization
Scheme with GuaranteedQuality of Service in Cloud Computing
</td>
</tr>
<tr height="35">
<td align="center">23</td>
<td colspan="6" align="left" class="tdl5">OPoR Enabling Proof of
Retrievability in Cloud Computing with Resource Constrained Devices
</td>
</tr>
<tr height="35">
<td align="center">24</td>
<td colspan="6" align="left" class="tdl5">DATA MINING
</td>
</tr>
<tr height="35">
<td align="center">25</td>
<td colspan="6" align="left" class="tdl5">Entity Linking with a
Knowledge Base Issues Techniques and Solutions
</td>

</tr>
<tr height="35">
<td align="center">26</td>
<td colspan="6" align="left" class="tdl5">Smart Crawler A Two-st
age Crawler for Efficiently Harvesting Deep-Web Interfaces
</td>
</tr>
<tr height="35">
<td align="center">27</td>
<td colspan="6" align="left" class="tdl5">Making Digital Artifac
ts on the Web Verifiable and Reliable
</td>
</tr>
<tr height="35">
<td align="center">28</td>
<td colspan="6" align="left" class="tdl5">Best Keyword Cover Sea
rch
</td>
</tr>
<tr height="35">
<td align="center">29</td>
<td colspan="6" align="left" class="tdl5">MOBILE COMPUTING
</td>
</tr>
<tr height="35">
<td align="center">30</td>
<td colspan="6" align="left" class="tdl5">Friendbook: A Semantic
-Based Friend Recommendation System for Social Networks
</td>
</tr>
<tr height="35">
<td align="center">31</td>
<td colspan="6" align="left" class="tdl5">SECURE COMPUTING
</td>
</tr>
<tr height="35">
<td align="center">32</td>
<td colspan="6" align="left" class="tdl5">Trust-based Service Ma
nagement for Social Internet of Things Systems
</td>
</tr>
<tr height="35">
<td align="center">33</td>
<td colspan="6" align="left" class="tdl5">NETWORKING
</td>
</tr>
<tr height="35">
<td align="center">34</td>
<td colspan="6" align="left" class="tdl5">Authenticated Key Exch
ange Protocols for Parallel Network File Systems
</td>
</tr>
<tr height="35">
<td align="center">35</td>
<td colspan="6" align="left" class="tdl5">A Proximity-Aware Inte
rest-Clustered P2P File Sharing System
</td>
</tr>
<tr height="35">
<td align="center">36</td>

<td colspan="6" align="left" class="tdl5">FRAppE: Detecting Mali


cious Facebook Applications
</td>
</tr>
<tr height="35">
<td align="center">37</td>
<td colspan="6" align="left" class="tdl5">Privacy-Preserving and
Truthful Detection of Packet Dropping Attacks in Wireless
</td>
</tr>
<tr height="35">
<td align="center">38</td>
<td colspan="6" align="left" class="tdl5">Ad Hoc Networks
</td>
</tr>
<tr height="35">
<td align="center">39</td>
<td colspan="6" align="left" class="tdl5">MobiContext: A Context
-aware Cloud-Based Venue Recommendation Framework
</td>
</tr>
<tr height="35">
<td align="center">40</td>
<td colspan="6" align="left" class="tdl5">CLOUD COMPUTING
</td>
</tr>
<tr height="35">
<td align="center">41</td>
<td colspan="6" align="left" class="tdl5">Identity-based Encrypt
ion with Outsourced Revocation in Cloud Computing
</td>
</tr>
<tr height="35">
<td align="center">42</td>
<td colspan="6" align="left" class="tdl5">Public Integrity Audit
ing for Shared Dynamic Cloud Data with Group User Revocation
</td>
</tr>
<tr height="35">
<td align="center">43</td>
<td colspan="6" align="left" class="tdl5">Key-Aggregate Searchab
le Encryption (KASE) for Group Data Sharing via Cloud Storage
</td>
</tr>
<tr height="35">
<td align="center">44</td>
<td colspan="6" align="left" class="tdl5">A Secure and Dynamic M
ulti-keyword Ranked Search Scheme over Encrypted Cloud Data
</td>
</tr>
<tr height="35">
<td align="center">45</td>
<td colspan="6" align="left" class="tdl5">DATA MINING
</td>
</tr>
<tr height="35">
<td align="center">46</td>
<td colspan="6" align="left" class="tdl5">Entity Linking with a
Knowledge Base Issues Techniques and Solutions
</td>

</tr>
<tr height="35">
<td align="center">47</td>
<td colspan="6" align="left" class="tdl5">Smart Crawler A Two-st
age Crawler for Efficiently Harvesting Deep-Web Interfaces
</td>
</tr>
<tr height="35">
<td align="center">48</td>
<td colspan="6" align="left" class="tdl5">Making Digital Artifac
ts on the Web Verifiable and Reliable
</td>
</tr>
<tr height="35">
<td align="center">49</td>
<td colspan="6" align="left" class="tdl5">NETWORKING
</td>
</tr>
<tr height="35">
<td align="center">50</td>
<td colspan="6" align="left" class="tdl5">Authenticated Key Exch
ange Protocols for Parallel Network File Systems
</td>
</tr>
<tr height="35">
<td align="center">51</td>
<td colspan="6" align="left" class="tdl5">
</td>
</tr>
</table>
<script>
jQuery(document).ready(function () {
jQuery("#test").click(function () {
alert("one");
})
});
</script>
<script>
function downloadfile(file_download, id, type, msg) {
alert("Please login to download the file");
}
</script>

Vous aimerez peut-être aussi