S.No | Roll No. | Name | Project Title |
---|---|---|---|
1 | CB.EN.P2CYS11001 | Aghoshlal N | Fast and Efficient Zero-Configuration Scheme for Smart Grid |
2 | CB.EN.P2CYS11002 | Ajith Ravindran | Breaking idevice - Forensic Investigation of An idevice |
3 | CB.EN.P2CYS11003 | Anand Abraham C | Quick response Code Based Authentication |
4 | CB.EN.P2CYS11004 | Anil K Philip | Cube Attack on Stream Cipher |
5 | CB.EN.P2CYS11006 | Anooja Joy | Similarity Search over Cloud Data |
6 | CB.EN.P2CYS11008 | Arun Jayamohan | Data Storage Security in Cloud Computing |
7 | CB.EN.P2CYS11009 | Avinash S | Adaptive Public Key Infrastructure for the Smart Grid |
8 | CB.EN.P2CYS11010 | Karthikeyan C | Novel Mutual Authentication Protocol for Rfid Tags |
9 | CB.EN.P2CYS11011 | Meena Lakshmi M | Formal Analysis of Device Authentication Protocols for Smart Grid |
10 | CB.EN.P2CYS11012 | Mridula Menon N | Forensic Analysis of Social Networking Services |
11 | CB.EN.P2CYS11013 | Premalatha P | Optimally Locating for Hiding Information in Audio Signal |
12 | CB.EN.P2CYS11014 | Ranjeeth O | Side Channel Analysis on Serpent Cipher |
13 | CB.EN.P2CYS11016 | Ritwik M | A Generic Analysis of Computer Viruses |
14 | CB.EN.P2CYS11017 | Sanooj S | Layer 2 and VPN Security |
15 | CB.EN.P2CYS11018 | Sheema Madhusudhanan | Run-Time Malware Analysis System |
16 | CB.EN.P2CYS11019 | Sivakumar B | Multy-Factor Authentication Using Zero Kniwledge Protocol in Cloud |
17 | CB.EN.P2CYS11020 | Sneha Sudhakaran | Digital Forensics Analysis of NTFS Disk Image |
18 | CB.EN.P2CYS11021 | Suchetha N K | Security Analysis of Web Single Sign-On |
19 | CB.EN.P2CYS11022 | Tizy Elizabeth Ninan | Secure Sharing of Data in Cloud Computing Using Attribute Based Encryption |
20 | CB.EN.P2CYS11023 | Vivek N | Host Based Web Application Firewall |