You are on page 1of 7

IEEE NETWORK SECURITY AND

CRYPTOGRAPHY PROJECT TITLES(FINAL


PROJECTS 2030)
New Key Management Approach for Broadcast and Multicast Services, IEEE Communications
Letters, Feb 2011[Java]

Towards Situational Awareness of Large-Scale Botnet Probing Events, IEEE Transactions on


Information Forensics and Security, March 2011[Java]

A Privacy-Preserving BuyerSeller Watermarking Protocol Based on Priced Oblivious Transfer, IEEE


Transactions on Information Forensics and Security, March 2011[Java]

A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting, IEEE
Transactions on Information Forensics and Security, March 2011[Java]

Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure, IEEE Transactions
on Mobile Computing, August 2011[Java/NS2]

On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks, IEEE
Transactions on Mobile Computing, August 2011[NS2]

Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential
Hypothesis Testing, IEEE Transactions on Mobile Computing, June 2011[Java/NS2]

A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks, IEEE
Transactions on Dependable and Secure Computing, April 2011[Java/NS2]

Secure and Practical Outsourcing of Linear Programming in Cloud Computing, IEEE INFOCOM,
April 2011[Java]

Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE Transactions on

Mobile Computing, May 2011[NS2]

Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients,
IEEE Transactions on Mobile Computing, Feb 2011[Java/NS2]

Secure Multihop Network Programming with Multiple One-Way Key Chains, IEEE Transactions on
Mobile Computing, Jan 2011[Java/NS2]

A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks, IEEE Transactions
on Mobile Computing, Jan 2011[Java/NS2]

On the Price of Security in Large-Scale Wireless Ad Hoc Networks, IEEE/ACM Transactions on


Networking, April 2011[Java/NS2]

Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks, IEEE
Transactions on Network and Service Management, June 2011 [Java/NS2]

On the Impact of Security Protocols on the Performance of SNMP, IEEE Transactions on Network
and Service Management, June 2011[Java]

Mechanism Design-Based Secure Leader Election Model Intrusion Detection in MANET, IEEE
Transactions on Dependable and Secure Computing, Feb 2011[NS2]

Modeling and Detection of Camouflaging Worm, IEEE Transactions on Dependable and Secure
Computing, June 2011[Java/NS2]

A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in


Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, Aug 2011[Java]

Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE
Transactions on Parallel and Distributed Systems, July 2011[Java]

An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks,
IEEE Journal on Selected Areas in Communications, March 2011[Java/NS2]

Comparative Evaluation of Spoofing Defenses, IEEE Transactions on Dependable and Secure


Computing, April 2011(NS2)

Data Integrity Proofs in Cloud Storage, Third International Conference on Communication Systems
and Networks,Jan 2011[Java]

Efficient Certificate Revocation List Organization and Distribution, IEEE Journal on Selected Areas
in Communications, March 2011[Java]

Sybil Attacks Detection in Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas in
Communications, March 2011[Java/NS2]

Privacy in VoIP Networks: Flow Analysis Attacks and Defense, IEEE Transactions on Parallel and
Distributed Systems, April 2011[NS2]

RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications,
IEEE Journal on Selected Areas in Communications, March 2011[Java/NS2]

Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks, IEEE


Communications Letters, April 2011[Java/NS2]

A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks, IEEE Transactions
on Computers, July 2011[Java/NS2]

On Ultralightweight RFID Authentication Protocols, IEEE Transactions on Dependable and Secure


Computing, Aug 2011[Java]

A Policy Enforcing Mechanism for Trusted Ad Hoc Networks, IEEE Transactions on Dependable and
Secure Computing, June 2011[Java/NS2]

Blocking Misbehaving Users in Anonymizing Networks, IEEE Transactions on Dependable and


Secure Computing, April 2011[Java/NS2]

Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET, IEEE
Transactions on Dependable and Secure Computing, Feb 2011[NS2]

Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids, IEEE


Transactions on Information Technology in Biomedicine, March 2011[Java]

Improving Security and Efficiency in Attribute-Based Data Sharing, IEEE Transactions on


