S.No | Roll No. | Name | Project Title |
---|---|---|---|
1 | CB.EN.P2CYS10001 | Anashwara G Nambiar | Intelligent Authentication |
2 | CB.EN.P2CYS10002 | Arun R | Neighbouring Joint Density and Markov Process Based Approach for Jpeg Steganalysis |
3 | CB.EN.P2CYS10003 | Arun kumar v | Algebraic Attack On Stream Ciphers |
4 | CB.EN.P2CYS10004 | Darsana Dinesh | Private Searching on Encrypted Cloud Storage |
5 | CB.EN.P2CYS10005 | Deepa k | Deepsight Datafeeds |
6 | CB.EN.P2CYS10006 | Deepa Raghunath | Security Incident Response Service |
7 | CB.EN.P2CYS10007 | Dinesh Chandrahasan R S | Threat Alert Services |
8 | CB.EN.P2CYS10008 | Divya Chandra Bose | Validation and Id Protection Access for Mobile |
9 | CB.EN.P2CYS10009 | Gourab Tibriwala | Cube Attack On Symmetric Key Cryptosystem |
10 | CB.EN.P2CYS10011 | Mithun N K | Fast Correlation Attack On Stream Ciphers |
11 | CB.EN.P2CYS10012 | Muralidharan k | Conditional Differential Cryptanalysis of Keeloq Cipher |
12 | CB.EN.P2CYS10013 | Namitha Sudhakaran | Analysis of Securing Domain Name System |
13 | CB.EN.P2CYS10014 | Nikitha G | Secandroid - Securing Privacy in Smartphones |
14 | CB.EN.P2CYS10015 | Nimmi I P | Insider Attack Detection in Database Systems |
15 | CB.EN.P2CYS10016 | Nithin Ravi S | Audio Steganalysis Using Neighbouring Distribution and Spectrogram Reatures |
16 | CB.EN.P2CYS10017 | Remya Rajan | Efficient and Privacy Preserving Multi User Keyword Search for Cloud Storage Services |
17 | CB.EN.P2CYS10018 | Rency T L | Secure Internet Interface |
18 | CB.EN.P2CYS10019 | Reshma Roy | Internet Profile Service with Hadoop System |
19 | CB.EN.P2CYS10020 | Sivachidhambaram R | Mobileview Using Pjscan for Shared pdf File Analysis |
20 | CB.EN.P2CYS10021 | Soorya S | Network Anomaly Detection Based on Alpha Stable Modelling |
21 | CB.EN.P2CYS10022 | Sri Kaavyadeepika Logeswari R C | A Dynamic Searchable Privacy Preserving Cloud Storage System |
22 | CB.EN.P2CYS10023 | Thiruppathi K | High Payload Block Based Reversible Data Hiding Using Multilevel Histogram Modification and Sequential Recovery |
23 | CB.EN.P2CYS09051 | Nimmy K | Novel Mutual Authentication Protocol for Cloud Computing Using Secret Sharing and Steganography |