SlideShare a Scribd company logo
IEEE DOTNET PROJECTS TITLES YEAR--2013
PROJECT TITLE DOMAIN
1.
Enforcing Secure and Privacy-Preserving Information Brokering in
Distributed Information Sharing
Information Security
2.
A Privacy Leakage Upper Bound Constraint-Based Approach For Cost-
Effective Privacy Preserving Of Intermediate Data Sets In Cloud
Cloud Computing
3.
Enabling Dynamic Data And Indirect Mutual Trust For Cloud Computing
Storage Systems
Cloud Computing
4.
Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In The
Cloud
Cloud Computing
5. Cam: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Cloud Computing
6. Privacy-Preserving Public Auditing For Secure Cloud Storage Cloud Computing
7.
Scalable And Secure Sharing Of Personal Health Records In Cloud
Computing Using Attribute-Based Encryption
Cloud Computing
8.
Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis For
Production Cloud Computing Systems
Cloud Computing
9. Privacy Preserving Delegated Access Control In Public Clouds Cloud Computing
10.
Attribute-Based Access To Scalable Media In Cloud-Assisted Content
Sharing Networks
Cloud Computing
11.
Cloudftp: A Case Study Of Migrating Traditional Applications To The
Cloud
Cloud Computing
12.
Beyond Text Qa: Multimedia Answer Generation By Harvesting Web
Information
Multimedia
13. Evolution Of Social Networks Based On Tagging Practices
Service Computing
(Web Service)
14. A Survey Of Xml Tree Patterns Data Mining
15. Dynamic Personalized Recommendation On Sparse Data Data Mining
16.
A Proxy-Based Approach To Continuous Location-Based Spatial Queries In
Mobile Environments
Data Mining
17. Supporting Search-As-You-Type Using Sql In Databases Data Mining
18. Secure Mining Of Association Rules In Horizontally Distributed Databases Data Mining
19. Eaack—A Secure Intrusion-Detection System For Manets Secure Computing
20. Sort: A Self-Organizing Trust Model For Peer-To-Peer Systems Secure Computing
21.
Localization Of Wireless Sensor Networks In The Wild: Pursuit Of Ranging
Quality
Networking
22. Resource Allocation For Qos Support In Wireless Mesh Networks Networking
23.
A Secure Payment Scheme With Low Communication And Processing
Overhead For Multihop Wireless Networks
Parallel & Distributed
Systems
24. Multicast Capacity In Manet With Infrastructure Support
Parallel & Distributed
Systems
25.
Spoc: A Secure And Privacy-Preserving Opportunistic Computing
Framework For Mobile-Healthcare Emergency
Parallel & Distributed
Systems
26.
Detection And Localization Of Multiple Spoofing Attackers In Wireless
Networks
Parallel & Distributed
Systems
27.
Adaptive Position Update For Geographic Routing In Mobile Ad Hoc
Networks
Mobile Computing
28.
Emap: Expedite Message Authentication Protocol For Vehicular Ad Hoc
Networks
Mobile Computing
29.
Network-Assisted Mobile Computing With Optimal Uplink Query
Processing
Mobile Computing
30.
Target Tracking And Mobile Sensor Navigation In Wireless Sensor
Networks
Mobile Computing
31.
Toward Accurate Mobile Sensor Network Localization In Noisy
Environments
Mobile Computing
32. Reversible Data Hiding With Optimal Value Transfer Image Processing
33.
Reversible Watermarking Based On Invariant Image Classification And
Dynamic Histogram Shifting
Image Processing
34.
Local Directional Number Pattern For Face Analysis: Face And Expression
Recognition
Image Processing
35.
Mobi-Sync: Efficient Time Synchronization For Mobile Underwater Sensor
Networks
Parallel And
Distributed Systems
36. Privacy Preserving Data Sharing With Anonymous Id Assignment
Information Forensics
And Security
37.
Reversible Data Hiding In Encrypted Images By Reserving Room Before
Encryption
Information Forensics
And Security
38. SPREAD- Improving Network Security By Multipath Networking
39.
SeDas- A Self Destructing Data System Based On Active Storage
Framework

More Related Content

DOC
Ieee 2014 dot net projects list
DOC
Ieee 2013 java projects list
DOC
Ieee java projects list
DOC
Ieee 2014 java projects list
DOC
Novel secure communication protocol basepaper
DOC
Java IEEE 2013 Projects list
PDF
Dotnet ieee 2014 projects
DOC
Java IEEE Projects 2012-2011-2010
Ieee 2014 dot net projects list
Ieee 2013 java projects list
Ieee java projects list
Ieee 2014 java projects list
Novel secure communication protocol basepaper
Java IEEE 2013 Projects list
Dotnet ieee 2014 projects
Java IEEE Projects 2012-2011-2010

What's hot (11)

