SlideShare a Scribd company logo
1 of 7
Download to read offline
SEABIRDS
      IEEE 2012 – 2013
   SOFTWARE PROJECTS IN
     VARIOUS DOMAINS
    | JAVA | J2ME | J2EE |
   DOTNET |MATLAB |NS2 |
SBGC                          SBGC

24/83, O Block, MMDA COLONY   4th FLOOR SURYA COMPLEX,

ARUMBAKKAM                    SINGARATHOPE BUS STOP,

CHENNAI-600106                OLD MADURAI ROAD, TRICHY- 620002




Web: www.ieeeproject.in
E-Mail: ieeeproject@hotmail.com
Trichy                        Chennai

Mobile:- 09003012150          Mobile:- 09944361169

Phone:- 0431-4012303
SBGC Provides IEEE 2012-2013 projects for all Final Year Students. We do assist the students
with Technical Guidance for two categories.

       Category 1 : Students with new project ideas / New or Old
       IEEE Papers.

       Category 2 : Students selecting from our project list.

When you register for a project we ensure that the project is implemented to your fullest
satisfaction and you have a thorough understanding of every aspect of the project.

SBGC PROVIDES YOU THE LATEST IEEE 2012 PROJECTS / IEEE 2013 PROJECTS

FOR FOLLOWING DEPARTMENT STUDENTS

B.E, B.TECH, M.TECH, M.E, DIPLOMA, MS, BSC, MSC, BCA, MCA, MBA, BBA, PHD,
B.E (ECE, EEE, E&I, ICE, MECH, PROD, CSE, IT, THERMAL, AUTOMOBILE,
MECATRONICS, ROBOTICS) B.TECH(ECE, MECATRONICS, E&I, EEE, MECH , CSE, IT,
ROBOTICS) M.TECH(EMBEDDED SYSTEMS, COMMUNICATION SYSTEMS, POWER
ELECTRONICS,        COMPUTER        SCIENCE,      SOFTWARE         ENGINEERING,       APPLIED
ELECTRONICS, VLSI Design) M.E(EMBEDDED                      SYSTEMS,       COMMUNICATION
SYSTEMS,         POWER          ELECTRONICS,         COMPUTER         SCIENCE,       SOFTWARE
ENGINEERING, APPLIED ELECTRONICS, VLSI Design) DIPLOMA (CE, EEE, E&I, ICE,
MECH,PROD, CSE, IT)

MBA(HR,       FINANCE,        MANAGEMENT,           HOTEL        MANAGEMENT,           SYSTEM
MANAGEMENT, PROJECT MANAGEMENT, HOSPITAL MANAGEMENT, SCHOOL
MANAGEMENT, MARKETING MANAGEMENT, SAFETY MANAGEMENT)

We also have training and project, R & D division to serve the students and make them job
oriented professionals
PROJECT SUPPORTS AND DELIVERABLES

 Project Abstract

 IEEE PAPER

 IEEE Reference Papers, Materials &

  Books in CD

 PPT / Review Material

 Project Report (All Diagrams & Screen

  shots)

