com
S.NO 1. 2. 3. 4.
PROJECT TITLE Cloud Computing Security: From Single to Multi-Clouds Efficient audit service outsourcing for data integrity in clouds Reliable Re-encryption in Unreliable Clouds Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. Towards Secure and Dependable Storage Services in Cloud Computing. Bridging Socially-Enhanced Virtual Communities A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Privacy- and Integrity-Preserving Range Queries in Sensor Networks Optimizing Cloud Resources for Delivering IPTV Services through Virtualization The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
DOMAIN Cloud computing Cloud computing Cloud computing Cloud computing Cloud computing Cloud computing Mobile Computing Networking Networking
5. 6. 7. 8. 9.
10.
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Packet-Hiding Methods for Preventing Selective Jamming Attacks Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Automatic Reconfiguration for Large-Scale Reliable Storage Systems Fast and stable Matrix Embedding by Matrix Extending Ensuring Distributed Accountability for Data Sharing in the Cloud Joint Relay and Jammer Selection for Secure Two-Way Relay Networks A Probabilistic Model of (t, n) Visual Cryptography Scheme with Dynamic Group ROAuth: Recommendation Based Open Authorization Topology control in mobile ad hoc Networks with cooperative Communications Learn to Personalized Image Search from the Photo Sharing Websites Improving Aggregate Recommendation Diversity Using Ranking-Based
Parallel and Distributed Systems Secure Computing Secure Computing Secure Computing Secure Computing Secure Computing Secure Computing Secure Computing Secure Computing Secure Computing Wireless Communicatio n Multimedia Data Mining
2012
21. 22.
2012 2012
28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : temasolution@gmail.com
Techniques Organizing User Search Histories. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. Ranking Model Adaptation for Domain-Specific Search Rank Matrices Slicing: A New Approach to Privacy Preserving Data Publishing Online Modeling of Proactive Moderation System for Auction Fraud Detection
Data Mining Data Mining Data Mining Data Mining Image Processing
28.
Internet Computing
2012