| S.No | Roll No. | Name | Project Title |
|---|---|---|---|
| 1 | CB.EN.P2CYS10001 | Anashwara G Nambiar | Intelligent Authentication |
| 2 | CB.EN.P2CYS10002 | Arun R | Neighbouring Joint Density and Markov Process Based Approach for Jpeg Steganalysis |
| 3 | CB.EN.P2CYS10003 | Arun kumar v | Algebraic Attack On Stream Ciphers |
| 4 | CB.EN.P2CYS10004 | Darsana Dinesh | Private Searching on Encrypted Cloud Storage |
| 5 | CB.EN.P2CYS10005 | Deepa k | Deepsight Datafeeds |
| 6 | CB.EN.P2CYS10006 | Deepa Raghunath | Security Incident Response Service |
| 7 | CB.EN.P2CYS10007 | Dinesh Chandrahasan R S | Threat Alert Services |
| 8 | CB.EN.P2CYS10008 | Divya Chandra Bose | Validation and Id Protection Access for Mobile |
| 9 | CB.EN.P2CYS10009 | Gourab Tibriwala | Cube Attack On Symmetric Key Cryptosystem |
| 10 | CB.EN.P2CYS10011 | Mithun N K | Fast Correlation Attack On Stream Ciphers |
| 11 | CB.EN.P2CYS10012 | Muralidharan k | Conditional Differential Cryptanalysis of Keeloq Cipher |
| 12 | CB.EN.P2CYS10013 | Namitha Sudhakaran | Analysis of Securing Domain Name System |
| 13 | CB.EN.P2CYS10014 | Nikitha G | Secandroid - Securing Privacy in Smartphones |
| 14 | CB.EN.P2CYS10015 | Nimmi I P | Insider Attack Detection in Database Systems |
| 15 | CB.EN.P2CYS10016 | Nithin Ravi S | Audio Steganalysis Using Neighbouring Distribution and Spectrogram Reatures |
| 16 | CB.EN.P2CYS10017 | Remya Rajan | Efficient and Privacy Preserving Multi User Keyword Search for Cloud Storage Services |
| 17 | CB.EN.P2CYS10018 | Rency T L | Secure Internet Interface |
| 18 | CB.EN.P2CYS10019 | Reshma Roy | Internet Profile Service with Hadoop System |
| 19 | CB.EN.P2CYS10020 | Sivachidhambaram R | Mobileview Using Pjscan for Shared pdf File Analysis |
| 20 | CB.EN.P2CYS10021 | Soorya S | Network Anomaly Detection Based on Alpha Stable Modelling |
| 21 | CB.EN.P2CYS10022 | Sri Kaavyadeepika Logeswari R C | A Dynamic Searchable Privacy Preserving Cloud Storage System |
| 22 | CB.EN.P2CYS10023 | Thiruppathi K | High Payload Block Based Reversible Data Hiding Using Multilevel Histogram Modification and Sequential Recovery |
| 23 | CB.EN.P2CYS09051 | Nimmy K | Novel Mutual Authentication Protocol for Cloud Computing Using Secret Sharing and Steganography |