 Working Procedures

 Algorithm Explanations

 Project Installation in Laptops

 Project Certificate
TECHNOLOGY          : JAVA

DOMAIN      : IEEE TRANSACTIONS ON SECURE COMPUTING



S.No. IEEE TITLE ABSTRACT                                                         IEEE
                                                                                  YEAR
  1. Revisiting      Brute force and dictionary attacks on password-only 2012
     Defenses        remote login services are now widespread and ever
     against         increasing.Enabling convenient login for legitimate users
     Large-Scale     while preventing such attacks is a difficult problem.
     Online          Automated Turing Tests (ATTs) continue to be an
     Password        effective, easy-to-deploy approach to identify automated
     Guessing        malicious login attempts with reasonable cost of
     Attacks         inconvenience to users. In this paper, we discuss the
                     inadequacy of existing and proposed login protocols
                     designed to address large-scale online dictionary attacks
                     (e.g., from a botnet of hundreds of thousands of nodes).
                     We propose a new Password Guessing Resistant Protocol
                     (PGRP), derived upon revisiting prior proposals designed
                     to restrict such attacks. While PGRP limits the total
                     number of login attempts from unknown remote hosts to
                     as low as a single attempt per username, legitimate users
                     in most cases (e.g., when attempts are made from known,
                     frequently-used machines) can make several failed login
                     attempts before being challenged with an ATT. We
                     analyze the performance of PGRP with two real-world
                     data sets and find it more promising than existing
                     proposals
  2. Data-           Malicious software typically resides stealthily on a user's 2012
     Provenance      computer and interacts with the user's computing
     Verification    resources. Our goal in this work is to improve the
     For Secure      trustworthiness of a host and its system data. Specifically,
     Hosts           we provide a new mechanism that ensures the correct
                     origin or provenance of critical system information and
                     prevents adversaries from utilizing host resources. We
                     define data-provenance integrity as the security property
                     stating that the source where a piece of data is generated
                     cannot be spoofed or tampered with. We describe a
                     cryptographic provenance verification approach for
                     ensuring system properties and system-data integrity at
                     kernel-level. Its two concrete applications are
demonstrated in the keystroke integrity verification and
                   malicious traffic detection. Specifically, we first design
                   and implement an efficient cryptographic protocol that
                   enforces keystroke integrity by utilizing on-chip Trusted
                   Computing Platform (TPM). The protocol prevents the
                   forgery of fake key events by malware under reasonable
                   assumptions. Then, we demonstrate our provenance
                   verification approach by realizing a lightweight
                   framework for restricting outbound malware traffic. This
                   traffic-monitoring framework helps identify network
                   activities of stealthy malware, and lends itself to a
                   powerful personal firewall for examining all outbound
                   traffic of a host that cannot be bypassed
3. Design and      The multihop routing in wireless sensor networks 2012
   Implementati    (WSNs) offers little protection against identity deception
   on of           through replaying routing information. An adversary can
   TARF:A          exploit this defect to launch various harmful or even
   Trust-Aware     devastating attacks against the routing protocols,
   Routing         including sinkhole attacks, wormhole attacks, and Sybil
   Framework       attacks. The situation is further aggravated by mobile and
   for WSNs        harsh network conditions. Traditional cryptographic
                   techniques or efforts at developing trust-aware routing
                   protocols do not effectively address this severe problem.
                   To secure the WSNs against adversaries misdirecting the
                   multihop routing, we have designed and implemented
                   TARF, a robust trust-aware routing framework for
                   dynamic WSNs. Without tight time synchronization or
                   known geographic information, TARF provides
                   trustworthy and energy-efficient route. Most importantly,
                   TARF proves effective against those harmful attacks
                   developed out of identity deception; the resilience of
                   TARF is verified through extensive evaluation with both
                   simulation and empirical experiments on large-scale
                   WSNs under various scenarios including mobile and RF-
                   shielding network conditions. Further, we have
                   implemented a low-overhead TARF module in TinyOS;
                   as demonstrated, this implementation can be incorporated
                   into existing routing protocols with the least effort. Based
                   on TARF, we also demonstrated a proof-of-concept
                   mobile target detection application that functions well
                   against an antidetection mechanism.
4. On the          Content distribution via network coding has received a lot 2012
   Security and    of attention lately. However, direct application of
   Efficiency of   network coding may be insecure. In particular, attackers
   Content         can inject "bogus” data to corrupt the content distribution
   Distribution    process so as to hinder the information dispersal or even
via Network     deplete the network resource. Therefore, content
   Coding          verification is an important and practical issue when
                   network coding is employed. When random linear
                   network coding is used, it is infeasible for the source of
                   the content to sign all the data, and hence, the traditional
                   "hash-and-sign” methods are no longer applicable.
                   Recently, a new on-the-fly verification technique has
                   been proposed by Krohn et al. (IEEE S&P '04), which
                   employs a classical homomorphic hash function.
                   However, this technique is difficult to be applied to
                   network coding because of high computational and
                   communication overhead. We explore this issue further
                   by carefully analyzing different types of overhead, and
                   propose methods to help reducing both the computational
                   and communication cost, and provide provable security at
                   the same time
5. Detecting       Collaborative information systems (CISs) are deployed 2012
   Anomalous       within a diverse array of environments that manage
   Insiders in     sensitive information. Current security mechanisms
   Collaborative   detect insider threats, but they are ill-suited to monitor
   Information     systems in which users function in dynamic teams. In this
   Systems         paper, we introduce the community anomaly detection
                   system (CADS), an unsupervised learning framework to
                   detect insider threats based on the access logs of
                   collaborative environments. The framework is based on
                   the observation that typical CIS users tend to form
                   community structures based on the subjects accessed
                   (e.g., patients' records viewed by healthcare providers).
                   CADS consists of two components: 1) relational pattern
                   extraction, which derives community structures and 2)
                   anomaly prediction, which leverages a statistical model to
                   determine when users have sufficiently deviated from
                   communities. We further extend CADS into MetaCADS
                   to account for the semantics of subjects (e.g., patients'
                   diagnoses). To empirically evaluate the framework, we
                   perform an assessment with three months of access logs
                   from a real electronic health record (EHR) system in a
                   large medical center. The results illustrate our models
                   exhibit significant performance gains over state-of-the-art
                   competitors. When the number of illicit users is low,
                   MetaCADS is the best model, but as the number grows,
                   commonly accessed semantics lead to hiding in a crowd,
                   such that CADS is more prudent.
6. ES-MPICH2:      An increasing number of commodity clusters are
   A Message       connected to each other by public networks, which have
   Passing         become a potential threat to security sensitive parallel
Interface with   applications running on the clusters. To address this
   Enhanced         security issue, we developed a Message Passing Interface
   Security         (MPI) implementation to preserve confidentiality of
                    messages communicated among nodes of clusters in an
                    unsecured network. We focus on M PI rather than other
                    protocols, because M PI is one of the most popular
                    communication protocols for parallel computing on
                    clusters. Our MPI implementation-called ES-MPICH2-
                    was built based on MPICH2 developed by the Argonne
                    National Laboratory. Like MPICH2, ES-MPICH2 aims at
                    supporting a large variety of computation and
                    communication platforms like commodity clusters and
                    high-speed networks. We integrated encryption and
                    decryption algorithms into the MPICH2 library with the
                    standard MPI interface and; thus, data confidentiality of
                    MPI applications can be readily preserved without a need
                    to change the source codes of the MPI applications. MPI-
                    application programmers can fully configure any
                    confidentiality services in MPICHI2, because a secured
                    configuration file in ES-MPICH2 offers the programmers
                    flexibility in choosing any cryptographic schemes and
                    keys seamlessly incorporated in ES-MPICH2. We used
                    the Sandia Micro Benchmark and Intel MPI Benchmark
                    suites to evaluate and compare the performance of ES-
                    MPICH2 with the original MPICH2 version. Our
                    experiments show that overhead incurred by the
                    confidentiality services in ES-MPICH2 is marginal for
                    small messages. The security overhead in ES-MPICH2
                    becomes more pronounced with larger messages. Our
                    results also show that security overhead can be
                    significantly reduced in ES-MPICH2 by high-
                    performance clustersRequirements elicitation is the
                    software engineering activity in which
7. On the           In 2011, Sun et al. [CHECK END OF SENTENCE] 2012
   Security of a    proposed a security architecture to ensure unconditional
   Ticket-Based     anonymity for honest users and traceability of
   Anonymity        misbehaving users for network authorities in wireless
   System with      mesh networks (WMNs). It strives to resolve the conflicts
   Traceability     between the anonymity and traceability objectives. In this
   Property in      paper, we attacked Sun et al. scheme's traceability. Our
   Wireless         analysis showed that trusted authority (TA) cannot trace
   Mesh             the misbehavior client (CL) even if it double-time
   Networks         deposits the same ticket.

