logo

Java Secure Computing Computing Project Titles - 2014

    1. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
    2. Human Effects of Enhanced Privacy Management Models
    3. Keyless Authentication in a Noisy Model
    4. Secure Ordered Bucketization
    5. Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack

Get More