IEEE NETWORK SECURITY AND CRYPTOGRAPHY PROJECT TITLES(FINAL PROJECTS 2030) New Key Management Approach for Broadcast and Multicast Services, IEEE Communications Letters, Feb 2011[Java] Towards Situational Awareness of Large-Scale Botnet Probing Events, IEEE Transactions on Information Forensics and Security, March 2011[Java] A Privacy-Preserving Buyer Seller Watermarking Protocol Based on Priced Oblivious Transfer, IEEE Transactions on Information Forensics and Security, March 2011[Java] A Robust and Fast Video Copy Detection System Using Content- Based Fingerprinting, IEEE Transactions on Information Forensics and Security, March 2011[Java] Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure, IEEE Transactions on Mobile Computing, August On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, August 2011[NS2]
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing, IEEE Transactions on Mobile Computing, June A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks, IEEE Transactions on Dependable and Secure Computing, April Secure and Practical Outsourcing of Linear Programming in Cloud Computing, IEEE INFOCOM, April 2011[Java] Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE Transactions on Mobile Computing, May 2011[NS2] Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients, IEEE Transactions on Mobile Computing, Feb Secure Multihop Network Programming with Multiple One-Way Key Chains, IEEE Transactions on Mobile Computing, Jan A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks, IEEE Transactions on Mobile Computing, Jan
On the Price of Security in Large-Scale Wireless Ad Hoc Networks, IEEE/ACM Transactions on Networking, April Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks, IEEE Transactions on Network and Service Management, June 2011 [Java/NS2] On the Impact of Security Protocols on the Performance of SNMP, IEEE Transactions on Network and Service Management, June 2011[Java] Mechanism Design-Based Secure Leader Election Model Intrusion Detection in MANET, IEEE Transactions on Dependable and Secure Computing, Feb 2011[NS2] Modeling and Detection of Camouflaging Worm, IEEE Transactions on Dependable and Secure Computing, June A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, Aug 2011[Java] Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Transactions on Parallel and Distributed Systems, July 2011[Java]
An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, March Comparative Evaluation of Spoofing Defenses, IEEE Transactions on Dependable and Secure Computing, April 2011(NS2) Data Integrity Proofs in Cloud Storage, Third International Conference on Communication Systems and Networks,Jan 2011[Java] Efficient Certificate Revocation List Organization and Distribution, IEEE Journal on Selected Areas in Communications, March 2011[Java] Sybil Attacks Detection in Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, March Privacy in VoIP Networks: Flow Analysis Attacks and Defense, IEEE Transactions on Parallel and Distributed Systems, April 2011[NS2] RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications, IEEE Journal on Selected Areas in Communications, March
Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks, IEEE Communications Letters, April A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks, IEEE Transactions on Computers, July On Ultralightweight RFID Authentication Protocols, IEEE Transactions on Dependable and Secure Computing, Aug 2011[Java] A Policy Enforcing Mechanism for Trusted Ad Hoc Networks, IEEE Transactions on Dependable and Secure Computing, June Blocking Misbehaving Users in Anonymizing Networks, IEEE Transactions on Dependable and Secure Computing, April Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET, IEEE Transactions on Dependable and Secure Computing, Feb 2011[NS2] Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids, IEEE Transactions on Information Technology in Biomedicine, March 2011[Java]
Improving Security and Efficiency in Attribute-Based Data Sharing, IEEE Transactions on Knowledge and Data Engineering, 2011[Java] Resilient Identity Crime Detection, IEEE Transactions on Knowledge and Data Engineering, 2011[Java] Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data, IEEE Transactions on Knowledge and Data Engineering, 2011[Java] Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes, IEEE Transactions on Vehicular Technology, June 2009 (NS2) Vulnerability Discovery with Attack Injection, IEEE Transactions on Software Engineering, May2010 (Java) Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems, IEEE Transactions on Parallel and Distributed Systems, August 2010 (NS2) A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory, IEEE Transactions on Dependable and Secure Computing, March 2010 ( J2EE/.NET) Dynamic rekeying in 3GPP multimedia broadcast/multicast
service (MBMS) IEEE Communications Letters, April 2010 (JAVA) Authenticated Group Key Transfer Protocol Based on Secret Sharing, IEEE Transactions on Computers, June 2010 ( JAVA) An Advanced Hybrid Peer-to-Peer Botnet, IEEE Transactions on Dependable and Secure Computing, June 2010 ( JAVA) Using Web-Referral Architectures to Mitigate Denial-of-Service Threats, IEEE Transactions on Dependable and Secure Computing, June 2010 ( J2EE/.NET) Blind Authentication: A Secure Crypto-Biometric Verification Protocol, IEEE Transactions on Information Forensics and Security, June 2010 ( JAVA) An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, IEEE Transactions on Information Forensics and Security, March 2010 (JAVA ) MABS: Multicast Authentication Based on Batch Signature, IEEE Transactions on Mobile Computing, July 2010 (Java) Provably Secure Steganography, IEEE Transactions on Computers, May 2009 ( Java )
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers, IEEE Transactions on Dependable and Secure Computing, Jan.-March 2009 ( J2EE ) Monitoring the Application-Layer DDoS Attacks for Popular Websites, IEEE/ACM Transactions on Networking, Feb. 2009( J2EE/.NET ) Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET, IEEE Transactions on Dependable and Secure Computing, June 2009 (NS2) A Gen2-Based RFID Authentication Protocol for Security and Privacy, IEEE Transactions on Mobile Computing, Aug. 2009 ( Java ) Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices, IEEE Transactions on Computers, June 2008 ( Java ) An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting, IEEE Transactions on Dependable and Secure Computing, April-June 2008 ( Java ) Controlling IP Spoofing through Interdomain Packet Filters, IEEE Transactions on Dependable and Secure Computing, Jan.- March 2008 ( NS2 )
Credit Card Fraud Detection Using Hidden Markov Model, IEEE Transactions on Dependable and Secure Computing, Jan.- March 2008 (J2EE/.NET) Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, IEEE Transactions on Parallel and Distributed Systems, May 2008( Java ) Keep Passwords Away from Memory: Password Caching and Verification Using TPM, 22nd Int l Conf on Advanced Information Networking and Applications, March 2008( Java ) Agent Based Architecture for Secure Access from Multiple Hospitals, Seventh IEEE/ACIS Intl Conf on Computer and Information Science, May 2008(.NET ) Wallet Based E-Cash System for Secured Multi-hop Cash Exchange, 3rd Int l Conference on Information and Communication Technologies: Theory to Applications, April 2008 ( J2EE ) Intelligent Phishing Website Detection System using Fuzzy Techniques, 3rd Int l Conf on Information and Communication Technologies:Theory to Applications, April 2008( J2EE /.NET) Collaborative Detection of DDoS Attacks over Multiple Network Domains, IEEE Transactions on Parallel and Distributed Systems, Dec. 2007(NS2)
Secure Internet Banking Authentication, IEEE Security and Privacy April 2006(J2EE) A Practical Password-Based Two-Server Authentication and Key Exchange System, IEEE Transactions On Dependable And Secure Computing, June 2006( J2EE )