More Related Content

What's hot

IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...IRJET Journal
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks IJECEIAES
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksDefCamp
 
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
IRJET-  	  A Survey for an Efficient Secure Guarantee in Network FlowIRJET-  	  A Survey for an Efficient Secure Guarantee in Network Flow
IRJET- A Survey for an Efficient Secure Guarantee in Network FlowIRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
Review Paper on Predicting Network Attack Patterns in SDN using ML
Review Paper on Predicting Network Attack Patterns in SDN using MLReview Paper on Predicting Network Attack Patterns in SDN using ML
Review Paper on Predicting Network Attack Patterns in SDN using MLijtsrd
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoceSAT Publishing House
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkIRJET Journal
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
 

What's hot (18)

IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
 
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
IRJET-  	  A Survey for an Efficient Secure Guarantee in Network FlowIRJET-  	  A Survey for an Efficient Secure Guarantee in Network Flow
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Distance bounding
Distance boundingDistance bounding
Distance bounding
 
Review Paper on Predicting Network Attack Patterns in SDN using ML
Review Paper on Predicting Network Attack Patterns in SDN using MLReview Paper on Predicting Network Attack Patterns in SDN using ML
Review Paper on Predicting Network Attack Patterns in SDN using ML
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 

Viewers also liked

Ieee projects 2011 java cloud computing @ SBGC ( Chennai, Trichy, Karur, Pudu...
Ieee projects 2011 java cloud computing @ SBGC ( Chennai, Trichy, Karur, Pudu...Ieee projects 2011 java cloud computing @ SBGC ( Chennai, Trichy, Karur, Pudu...
Ieee projects 2011 java cloud computing @ SBGC ( Chennai, Trichy, Karur, Pudu...SBGC
 
Algorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
Algorithm Solved IEEE Projects 2012 2013 Java @ SeabirdssolutionsAlgorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
Algorithm Solved IEEE Projects 2012 2013 Java @ SeabirdssolutionsSBGC
 
Ieee 2009 .N Et & DOtnet Projects Sbgc ( Chennai, Trichy, India, Tamilnadu)
Ieee 2009 .N Et & DOtnet Projects  Sbgc ( Chennai, Trichy, India, Tamilnadu)Ieee 2009 .N Et & DOtnet Projects  Sbgc ( Chennai, Trichy, India, Tamilnadu)
Ieee 2009 .N Et & DOtnet Projects Sbgc ( Chennai, Trichy, India, Tamilnadu)SBGC
 
Final Year IEEE 2011 Java Projects in Trichy SBGC
Final Year IEEE 2011 Java Projects in Trichy SBGCFinal Year IEEE 2011 Java Projects in Trichy SBGC
Final Year IEEE 2011 Java Projects in Trichy SBGCSBGC
 
IEEE Projects 2011 for it SBGC ( Chennai, Trichy, Dindigul, Madurai)
IEEE Projects 2011 for it SBGC ( Chennai, Trichy, Dindigul, Madurai)IEEE Projects 2011 for it SBGC ( Chennai, Trichy, Dindigul, Madurai)
IEEE Projects 2011 for it SBGC ( Chennai, Trichy, Dindigul, Madurai)SBGC
 
Ieee project 2011 Sbgc
Ieee project 2011 SbgcIeee project 2011 Sbgc
Ieee project 2011 SbgcSBGC
 
IEEE Projects 2011 on Network Security @ SBGC ( Chennai, Trichy, Madurai, Din...
IEEE Projects 2011 on Network Security @ SBGC ( Chennai, Trichy, Madurai, Din...IEEE Projects 2011 on Network Security @ SBGC ( Chennai, Trichy, Madurai, Din...
IEEE Projects 2011 on Network Security @ SBGC ( Chennai, Trichy, Madurai, Din...SBGC
 
Computer Science Projects for ieee 2011 SBGC ( Chennai, Trichy, Thanjavur, Pu...
Computer Science Projects for ieee 2011 SBGC ( Chennai, Trichy, Thanjavur, Pu...Computer Science Projects for ieee 2011 SBGC ( Chennai, Trichy, Thanjavur, Pu...
Computer Science Projects for ieee 2011 SBGC ( Chennai, Trichy, Thanjavur, Pu...SBGC
 

Viewers also liked (8)

Ieee projects 2011 java cloud computing @ SBGC ( Chennai, Trichy, Karur, Pudu...
Ieee projects 2011 java cloud computing @ SBGC ( Chennai, Trichy, Karur, Pudu...Ieee projects 2011 java cloud computing @ SBGC ( Chennai, Trichy, Karur, Pudu...
Ieee projects 2011 java cloud computing @ SBGC ( Chennai, Trichy, Karur, Pudu...
 
Algorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
Algorithm Solved IEEE Projects 2012 2013 Java @ SeabirdssolutionsAlgorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
Algorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
 
Ieee 2009 .N Et & DOtnet Projects Sbgc ( Chennai, Trichy, India, Tamilnadu)
Ieee 2009 .N Et & DOtnet Projects  Sbgc ( Chennai, Trichy, India, Tamilnadu)Ieee 2009 .N Et & DOtnet Projects  Sbgc ( Chennai, Trichy, India, Tamilnadu)
Ieee 2009 .N Et & DOtnet Projects Sbgc ( Chennai, Trichy, India, Tamilnadu)
 
Final Year IEEE 2011 Java Projects in Trichy SBGC
Final Year IEEE 2011 Java Projects in Trichy SBGCFinal Year IEEE 2011 Java Projects in Trichy SBGC
Final Year IEEE 2011 Java Projects in Trichy SBGC
 
IEEE Projects 2011 for it SBGC ( Chennai, Trichy, Dindigul, Madurai)
IEEE Projects 2011 for it SBGC ( Chennai, Trichy, Dindigul, Madurai)IEEE Projects 2011 for it SBGC ( Chennai, Trichy, Dindigul, Madurai)
IEEE Projects 2011 for it SBGC ( Chennai, Trichy, Dindigul, Madurai)
 
Ieee project 2011 Sbgc
Ieee project 2011 SbgcIeee project 2011 Sbgc
Ieee project 2011 Sbgc
 
IEEE Projects 2011 on Network Security @ SBGC ( Chennai, Trichy, Madurai, Din...
IEEE Projects 2011 on Network Security @ SBGC ( Chennai, Trichy, Madurai, Din...IEEE Projects 2011 on Network Security @ SBGC ( Chennai, Trichy, Madurai, Din...
IEEE Projects 2011 on Network Security @ SBGC ( Chennai, Trichy, Madurai, Din...
 
