Amrita TIFAC-CORE: M.Tech Projects

TIFAC-CORE in Cyber Security - M.Tech Projects

Amrita TIFAC-CYBER

M.Tech 2010 - 2012

S.No Roll No. Name Project Title
1 CB.EN.P2CYS10001 Anashwara G Nambiar Intelligent Authentication
2 CB.EN.P2CYS10002 Arun R Neighbouring Joint Density and Markov Process Based Approach for Jpeg Steganalysis
3 CB.EN.P2CYS10003 Arun kumar v Algebraic Attack On Stream Ciphers
4 CB.EN.P2CYS10004 Darsana Dinesh Private Searching on Encrypted Cloud Storage
5 CB.EN.P2CYS10005 Deepa k Deepsight Datafeeds
6 CB.EN.P2CYS10006 Deepa Raghunath Security Incident Response Service
7 CB.EN.P2CYS10007 Dinesh Chandrahasan R S Threat Alert Services
8 CB.EN.P2CYS10008 Divya Chandra Bose Validation and Id Protection Access for Mobile
9 CB.EN.P2CYS10009 Gourab Tibriwala Cube Attack On Symmetric Key Cryptosystem
10 CB.EN.P2CYS10011 Mithun N K Fast Correlation Attack On Stream Ciphers
11 CB.EN.P2CYS10012 Muralidharan k Conditional Differential Cryptanalysis of Keeloq Cipher
12 CB.EN.P2CYS10013 Namitha Sudhakaran Analysis of Securing Domain Name System
13 CB.EN.P2CYS10014 Nikitha G Secandroid - Securing Privacy in Smartphones
14 CB.EN.P2CYS10015 Nimmi I P Insider Attack Detection in Database Systems
15 CB.EN.P2CYS10016 Nithin Ravi S Audio Steganalysis Using Neighbouring Distribution and Spectrogram Reatures
16 CB.EN.P2CYS10017 Remya Rajan Efficient and Privacy Preserving Multi User Keyword Search for Cloud Storage Services
17 CB.EN.P2CYS10018 Rency T L Secure Internet Interface
18 CB.EN.P2CYS10019 Reshma Roy Internet Profile Service with Hadoop System
19 CB.EN.P2CYS10020 Sivachidhambaram R Mobileview Using Pjscan for Shared pdf File Analysis
20 CB.EN.P2CYS10021 Soorya S Network Anomaly Detection Based on Alpha Stable Modelling
21 CB.EN.P2CYS10022 Sri Kaavyadeepika Logeswari R C A Dynamic Searchable Privacy Preserving Cloud Storage System
22 CB.EN.P2CYS10023 Thiruppathi K High Payload Block Based Reversible Data Hiding Using Multilevel Histogram Modification and Sequential Recovery
23 CB.EN.P2CYS09051 Nimmy K Novel Mutual Authentication Protocol for Cloud Computing Using Secret Sharing and Steganography