You are on page 1of 18

Projects for You

IEEE 2012-2013
ME/ M-TECH CSE Projects

www.projectsforyou.co.in

IEEE Projects (2012-13)

Code

Title

Tech

Domain

PFYBP 1

Cloud Computing Security: From Single to Multi-Clouds

JAVA

Cloud Computing

PFYBP 2

Cloud Data Protection for the Masses

JAVA

Cloud Computing

PFYBP 3

Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud


Storage

JAVA

Cloud Computing

PFYBP 4

Costing of Cloud Computing Services A Total Cost of Ownership Approach

JAVA

Cloud Computing

PFYBP 5

Efficient audit service outsourcing for data integrity in clouds

DOTNET

Cloud Computing

PFYBP 6

Fog Computing Mitigating Insider Data Theft Attacks in the Cloud

JAVA

Cloud Computing

PFYBP 7

Gossip-based Resource Management for Cloud Environments

JAVA

Cloud Computing

PFYBP 8

Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing

DOTNET

Cloud Computing

PFYBP 9

Ensuring Distributed Accountability for Data Sharing in the Cloud

JAVA

Cloud Computing

PFYBP 10

Reliable Re-Encryption In Unreliable Clouds

JAVA

Cloud Computing

PFYBP 11

Scalable and Secure Sharing of Personal Health Records in Cloud Computing


using Attribute-based Encryption

DOTNET

Cloud Computing

2|P ag e

IEEE Projects (2012-13)

PFYBP 12

Preserving Integrity of Data and Public Auditing for Data Storage in Cloud
Computing

DOTNET

Cloud Computing

PFYBP 13

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud
Data

DOTNET

Cloud Computing

PFYBP 14

Towards Secure and Dependable Storage Services in Cloud Computing

DOTNET

Cloud Computing

PFYBP 15

Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor


Networks

DOTNET

Image Processing

PFYBP 16

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY


USING PERSUASIVE CLICK POINTS

DOTNET

Image Processing

PFYBP 17

Exploring The Design Space Of Social Network-Based Sybil Defenses

DOTNET

Image Processing

PFYBP 18

Separable Reversible Data Hiding in Encrypted Image

DOTNET

Image Processing

PFYBP 19

Intent Search Capturing User Intention For One Click Internet Image Search

DOTNET

Image Processing

PFYBP 20

Robust Face-Name Graph Matching for Movie Character Identify

DOTNET

Image Processing

PFYBP 21

Robust Watermarking Of Compressed And Encrypted Jpeg2000 Images

DOTNET

Image Processing

PFYBP 22

Semi Supervised Biased Maximum Margin Analysis for Interactive Image


Retrieval

DOTNET

Image Processing

PFYBP 23

User Aware Image Tag Refinement Via Ternary Semantic Analysis

DOTNET

Image Processing

3|P ag e

IEEE Projects (2012-13)

PFYBP 24

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Adhoc Network

JAVA

International
Conference

PFYBP 25

Association Rule -- Extracting Knowledge Using Market Basket Analysis

DOTNET

International
Conference

PFYBP 26

Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless


Sensor Networks

DOTNET

International
Conference

PFYBP 27

Hiding Sensitive Association Rule For Privacy Preservation

DOTNET

International
Conference

PFYBP 28

Efficient load balancing and QoS-based location aware service discovery


protocol for vehicular ad hoc networks

DOTNET

International
Conference

PFYBP 29

Movie Rating and Review Summarization in Mobile Environment

JAVA

International
Conference

PFYBP 30

Intrusion Detection SystPFYBP as a Service in Public Clouds

JAVA

International
Conference

PFYBP 31

DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage


Systems.

JAVA

International
Conference

PFYBP 32

Detecting and Validating Sybil Groups in the Wild

DOTNET

International
Conference

PFYBP 33

A Query Formulation Language for the data web

DOTNET

Knowledge & Data


Engineering (DATA

4|P ag e

IEEE Projects (2012-13)


MINING)

PFYBP 34

Advance Mining Of Temporal High Utility Item BP set

PFYBP 35

An Exploration Of Improving Collaborative Recommender System BP Via UserItem BP Subgroups

PFYBP 36

PFYBP 37

Anomaly Detection For Discrete Sequences A Survey

Automatic Discovery of Association Orders between Name and Aliases

JAVA

Knowledge & Data


Engineering (DATA
MINING)

JAVA

Knowledge & Data


Engineering (DATA
MINING)