Computer Science Projects for ieee 2011 SBGC ( Chennai, Trichy, Thanjavur, Pu...
Computer Science Projects for ieee 2011 SBGC ( Chennai, Trichy, Thanjavur, Pu...Computer Science Projects for ieee 2011 SBGC ( Chennai, Trichy, Thanjavur, Pu...
Computer Science Projects for ieee 2011 SBGC ( Chennai, Trichy, Thanjavur, Pu...
 

Similar to IEEE Projects 2012-2013 Network Security

A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemesHabitamuAsimare
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...DMV SAI
 
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...SBGC
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016tsysglobalsolutions
 
A securing symmetric key distribution
A securing symmetric key distributionA securing symmetric key distribution
A securing symmetric key distributionvinothp2k
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMIRJET Journal
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...AM Publications
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersLeMeniz Infotech
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 

Similar to IEEE Projects 2012-2013 Network Security (20)

A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494
 
A05510105
A05510105A05510105
A05510105
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemes
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016
 
A securing symmetric key distribution
A securing symmetric key distributionA securing symmetric key distribution
A securing symmetric key distribution
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
 
35 38
35 3835 38
35 38
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 

More from SBGC

2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )SBGC
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingSBGC
 
Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...
Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...
Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...SBGC
 
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )SBGC
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )SBGC
 
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...SBGC
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cseSBGC
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cseSBGC
 
Bulk ieee projects 2012 2013
Bulk ieee projects 2012 2013Bulk ieee projects 2012 2013
Bulk ieee projects 2012 2013SBGC
 
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...SBGC
 
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...SBGC
 
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...SBGC
 
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...SBGC
 
Java datamining ieee Projects 2012 @ Seabirds ( Chennai, Mumbai, Pune, Nagpur...
Java datamining ieee Projects 2012 @ Seabirds ( Chennai, Mumbai, Pune, Nagpur...Java datamining ieee Projects 2012 @ Seabirds ( Chennai, Mumbai, Pune, Nagpur...
Java datamining ieee Projects 2012 @ Seabirds ( Chennai, Mumbai, Pune, Nagpur...SBGC
 
Bulk IEEE Java Projects 2012 @ Seabirds ( Chennai, Trichy, Hyderabad, Mumbai,...
Bulk IEEE Java Projects 2012 @ Seabirds ( Chennai, Trichy, Hyderabad, Mumbai,...Bulk IEEE Java Projects 2012 @ Seabirds ( Chennai, Trichy, Hyderabad, Mumbai,...
Bulk IEEE Java Projects 2012 @ Seabirds ( Chennai, Trichy, Hyderabad, Mumbai,...SBGC
 
Latest IEEE Projects 2012 For IT@ Seabirds ( Trichy, Perambalur, Namakkal, Sa...
Latest IEEE Projects 2012 For IT@ Seabirds ( Trichy, Perambalur, Namakkal, Sa...Latest IEEE Projects 2012 For IT@ Seabirds ( Trichy, Perambalur, Namakkal, Sa...
Latest IEEE Projects 2012 For IT@ Seabirds ( Trichy, Perambalur, Namakkal, Sa...SBGC
 
Latest IEEE Projects 2012 for Cse Seabirds ( Trichy, Chennai, Perambalur, Pon...
Latest IEEE Projects 2012 for Cse Seabirds ( Trichy, Chennai, Perambalur, Pon...Latest IEEE Projects 2012 for Cse Seabirds ( Trichy, Chennai, Perambalur, Pon...
Latest IEEE Projects 2012 for Cse Seabirds ( Trichy, Chennai, Perambalur, Pon...SBGC
 
IEEE Projects 2012 Titles For Cse @ Seabirds ( Chennai, Pondicherry, Vellore,...
IEEE Projects 2012 Titles For Cse @ Seabirds ( Chennai, Pondicherry, Vellore,...IEEE Projects 2012 Titles For Cse @ Seabirds ( Chennai, Pondicherry, Vellore,...
IEEE Projects 2012 Titles For Cse @ Seabirds ( Chennai, Pondicherry, Vellore,...SBGC
 
IEEE Projects 2012 For Me Cse @ Seabirds ( Trichy, Chennai, Thanjavur, Pudukk...
IEEE Projects 2012 For Me Cse @ Seabirds ( Trichy, Chennai, Thanjavur, Pudukk...IEEE Projects 2012 For Me Cse @ Seabirds ( Trichy, Chennai, Thanjavur, Pudukk...
IEEE Projects 2012 For Me Cse @ Seabirds ( Trichy, Chennai, Thanjavur, Pudukk...SBGC
 
Ieee project-for-cse -2012
Ieee project-for-cse -2012Ieee project-for-cse -2012
Ieee project-for-cse -2012SBGC
 

More from SBGC (20)

2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computing
 
Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...
Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...
Ieee Projects 2013 for Cse @ Seabirds(Trichy, Pudukkottai, Perambalur, Thanja...
 
