B.TECH DOT NET PROJECTS LIST DOMAIN 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 1 2 3 4 5 6 7 8 9 NETWORKING Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks Network Traffic Classification Using Correlation Information A Data Fusion Technique for Wireless Ranging Performance Improvement EAACK—A Secure Intrusion-Detection System for MANETs A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Efficient Algorithms for Neighbor Discovery in Wireless Networks FairTorrent: A Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems Measu-Routing: A Framework for Routing Assisted Traffic Monitoring Measuring Multipath Routing in the Internet IEEE Design and implementation of TARF: a trust aware routing framework for wsns An Authentication Code Against Pollution Attacks in Network Coding AMPLE: An adaptive traffic engineering system based on virtual routing topologies Providing end to end secure communications in wireless sensor networks Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks Jamming-Aware Traffic Allocation for Multiple- Path Routing Using Portfolio Selection DATAMINING Dynamic query forms for database queries Automatic extraction of top-k lists from the web Sampling online social network Secure Mining of Association Rules in Horizontally Distributed Databases SUSIE Search using services and information extraction Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis Scalable Learning of Collective behavior Data leakage detection A Survey of Indexing Techniques for Scalable Record Linkage and De duplication IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE 10 Organizing user search histories 11 One Size Does Not Fit All: Towards User-and Query-Dependent Ranking For Web Databases IEEE IEEE MOBILE COMPITING 1 2 3 4 Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes Trust Based Optimal Routing in MANET’S Topology control in mobile ad-hoc networks with cooperative communications Continuous Neighbor Discovery in Asynchronous Sensor Networks CLOUD COMPUTING Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability Exploiting Service Similarity for Privacy in Location Based Search Queries privacy preserving multi keyword ranked search over encrypted cloud data Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption 5 Data integrity and data dynamics with secure storage service in cloud 6 Privacy-Preserving Public Auditing for Secure Cloud Storage 7 Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 8 Load Rebalancing for Distributed File Systems in Clouds 9 Cloud data production for masses 10 Efficient similarity search over encrypted data 11 Efficient audit service outsourcing for data integrity in clouds 12 Towards Secure and Dependable Storage Services in Cloud Computing 1 2 3 4 IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE Address: Download Abstracts & Base Papers from Web site: www.kresttechnology.com Head Office: 2nd Floor Solitaire Plaza, Beside Image Hospital, Ameerpet.040-44433434, 9885112363 Branches: Dilsukhnagar, Ph: 9000404181, Vijayawada, Ph: 9000404182.