Вы находитесь на странице: 1из 2

Sl.

N
o.
1
2
3
4
5
6
7
8
9
10
11
12
13
14

Project
ID
FL16IF00
1
FL16IF00
2
FL16IF00
3
FL16IF00
4
FL16IF00
5
FL16IF00
6
FL16IF00
7
FL16IF00
8
FL16IF00
9
FL16IF01
0
FL16IF01
1
FL16IF01
2
FL16IF01
3
FL16IF01
4

FL16IF01
15 5
FL16IF01
16 6
FL16IF01
17 7
FL16IF01
18 8
FL16IF01
19 9
FL16IF02
20 0
FL16IF02
21 1

Information and
Forensic/Titles (2016-17)
2DCrypt: Image Scaling and Cropping in Encrypted Domains
A high-security EEG-based login system with RSVP stimuli and
dry electrodes
A Reversible Data Hiding Scheme Based on Code Division
Multiplexing
A Unified Resource Allocation Framework for Defending against
Pollution Attacks in Wireless Network Coding Systems
An Exploration of Geographic Authentication Schemes
CDMA System Design and Capacity Analysis under Disguised
Jamming
Cherry-Picking Reliable PUF Bits with Differential Sequence
Coding
Comparative studies of passive imaging in terahertz and midwavelength infrared ranges for object detection
Cryptographic Hierarchical Access Control for Dynamic
Structures
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted
and Unencrypted Computation
DDOA: A Dirichlet-based Detection Scheme for Opportunistic
Attacks in Smart Grid Cyber-Physical System
Delay-Aware Optimization of Physical Layer Security in MultiHop Wireless Body Area Networks
Detecting Facial Retouching Using Supervised Deep Learning
Discriminant Correlation Analysis: Real-Time Feature Level
Fusion for Multimodal Biometric Recognition
DW-AES: A Domain-wall Nanowire Based AES for High
Throughput and Energy-efficient Data Encryption in Nonvolatile Memory
Efficient and Anonymous Mobile User Authentication Protocol
Using Self-certified Public Key Cryptography for Multi-server
Architectures
Efficient Deniably Authenticated Encryption and Its Application
to E-mail
Exploiting Path Diversity for Thwarting Pollution Attacks in
Named Data Networking
ForenVisor: A Tool for Acquiring and Preserving Reliable Data in
Cloud Live Forensics
From Clothing to Identity; Manual and Automatic Soft
Biometrics
Full Frame Encryption and Modulation Obfuscation Using
Channel-independent Preamble Identifier

# 66, VKS COMPLEX, TRUNK ROAD, WALAJAPET, VELLORE-632513


Land Mark (OPP) CHENNAI BUS STAND, PH: 9791516463, 9790809407, 9790647407
www.focusieeeprojects.com Email-focuslogicitacademy@gmail.com

FL16IF02
22 2
FL16IF02
23 3
FL16IF02
24 4
FL16IF02
25 5
FL16IF02
26 6
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44

FL16IF02
7
FL16IF02
8
FL16IF02
9
FL16IF03
0
FL16IF03
1
FL16IF03
2
FL16IF03
3
FL16IF03
4
FL16IF03
5
FL16IF03
6
FL16IF03
7
FL16IF03
8
FL16IF03
9
FL16IF04
0
FL16IF04
1
FL16IF04
2
FL16IF04
3
FL16IF04
4

Hidden Ciphertext Policy Attribute-Based Encryption Under


Standard Assumptions
Iterative Copy-Move Forgery Detection Based on a New Interest
Point Detector
Minutiae Extraction from Level 1 Features of Fingerprint
Neural Markers of Cybersecurity: An fMRI Study of Phishing, and
Malware Warnings
On the Fingerprinting of Software-defined Networks
On the Individual Secrecy Capacity Regions of the General,
Degraded and Gaussian Multi-Receiver Wiretap Broadcast
Channel
Optimized Search-and-Compute Circuits and Their Application
to Query Evaluation on Encrypted Data
Personal Identification using Minor Knuckle Patterns from Palm
Dorsal Surface
PPM-HDA: Privacy-preserving and multifunctional health data
aggregation with fault tolerance
Privacy-Preserving and Regular Language Search over
Encrypted Cloud Data
Privacy-Preserving Utility Verification of the Data Published by
Non-interactive Differentially Private Mechanisms
Profiling Online Social Behaviors for Compromised Account
Detection
Rethinking Permission Enforcement Mechanism on Mobile
Systems
Scaling up Class-Specific Kernel Discriminant Analysis for largescale Face Verification
Secure, Fast, and Energy-Efficient Outsourced Authentication
for Smartphones
Server-Aided Public Key Encryption with keyword search
Steganalysis features for content adaptive JPEG steganography
Temporal and Spatial Locality: an Abstraction for Masquerade
Detection
Towards Building Forensics Enabled Cloud Through Secure
Logging-as-a-Service
Two level QR code for private message sharing and document
authentication
Virus Propagation Modeling and Convergence Analysis in Large
Scale Networks
Where You Are Is Who You Are User Identification by Matching
Statistics
Wireless Physical-Layer Identification: Modeling and Validation

# 66, VKS COMPLEX, TRUNK ROAD, WALAJAPET, VELLORE-632513


Land Mark (OPP) CHENNAI BUS STAND, PH: 9791516463, 9790809407, 9790647407
www.focusieeeprojects.com Email-focuslogicitacademy@gmail.com

Вам также может понравиться