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
 
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cse
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cse
 
Bulk ieee projects 2012 2013
Bulk ieee projects 2012 2013Bulk ieee projects 2012 2013
Bulk ieee projects 2012 2013
 
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...
 
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
 
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
 
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
 
Java datamining ieee Projects 2012 @ Seabirds ( Chennai, Mumbai, Pune, Nagpur...
Java datamining ieee Projects 2012 @ Seabirds ( Chennai, Mumbai, Pune, Nagpur...Java datamining ieee Projects 2012 @ Seabirds ( Chennai, Mumbai, Pune, Nagpur...
Java datamining ieee Projects 2012 @ Seabirds ( Chennai, Mumbai, Pune, Nagpur...
 
Bulk IEEE Java Projects 2012 @ Seabirds ( Chennai, Trichy, Hyderabad, Mumbai,...
Bulk IEEE Java Projects 2012 @ Seabirds ( Chennai, Trichy, Hyderabad, Mumbai,...Bulk IEEE Java Projects 2012 @ Seabirds ( Chennai, Trichy, Hyderabad, Mumbai,...
Bulk IEEE Java Projects 2012 @ Seabirds ( Chennai, Trichy, Hyderabad, Mumbai,...
 
Latest IEEE Projects 2012 For IT@ Seabirds ( Trichy, Perambalur, Namakkal, Sa...
Latest IEEE Projects 2012 For IT@ Seabirds ( Trichy, Perambalur, Namakkal, Sa...Latest IEEE Projects 2012 For IT@ Seabirds ( Trichy, Perambalur, Namakkal, Sa...
Latest IEEE Projects 2012 For IT@ Seabirds ( Trichy, Perambalur, Namakkal, Sa...
 
Latest IEEE Projects 2012 for Cse Seabirds ( Trichy, Chennai, Perambalur, Pon...
Latest IEEE Projects 2012 for Cse Seabirds ( Trichy, Chennai, Perambalur, Pon...Latest IEEE Projects 2012 for Cse Seabirds ( Trichy, Chennai, Perambalur, Pon...
Latest IEEE Projects 2012 for Cse Seabirds ( Trichy, Chennai, Perambalur, Pon...
 
IEEE Projects 2012 Titles For Cse @ Seabirds ( Chennai, Pondicherry, Vellore,...
IEEE Projects 2012 Titles For Cse @ Seabirds ( Chennai, Pondicherry, Vellore,...IEEE Projects 2012 Titles For Cse @ Seabirds ( Chennai, Pondicherry, Vellore,...
IEEE Projects 2012 Titles For Cse @ Seabirds ( Chennai, Pondicherry, Vellore,...
 
IEEE Projects 2012 For Me Cse @ Seabirds ( Trichy, Chennai, Thanjavur, Pudukk...
IEEE Projects 2012 For Me Cse @ Seabirds ( Trichy, Chennai, Thanjavur, Pudukk...IEEE Projects 2012 For Me Cse @ Seabirds ( Trichy, Chennai, Thanjavur, Pudukk...
IEEE Projects 2012 For Me Cse @ Seabirds ( Trichy, Chennai, Thanjavur, Pudukk...
 
Ieee project-for-cse -2012
Ieee project-for-cse -2012Ieee project-for-cse -2012
Ieee project-for-cse -2012
 

