• +919751800789
  • 1croreprojects@gmail.com
  • Chennai, Tamilnadu


Cloud Computing

  • Trust enhanced cryptography role based access control for secure cloud data storage
  • Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
  • A Time efficient approach for detecting errors in big sensor data on cloud
  • Cost Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
  • Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
  • Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
  • Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
  • PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative
  • Enabling Fine-grained Multi-keyword Search Supporting Classified
  • A Secure and Dynamic Multi keyword Ranked Search Scheme over Encrypted cloud

Data Mining

  • Real-time Twitter sentiment analysis with Stream Analytics
  • COMIC Cost Optimization for Internet Content Multihoming
  • Discovery of Ranking Fraud for Mobile Apps
  • Query Aware Determinization of Uncertain Objects

Image Processing

  • RRW – A Robust and Reversible Watermarking Technique for Relational Data
  • Combining Multiple Classification Methods for Hyperspectral Data Interpretation
  • A Secure Data Hiding Technique in Compressed Video Using a Secret Key
  • Steganography Using Reversible Texture Synthesis
  • Robust Watermarking Techniques For Color Images


  • Authenticated Key Exchange Protocols for Parallel Network File Systems
  • Assessment In Wireless Sensor Network Security
  • Energy aware Load Balancing and Application Scaling for the Cloud
  • Universal Network Coding-Based Opportunistic Routing for Unicast
  • Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization

Secure Computing

  • Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical
  •  Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
  • Continuous and Transparent User Identity Verification for Secure Internet

Services Computing

  • Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
Open chat
Reach Us