1 |
CB.EN.P2CYS17001 |
Aishwarya Raghavan |
Simulation and Formal Verification of SIP/ZRTP Protocol Using UPPAAL |
2 |
CB.EN.P2CYS17002 |
Anto Ajisha Shriny M |
Design and Implementation of the Protocol for Secure Software-Based Remote Attestation in IoT Devices |
3 |
CB.EN.P2CYS17003 |
Arunima Saha |
White-Box cryptography based data encryption-decryption scheme for IoT environment |
4 |
CB.EN.P2CYS17004 |
Arvind S |
MITIGATING CoAP SECURITY VULNERABILITY USING OSCORE |
5 |
CB.EN.P2CYS17005 |
Batta Hemanth Saikumar |
Enhanced Attach Procedure for Prevention of Authentication Synchronisation Failure Attack |
6 |
CB.EN.P2CYS17006 |
Devarapalli Naveen |
PUF Authentication using Visual Secret Sharing Scheme |
7 |
CB.EN.P2CYS17007 |
Duggempudi Srikanth Reddy |
Acknowledgement Spoofing at Kernel Level and TCP Sender Behaviour Analysis |
8 |
CB.EN.P2CYS17008 |
Gottumukkala Eswar Kumar Raju |
Chip off IoT Devices: Attacks and Mitigations |
9 |
CB.EN.P2CYS17009 |
Harikrishnan M |
Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network |
10 |
CB.EN.P2CYS17010 |
Kondapally Ashritha |
Redactable Blockchain using Enhanced Chameleon Hash Function |
11 |
CB.EN.P2CYS17011 |
Krishna |
Steganalysis of Reversible Data Hiding in Color Image Using Grayscale Invariance |
12 |
CB.EN.P2CYS17012 |
Manasa Sidhardhan |
Data Obfuscation Using Secret Sharing |
13 |
CB.EN.P2CYS17013 |
Meghna Ashoka Mohan |
Preserving the Privacy of Audio File Using Ideal Secret Sharing Scheme with Cloud Storage |
14 |
CB.EN.P2CYS17014 |
Misha Abraham |
Runtime Verification and Vulnerability Testing of Smart Contracts |
15 |
CB.EN.P2CYS17015 |
Naveen S |
Ransomware Analysis Using Reverse Engineering |
16 |
CB.EN.P2CYS17017 |
Putrevu Venkata Sai Charan |
Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks |
17 |
CB.EN.P2CYS17018 |
Ramaguru R |
Blockchain for the Internet of Vehicles |
18 |
CB.EN.P2CYS17019 |
Ratnakaram Gowtham |
Proof of concept on Darknet Sensor Implementation in Linux Kernel |
19 |
CB.EN.P2CYS17020 |
Remyasree N |
A Reliable Time Lock Encryption Scheme for Relatively Weak Computational Resources |
20 |
CB.EN.P2CYS17021 |
Saurabh Choudhury |
Stegware Destruction Using Showering Methods |
21 |
CB.EN.P2CYS17022 |
Smile Manuel J |
LoPT : LoRa Penetration Testing Tool |
22 |
CB.EN.P2CYS17023 |
Sode Pallavi |
PREVENTING MITM ATTACKS ON BLE BASED IOT DEVICES |
23 |
CB.EN.P2CYS17024 |
Thanusree Mohan |
Fraud Detection in Medical Insurance Claim with Privacy Preserving Data Publishing in TLS-N Using Blockchain |
24 |
CB.EN.P2CYS17025 |
Vignesh Kumar V |
Averting Paging Related Attacks in 4G LTE Communication System |
25 |
CB.EN.P2CYS17026 |
Viji S |
INTELLIGENT ANOMALY DETECTION MODEL FOR ATM BOOTH SURVEILLANCE |
26 |
CB.EN.P2CYS17027 |
Akshay Pillai |
Securing Firmware in Internet of Things using Blockchain |