IEEE Projects 2012-2013 Network Security

  • 1. SEABIRDS IEEE 2012 – 2013 SOFTWARE PROJECTS IN VARIOUS DOMAINS | JAVA | J2ME | J2EE | DOTNET |MATLAB |NS2 | SBGC SBGC 24/83, O Block, MMDA COLONY 4th FLOOR SURYA COMPLEX, ARUMBAKKAM SINGARATHOPE BUS STOP, CHENNAI-600106 OLD MADURAI ROAD, TRICHY- 620002 Web: www.ieeeproject.in E-Mail: ieeeproject@hotmail.com Trichy Chennai Mobile:- 09003012150 Mobile:- 09944361169 Phone:- 0431-4012303
  • 2. SBGC Provides IEEE 2012-2013 projects for all Final Year Students. We do assist the students with Technical Guidance for two categories. Category 1 : Students with new project ideas / New or Old IEEE Papers. Category 2 : Students selecting from our project list. When you register for a project we ensure that the project is implemented to your fullest satisfaction and you have a thorough understanding of every aspect of the project. SBGC PROVIDES YOU THE LATEST IEEE 2012 PROJECTS / IEEE 2013 PROJECTS FOR FOLLOWING DEPARTMENT STUDENTS B.E, B.TECH, M.TECH, M.E, DIPLOMA, MS, BSC, MSC, BCA, MCA, MBA, BBA, PHD, B.E (ECE, EEE, E&I, ICE, MECH, PROD, CSE, IT, THERMAL, AUTOMOBILE, MECATRONICS, ROBOTICS) B.TECH(ECE, MECATRONICS, E&I, EEE, MECH , CSE, IT, ROBOTICS) M.TECH(EMBEDDED SYSTEMS, COMMUNICATION SYSTEMS, POWER ELECTRONICS, COMPUTER SCIENCE, SOFTWARE ENGINEERING, APPLIED ELECTRONICS, VLSI Design) M.E(EMBEDDED SYSTEMS, COMMUNICATION SYSTEMS, POWER ELECTRONICS, COMPUTER SCIENCE, SOFTWARE ENGINEERING, APPLIED ELECTRONICS, VLSI Design) DIPLOMA (CE, EEE, E&I, ICE, MECH,PROD, CSE, IT) MBA(HR, FINANCE, MANAGEMENT, HOTEL MANAGEMENT, SYSTEM MANAGEMENT, PROJECT MANAGEMENT, HOSPITAL MANAGEMENT, SCHOOL MANAGEMENT, MARKETING MANAGEMENT, SAFETY MANAGEMENT) We also have training and project, R & D division to serve the students and make them job oriented professionals
  • 3. PROJECT SUPPORTS AND DELIVERABLES  Project Abstract  IEEE PAPER  IEEE Reference Papers, Materials & Books in CD  PPT / Review Material  Project Report (All Diagrams & Screen shots)  Working Procedures  Algorithm Explanations  Project Installation in Laptops  Project Certificate
  • 4. TECHNOLOGY : JAVA DOMAIN : IEEE TRANSACTIONS ON SECURE COMPUTING S.No. IEEE TITLE ABSTRACT IEEE YEAR 1. Revisiting Brute force and dictionary attacks on password-only 2012 Defenses remote login services are now widespread and ever against increasing.Enabling convenient login for legitimate users Large-Scale while preventing such attacks is a difficult problem. Online Automated Turing Tests (ATTs) continue to be an Password effective, easy-to-deploy approach to identify automated Guessing malicious login attempts with reasonable cost of Attacks inconvenience to users. In this paper, we discuss the inadequacy of existing and proposed login protocols designed to address large-scale online dictionary attacks (e.g., from a botnet of hundreds of thousands of nodes). We propose a new Password Guessing Resistant Protocol (PGRP), derived upon revisiting prior proposals designed to restrict such attacks. While PGRP limits the total number of login attempts from unknown remote hosts to as low as a single attempt per username, legitimate users in most cases (e.g., when attempts are made from known, frequently-used machines) can make several failed login attempts before being challenged with an ATT. We analyze the performance of PGRP with two real-world data sets and find it more promising than existing proposals 2. Data- Malicious software typically resides stealthily on a user's 2012 Provenance computer and interacts with the user's computing Verification resources. Our goal in this work is to improve the For Secure trustworthiness of a host and its system data. Specifically, Hosts we provide a new mechanism that ensures the correct origin or provenance of critical system information and prevents adversaries from utilizing host resources. We define data-provenance integrity as the security property stating that the source where a piece of data is generated cannot be spoofed or tampered with. We describe a cryptographic provenance verification approach for ensuring system properties and system-data integrity at kernel-level. Its two concrete applications are
  • 5. demonstrated in the keystroke integrity verification and malicious traffic detection. Specifically, we first design and implement an efficient cryptographic protocol that enforces keystroke integrity by utilizing on-chip Trusted Computing Platform (TPM). The protocol prevents the forgery of fake key events by malware under reasonable assumptions. Then, we demonstrate our provenance verification approach by realizing a lightweight framework for restricting outbound malware traffic. This traffic-monitoring framework helps identify network activities of stealthy malware, and lends itself to a powerful personal firewall for examining all outbound traffic of a host that cannot be bypassed 3. Design and The multihop routing in wireless sensor networks 2012 Implementati (WSNs) offers little protection against identity deception on of through replaying routing information. An adversary can TARF:A exploit this defect to launch various harmful or even Trust-Aware devastating attacks against the routing protocols, Routing including sinkhole attacks, wormhole attacks, and Sybil Framework attacks. The situation is further aggravated by mobile and for WSNs harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multihop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF- shielding network conditions. Further, we have implemented a low-overhead TARF module in TinyOS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an antidetection mechanism. 4. On the Content distribution via network coding has received a lot 2012 Security and of attention lately. However, direct application of Efficiency of network coding may be insecure. In particular, attackers Content can inject "bogus” data to corrupt the content distribution Distribution process so as to hinder the information dispersal or even