JAVA

Knowledge & Data


Engineering (DATA
MINING)

JAVA

Knowledge & Data


Engineering (DATA
MINING)

PFYBP 38

Bridging Social and Data Networks

DOTNET

PFYBP 39

Confucius A Tool Supporting Collaborative Scientific Workflow Composition

JAVA

PFYBP 40

Effective Pattern Discovery For Text Mining

JAVA

PFYBP 41

Efficient and Accurate Discovery of Patterns in Sequence Data Sets

DOTNET

5|P ag e

Knowledge & Data


Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data

IEEE Projects (2012-13)

PFYBP 42

A Framework for Personal Mobile Commerce Pattern Mining and Prediction

JAVA

PFYBP 43

Efficient Anonymous Message Submission

JAVA

PFYBP 44

Efficient Computation of Range Aggregates against Uncertain Location Based


Queries

JAVA

PFYBP 45

Efficient Extended Boolean Retrieval

JAVA

PFYBP 46

Efficient Similarity Search Over Encrypted Data

JAVA

PFYBP 47

Enabling Multilevel Trust In Privacy Preserving Data Mining

JAVA

PFYBP 48

Fast and accurate annotation of short texts with Wikipedia

JAVA

PFYBP 49

Identifying Content for Planned Events Across Social Media Sites

DOTNET

PFYBP 50

Investigation And Analysis Is Of New Approach Of Intelligent Semantic Web


Search Engines

JAVA

6|P ag e

Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)

IEEE Projects (2012-13)


PFYBP 51

Multiparty Access Control for Online Social Networks Model and Mechanisms

JAVA

PFYBP 52

On the Spectral Characterization and Scalable Mining of Network Communities

JAVA

PFYBP 53

Organizing User Search Histories

JAVA

PFYBP 54

Outsourced Similarity Search on Metric Data Assets

DOTNET

PFYBP 55

Mining Web Graphs for Recommendations

DOTNET

PFYBP 56

Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering

DOTNET

PFYBP 57

Joint Top-K Spatial Keyword Query Processing

DOTNET

PFYBP 58

Query Planning for Continuous Aggregation Queries over a Network of Data


Aggregators

DOTNET

PFYBP 59

Ranking Model Adaptation for Domain-Specific Search

JAVA

PFYBP 60

Improving Aggregate Recommendation Diversity Using Ranking-Based


Techniques

DOTNET

7|P ag e

Knowledge & Data


Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)

IEEE Projects (2012-13)


PFYBP 61

Altered Fingerprints: Analysis and Detection

DOTNET

PFYBP 62

Generative Models for Item Adoptions Using Social Correlation

DOTNET

PFYBP 63

Scalable Learning of Collective Behavior

DOTNET

PFYBP 64

Scalable Scheduling Of Updates In Streaming Data Warehouses

DOTNET

PFYBP 65

Sequential Anomaly Detection In The Presence Of Noise And Limited Feedback

JAVA

PFYBP 66

Slicing A New Approach to Privacy Preserving Data Publishing

JAVA

PFYBP 67

Statistical Entity Extraction from Web

JAVA

PFYBP 68
PFYBP 69
PFYBP 70

Cooperative download in vehicular environments


Hop-By-Hop Routing In Wireless Mesh Networks With Bandwidth Guarantees
Fast Data Collection in Tree-Based Wireless Sensor Networks
Local Broadcast Algorithms In Wireless Ad Hoc Networks Reducing The Number
Of Transmissions
Network Assisted Mobile Computing with Optimal Uplink Query Processing
Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
Learn to Personalized Image Search from the Photo Sharing Websites

DOTNET
DOTNET
JAVA

Knowledge & Data


Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Knowledge & Data
Engineering (DATA
MINING)
Mobile Computing
Mobile Computing
Mobile Computing

DOTNET

Mobile Computing

DOTNET
JAVA
JAVA

Mobile Computing
Mobile Computing
Multimedia

PFYBP 71
PFYBP 72
PFYBP 73
PFYBP 74
8|P ag e

IEEE Projects (2012-13)