PDF
2015 ieee projects in bangalore
DOCX
Final year ieee Dot net project titles 2013 2014
PDF
2015 and 2016 IEEE Projects for Cloud Computing
PDF
2015 and 2016 ieee projects
DOC
Dotnet application-non-ieee
DOC
Ieee 2012 dot net projects list
DOCX
CREC List.docx
DOC
Projecttitles 2013
PDF
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
DOC
Ieee 2014 completd dotnet java projects
DOCX
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
2015 ieee projects in bangalore
Final year ieee Dot net project titles 2013 2014
2015 and 2016 IEEE Projects for Cloud Computing
2015 and 2016 ieee projects
Dotnet application-non-ieee
Ieee 2012 dot net projects list
CREC List.docx
Projecttitles 2013
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
Ieee 2014 completd dotnet java projects
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ad

Viewers also liked (16)

DOC
Energy maps for mobile wireless networks coherence time versues spreding peri...
DOC
Distributed collaborative key agreement and authentication protocols for dyna...
DOC
Implementation of bpsc stegnography ( synopsis)
DOC
Ocgrr a new scheduling algorithm for differentiated services networks(synop...
DOC
Evaluating the vulnerability of network traffic using joint security and rout...
DOC
Application of bpcs steganography to wavelet compressed video (synopsis)
DOC
Implementation of bpcs steganography (synopsis)
DOC
Non ieee java projects list
DOC
Layered approach using conditional random fields for intrusion detection (syn...
DOC
Data leakage detection (synopsis)
DOC
Controlling ip spoofing through inter domain packet filters(synopsis)
PPTX
Java tutorial part 3
PPTX
Hibernate tutorial
PDF
Java web programming
DOC
Predictive job scheduling in a connection limited system using parallel genet...
Energy maps for mobile wireless networks coherence time versues spreding peri...
Distributed collaborative key agreement and authentication protocols for dyna...
Implementation of bpsc stegnography ( synopsis)
Ocgrr a new scheduling algorithm for differentiated services networks(synop...
Evaluating the vulnerability of network traffic using joint security and rout...
Application of bpcs steganography to wavelet compressed video (synopsis)
Implementation of bpcs steganography (synopsis)
Non ieee java projects list
Layered approach using conditional random fields for intrusion detection (syn...
Data leakage detection (synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)
Java tutorial part 3
Hibernate tutorial
Java web programming
Predictive job scheduling in a connection limited system using parallel genet...
Ad

Similar to Ieee 2013 dot net projects list (20)

PDF
cse projects,Dot net ieee projects 2015,green corner tech,nellore
DOCX
2013 and 2014 ieee projects list
PDF
CSE Dot net ieee projects 2015.Nellore
PDF
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
DOCX
2013 2014 ieee project titles
DOCX
2013 2014 bulk ieee projects
DOCX
IEEE project titles 2014 for CSE
PDF
Bulk ieee projects | bulk ieee projects in pondicherry
PDF
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
PDF
Online ieee projects | 2015 online ieee projects
DOCX
CREC List.docx
DOCX
CREC List.docx
DOCX
2014 and 2015 Java,Android,Dotnet ieee projects list @TMKS Infotech
DOCX
2014 and 2015 ieee projects list in Karnataka @ Bangalore
DOCX
2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
2014 and 2015 ieee projects list in Bangalore
DOC
Global tech project list
DOCX
Android,2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
Mobile Computing,2014 and 2015 ieee projects @ TMKS Infotech
cse projects,Dot net ieee projects 2015,green corner tech,nellore
2013 and 2014 ieee projects list
CSE Dot net ieee projects 2015.Nellore
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
2013 2014 ieee project titles
2013 2014 bulk ieee projects
IEEE project titles 2014 for CSE
Bulk ieee projects | bulk ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Online ieee projects | 2015 online ieee projects
CREC List.docx
CREC List.docx
2014 and 2015 Java,Android,Dotnet ieee projects list @TMKS Infotech
2014 and 2015 ieee projects list in Karnataka @ Bangalore
2014 and 2015 ieee projects list @ TMKS Infotech
2014 and 2015 ieee projects list in Bangalore
Global tech project list
Android,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Mobile Computing,2014 and 2015 ieee projects @ TMKS Infotech

More from Mumbai Academisc (18)

DOC
Non ieee dot net projects list
PPT
Spring ppt
PDF
Ejb notes
PDF
Java programming-examples
DOCX
J2ee project lists:-Mumbai Academics
PPT
Web based development
PPTX
Java tutorial part 4
PPTX
Java tutorial part 2
PDF
Engineering
TXT
Project list
DOC
Personal authentication using 3 d finger geometry (synopsis)
DOC
Performance of a speculative transmission scheme for scheduling latency reduc...
DOC
Online index recommendations for high dimensional databases using query workl...
DOC
Online handwritten script recognition (synopsis)
DOC
One to many distribution using recursive unicast trees(synopsis)
DOC
Odam an optimized distributed association rule mining algorithm (synopsis)
Non ieee dot net projects list
Spring ppt
Ejb notes
Java programming-examples
J2ee project lists:-Mumbai Academics
Web based development
Java tutorial part 4
Java tutorial part 2
Engineering
Project list
Personal authentication using 3 d finger geometry (synopsis)
Performance of a speculative transmission scheme for scheduling latency reduc...
Online index recommendations for high dimensional databases using query workl...
Online handwritten script recognition (synopsis)
One to many distribution using recursive unicast trees(synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)