  • 6. via Network deplete the network resource. Therefore, content Coding verification is an important and practical issue when network coding is employed. When random linear network coding is used, it is infeasible for the source of the content to sign all the data, and hence, the traditional "hash-and-sign” methods are no longer applicable. Recently, a new on-the-fly verification technique has been proposed by Krohn et al. (IEEE S&P '04), which employs a classical homomorphic hash function. However, this technique is difficult to be applied to network coding because of high computational and communication overhead. We explore this issue further by carefully analyzing different types of overhead, and propose methods to help reducing both the computational and communication cost, and provide provable security at the same time 5. Detecting Collaborative information systems (CISs) are deployed 2012 Anomalous within a diverse array of environments that manage Insiders in sensitive information. Current security mechanisms Collaborative detect insider threats, but they are ill-suited to monitor Information systems in which users function in dynamic teams. In this Systems paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on the access logs of collaborative environments. The framework is based on the observation that typical CIS users tend to form community structures based on the subjects accessed (e.g., patients' records viewed by healthcare providers). CADS consists of two components: 1) relational pattern extraction, which derives community structures and 2) anomaly prediction, which leverages a statistical model to determine when users have sufficiently deviated from communities. We further extend CADS into MetaCADS to account for the semantics of subjects (e.g., patients' diagnoses). To empirically evaluate the framework, we perform an assessment with three months of access logs from a real electronic health record (EHR) system in a large medical center. The results illustrate our models exhibit significant performance gains over state-of-the-art competitors. When the number of illicit users is low, MetaCADS is the best model, but as the number grows, commonly accessed semantics lead to hiding in a crowd, such that CADS is more prudent. 6. ES-MPICH2: An increasing number of commodity clusters are A Message connected to each other by public networks, which have Passing become a potential threat to security sensitive parallel
  • 7. Interface with applications running on the clusters. To address this Enhanced security issue, we developed a Message Passing Interface Security (MPI) implementation to preserve confidentiality of messages communicated among nodes of clusters in an unsecured network. We focus on M PI rather than other protocols, because M PI is one of the most popular communication protocols for parallel computing on clusters. Our MPI implementation-called ES-MPICH2- was built based on MPICH2 developed by the Argonne National Laboratory. Like MPICH2, ES-MPICH2 aims at supporting a large variety of computation and communication platforms like commodity clusters and high-speed networks. We integrated encryption and decryption algorithms into the MPICH2 library with the standard MPI interface and; thus, data confidentiality of MPI applications can be readily preserved without a need to change the source codes of the MPI applications. MPI- application programmers can fully configure any confidentiality services in MPICHI2, because a secured configuration file in ES-MPICH2 offers the programmers flexibility in choosing any cryptographic schemes and keys seamlessly incorporated in ES-MPICH2. We used the Sandia Micro Benchmark and Intel MPI Benchmark suites to evaluate and compare the performance of ES- MPICH2 with the original MPICH2 version. Our experiments show that overhead incurred by the confidentiality services in ES-MPICH2 is marginal for small messages. The security overhead in ES-MPICH2 becomes more pronounced with larger messages. Our results also show that security overhead can be significantly reduced in ES-MPICH2 by high- performance clustersRequirements elicitation is the software engineering activity in which 7. On the In 2011, Sun et al. [CHECK END OF SENTENCE] 2012 Security of a proposed a security architecture to ensure unconditional Ticket-Based anonymity for honest users and traceability of Anonymity misbehaving users for network authorities in wireless System with mesh networks (WMNs). It strives to resolve the conflicts Traceability between the anonymity and traceability objectives. In this Property in paper, we attacked Sun et al. scheme's traceability. Our Wireless analysis showed that trusted authority (TA) cannot trace Mesh the misbehavior client (CL) even if it double-time Networks deposits the same ticket.