Knowledge and Data Engineering, 2011[Java]

Resilient Identity Crime Detection, IEEE Transactions on Knowledge and Data Engineering,
2011[Java]

Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data, IEEE Transactions
on Knowledge and Data Engineering, 2011[Java]

Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes, IEEE
Transactions on Vehicular Technology, June 2009 (NS2)

Vulnerability Discovery with Attack Injection, IEEE Transactions on Software Engineering, May2010
(Java)

Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems, IEEE
Transactions on Parallel and Distributed Systems, August 2010 (NS2)

A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory, IEEE Transactions
on Dependable and Secure Computing, March 2010 ( J2EE/.NET)

Dynamic rekeying in 3GPP multimedia broadcast/multicast service (MBMS) IEEE Communications


Letters, April 2010 (JAVA)

Authenticated Group Key Transfer Protocol Based on Secret Sharing, IEEE Transactions on
Computers, June 2010 ( JAVA)

An Advanced Hybrid Peer-to-Peer Botnet, IEEE Transactions on Dependable and Secure Computing,
June 2010 ( JAVA)

Using Web-Referral Architectures to Mitigate Denial-of-Service Threats, IEEE Transactions on


Dependable and Secure Computing, June 2010 ( J2EE/.NET)

Blind Authentication: A Secure Crypto-Biometric Verification Protocol, IEEE Transactions on


Information Forensics and Security, June 2010 ( JAVA)

An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, IEEE Transactions on
Information Forensics and Security, March 2010 (JAVA )

MABS: Multicast Authentication Based on Batch Signature, IEEE Transactions on Mobile


Computing, July 2010 (Java)

Provably Secure Steganography, IEEE Transactions on Computers, May 2009 ( Java )

The Design of a Generic Intrusion-Tolerant Architecture for Web Servers, IEEE Transactions on
Dependable and Secure Computing, Jan.-March 2009 ( J2EE )

Monitoring the Application-Layer DDoS Attacks for Popular Websites, IEEE/ACM Transactions on
Networking, Feb. 2009( J2EE/.NET )

Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET, IEEE

Transactions on Dependable and Secure Computing, June 2009 (NS2)

A Gen2-Based RFID Authentication Protocol for Security and Privacy, IEEE Transactions on Mobile
Computing, Aug. 2009 ( Java )

Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices, IEEE
Transactions on Computers, June 2008 ( Java )

An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting, IEEE
Transactions on Dependable and Secure Computing, April-June 2008 ( Java )

Controlling IP Spoofing through Interdomain Packet Filters, IEEE Transactions on Dependable and
Secure Computing, Jan.- March 2008 ( NS2 )

Credit Card Fraud Detection Using Hidden Markov Model, IEEE Transactions on Dependable and
Secure Computing, Jan.- March 2008 (J2EE/.NET)

Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, IEEE
Transactions on Parallel and Distributed Systems, May 2008( Java )

Keep Passwords Away from Memory: Password Caching and Verification Using TPM, 22nd Intl Conf
on Advanced Information Networking and Applications, March 2008( Java )

Agent Based Architecture for Secure Access from Multiple Hospitals, Seventh IEEE/ACIS Intl Conf
on Computer and Information Science, May 2008( .NET )

Wallet Based E-Cash System for Secured Multi-hop Cash Exchange, 3rd Intl Conference on
Information and Communication Technologies: Theory to Applications, April 2008 ( J2EE )

Intelligent Phishing Website Detection System using Fuzzy Techniques, 3rd Intl Conf on Information
and Communication Technologies:Theory to Applications, April 2008( J2EE / .NET)

Collaborative Detection of DDoS Attacks over Multiple Network Domains, IEEE Transactions on
Parallel and Distributed Systems, Dec. 2007(NS2)

Secure Internet Banking Authentication, IEEE Security and Privacy April 2006(J2EE)

A Practical Password-Based Two-Server Authentication and Key Exchange System, IEEE


Transactions On Dependable And Secure Computing, June 2006( J2EE )

You might also like