| S.No | Roll No. | Name | Project Title |
|---|---|---|---|
| 1 | CB.EN.P2CYS11001 | Aghoshlal N | Fast and Efficient Zero-Configuration Scheme for Smart Grid |
| 2 | CB.EN.P2CYS11002 | Ajith Ravindran | Breaking idevice - Forensic Investigation of An idevice |
| 3 | CB.EN.P2CYS11003 | Anand Abraham C | Quick response Code Based Authentication |
| 4 | CB.EN.P2CYS11004 | Anil K Philip | Cube Attack on Stream Cipher |
| 5 | CB.EN.P2CYS11006 | Anooja Joy | Similarity Search over Cloud Data |
| 6 | CB.EN.P2CYS11008 | Arun Jayamohan | Data Storage Security in Cloud Computing |
| 7 | CB.EN.P2CYS11009 | Avinash S | Adaptive Public Key Infrastructure for the Smart Grid |
| 8 | CB.EN.P2CYS11010 | Karthikeyan C | Novel Mutual Authentication Protocol for Rfid Tags |
| 9 | CB.EN.P2CYS11011 | Meena Lakshmi M | Formal Analysis of Device Authentication Protocols for Smart Grid |
| 10 | CB.EN.P2CYS11012 | Mridula Menon N | Forensic Analysis of Social Networking Services |
| 11 | CB.EN.P2CYS11013 | Premalatha P | Optimally Locating for Hiding Information in Audio Signal |
| 12 | CB.EN.P2CYS11014 | Ranjeeth O | Side Channel Analysis on Serpent Cipher |
| 13 | CB.EN.P2CYS11016 | Ritwik M | A Generic Analysis of Computer Viruses |
| 14 | CB.EN.P2CYS11017 | Sanooj S | Layer 2 and VPN Security |
| 15 | CB.EN.P2CYS11018 | Sheema Madhusudhanan | Run-Time Malware Analysis System |
| 16 | CB.EN.P2CYS11019 | Sivakumar B | Multy-Factor Authentication Using Zero Kniwledge Protocol in Cloud |
| 17 | CB.EN.P2CYS11020 | Sneha Sudhakaran | Digital Forensics Analysis of NTFS Disk Image |
| 18 | CB.EN.P2CYS11021 | Suchetha N K | Security Analysis of Web Single Sign-On |
| 19 | CB.EN.P2CYS11022 | Tizy Elizabeth Ninan | Secure Sharing of Data in Cloud Computing Using Attribute Based Encryption |
| 20 | CB.EN.P2CYS11023 | Vivek N | Host Based Web Application Firewall |