Recently uploaded (20)

PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Trump Administration's workforce development strategy
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Supply Chain Operations Speaking Notes -ICLT Program
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Computing-Curriculum for Schools in Ghana
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Yogi Goddess Pres Conference Studio Updates
LDMMIA Reiki Yoga Finals Review Spring Summer
Trump Administration's workforce development strategy
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
2.FourierTransform-ShortQuestionswithAnswers.pdf
Classroom Observation Tools for Teachers
History, Philosophy and sociology of education (1).pptx
Microbial diseases, their pathogenesis and prophylaxis
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Supply Chain Operations Speaking Notes -ICLT Program
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Computing-Curriculum for Schools in Ghana
Microbial disease of the cardiovascular and lymphatic systems
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Yogi Goddess Pres Conference Studio Updates

Ieee 2013 dot net projects list

  • 1. IEEE DOTNET PROJECTS TITLES YEAR--2013 PROJECT TITLE DOMAIN 1. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing Information Security
  • 2. 2. A Privacy Leakage Upper Bound Constraint-Based Approach For Cost- Effective Privacy Preserving Of Intermediate Data Sets In Cloud Cloud Computing 3. Enabling Dynamic Data And Indirect Mutual Trust For Cloud Computing Storage Systems Cloud Computing 4. Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud Cloud Computing
  • 3. 5. Cam: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Cloud Computing 6. Privacy-Preserving Public Auditing For Secure Cloud Storage Cloud Computing 7. Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute-Based Encryption Cloud Computing
  • 4. 8. Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis For Production Cloud Computing Systems Cloud Computing 9. Privacy Preserving Delegated Access Control In Public Clouds Cloud Computing 10. Attribute-Based Access To Scalable Media In Cloud-Assisted Content Sharing Networks Cloud Computing
  • 5. 11. Cloudftp: A Case Study Of Migrating Traditional Applications To The Cloud Cloud Computing 12. Beyond Text Qa: Multimedia Answer Generation By Harvesting Web Information Multimedia 13. Evolution Of Social Networks Based On Tagging Practices Service Computing (Web Service)
  • 6. 14. A Survey Of Xml Tree Patterns Data Mining 15. Dynamic Personalized Recommendation On Sparse Data Data Mining 16. A Proxy-Based Approach To Continuous Location-Based Spatial Queries In Mobile Environments Data Mining
  • 7. 17. Supporting Search-As-You-Type Using Sql In Databases Data Mining 18. Secure Mining Of Association Rules In Horizontally Distributed Databases Data Mining 19. Eaack—A Secure Intrusion-Detection System For Manets Secure Computing
  • 8. 20. Sort: A Self-Organizing Trust Model For Peer-To-Peer Systems Secure Computing 21. Localization Of Wireless Sensor Networks In The Wild: Pursuit Of Ranging Quality Networking 22. Resource Allocation For Qos Support In Wireless Mesh Networks Networking
  • 9. 23. A Secure Payment Scheme With Low Communication And Processing Overhead For Multihop Wireless Networks Parallel & Distributed Systems 24. Multicast Capacity In Manet With Infrastructure Support Parallel & Distributed Systems 25. Spoc: A Secure And Privacy-Preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency Parallel & Distributed Systems
  • 10. 26. Detection And Localization Of Multiple Spoofing Attackers In Wireless Networks Parallel & Distributed Systems 27. Adaptive Position Update For Geographic Routing In Mobile Ad Hoc Networks Mobile Computing 28. Emap: Expedite Message Authentication Protocol For Vehicular Ad Hoc Networks Mobile Computing
  • 11. 29. Network-Assisted Mobile Computing With Optimal Uplink Query Processing Mobile Computing 30. Target Tracking And Mobile Sensor Navigation In Wireless Sensor Networks Mobile Computing 31. Toward Accurate Mobile Sensor Network Localization In Noisy Environments Mobile Computing
  • 12. 32. Reversible Data Hiding With Optimal Value Transfer Image Processing 33. Reversible Watermarking Based On Invariant Image Classification And Dynamic Histogram Shifting Image Processing 34. Local Directional Number Pattern For Face Analysis: Face And Expression Recognition Image Processing
  • 13. 35. Mobi-Sync: Efficient Time Synchronization For Mobile Underwater Sensor Networks Parallel And Distributed Systems 36. Privacy Preserving Data Sharing With Anonymous Id Assignment Information Forensics And Security 37. Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption Information Forensics And Security
  • 14. 38. SPREAD- Improving Network Security By Multipath Networking 39. SeDas- A Self Destructing Data System Based On Active Storage Framework