| S.No | Roll No. | Name | Project Title |
|---|---|---|---|
| 1 | CB.EN.P2CYS22001 | Karthika P | Enhancing Image Steganography: Multi-Secret Concealment with Deep Learning |
| 2 | CB.EN.P2CYS22002 | Meera E Thimothy | Integrating Dual Steganographic Techniques In VoIP |
| 3 | CB.EN.P2CYS22003 | Pandya Tanvi Kamalkumar | Verifiable Anonymous Image secret sharing scheme |
| 4 | CB.EN.P2CYS22004 | Ramya Ajay | Static Analysis and fusion of graph and Image-based features for Windows Malware Detection |
| 5 | CB.EN.P2CYS22005 | Shebu B | HTTP/3 Connection Contamination attacks |
| 6 | CB.EN.P2CYS22006 | Siriparapu Sparshika | Sharing the secret for a safe journey:Next-Gen Secure V2V and V2I communication with QR Codes |
| 7 | CB.EN.P2CYS22007 | Surya S Nair | Aviation Protocol Vulnerability Analysis |
| 8 | CB.EN.P2CYS22008 | Mohammed Tousif | Proxy Re-encryption using CRT (RPRC) |
| 9 | CB.EN.P2CYS22009 | Akhil K J | Performing Cryptojacking in decentralized VPN |
| 10 | CB.EN.P2CYS22010 | Priyadharshini S | Secure Image Encryption via Twofold Chaotic Map Method |
| 11 | CB.EN.P2CYS22011 | Rahul Raj | Design of improved password authentication and update scheme based on McEliece Cryptography |