PFYBP 75
PFYBP 76
PFYBP 77
PFYBP 78
PFYBP 79

JAVA
DOTNET
JAVA
JAVA
DOTNET

Multimedia
Networking
Networking
Networking
Networking

DOTNET

Networking

PFYBP 81
PFYBP 82
PFYBP 83
PFYBP 84
PFYBP 85
PFYBP 86
PFYBP 87

Trust modeling in social tagging of multimedia content


A New Cell-Counting-Based Attack Against Tor
An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
Game-Theoretic Pricing for Video Streaming in Mobile Networks
Load Balancing Multipath Switching SystPFYBP with Flow Slice
Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks Theory
and Algorithms
Assessing the Veracity of Identity Assertions via OSNs
Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
Policy-by-Example for Online Social Networks
Privacy- and Integrity-Preserving Range Queries in Sensor Networks
Security Architecture for Cloud Networking
View-invariant action recognition based on Artificial
Packet Loss Control Using Tokens at the Network Edge

DOTNET
JAVA
JAVA
JAVA
JAVA
DOTNET
JAVA

PFYBP 88

A Novel Anti-phishing Framework Based On Visual Cryptography

DOTNET

PFYBP 89

Balancing the Tradeoffs between Query Delay and Data Availability in MANETs

DOTNET

PFYBP 90

BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering


Injected False Data in Wireless Sensor Networks

DOTNET

PFYBP 91

In Cloud, Can Scientific Communities Benefit from the Economies of Scale?

DOTNET

PFYBP 92

Resource-Aware Application State Monitoring

DOTNET

Networking
Networking
Networking
Networking
Networking
Networking
Networking
Parallel and
Distributed Systems
Parallel and
Distributed Systems
Parallel and
Distributed Systems
Parallel and
Distributed Systems
Parallel and
Distributed Systems
Parallel and
Distributed Systems
Secured Computing
Secured Computing
Secured Computing

PFYBP 80

PFYBP 93
PFYBP 94
PFYBP 95
PFYBP 96
9|P ag e

SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for


Mobile-Healthcare Emergency
Automatic Reconfiguration for Large-Scale Reliable Storage Systems
Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs
A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group

DOTNET
DOTNET
DOTNET
DOTNET

IEEE Projects (2012-13)


PFYBP 97

10 | P a g e

Fade Secure Title Overlay Cloud Storage With File Assured Deletion

JAVA

Secured Computing

IEEE Projects (2012-13)


PFYBP 98
PFYBP 99
PFYBP 100
PFYBP 101
PFYBP 102
PFYBP 103
PFYBP 104
PFYBP 105
PFYBP 106
PFYBP 107

Fast Matrix Embedding by Matrix Extending


Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
Recommendation Models for Open Authorization
Online Modeling of Proactive Moderation SystPFYBP for Auction Fraud Detection
Double Guard: Detecting Intrusions In Multi-tier Web Applications
Packet-Hiding Methods for Preventing Selective Jamming Attacks
Persuasive Cued Click-Points Design, Implementation And Evaluation
Remote Attestation With Domain -Based Integrity Model And Privacy Analysis
Risk-Aware Mitigation for MANET Routing Attacks
Secured Trust: A Dynamic Trust Computation Model for Secured Communication in
Multi-Agent Systems.

DOTNET
DOTNET
DOTNET
DOTNET
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA

Secured Computing
Secured Computing
Secured Computing
Secured Computing
Secured Computing
Secured Computing
Secured Computing
Secured Computing
Secured Computing
Secured Computing

JAVA

Secured Computing

PFYBP 109

Expert Discovery and Interactions in Mixed Service-Oriented Systems

DOTNET

PFYBP 110

Query Access Assurance in Outsourced Databases

DOTNET

PFYBP 111

Dynamic Authentication for Cross-Realm SOA-Based Business Processes

DOTNET

PFYBP 112
PFYBP 113

PerLa a Language and Middleware Architecture


Measuring Code Quality to Improve Specification Mining
AMPLE An Adaptive Traffic Engineering SystPFYBP Based on Virtual Routing
Topologies

JAVA
DOTNET

PFYBP 115

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

JAVA

PFYBP 116

Cooperative Data Dissemination via Roadside WLANs

DOTNET

PFYBP 117

Cut Detection in Wireless Sensor Networks

JAVA

PFYBP 118

Topology Control in Mobile Ad Hoc Networks with Cooperative Communications

DOTNET

PFYBP 108

PFYBP 114

11 | P a g e

DOTNET

Service
Computing(SOA)
Service
Computing(SOA)
Service
Computing(SOA)
Software Engineering
Software Engineering
Wireless
Communications
Wireless
Communications
Wireless
Communications
Wireless
Communications
Wireless Comm.

IEEE Projects (2012-13)


PFYWY 1

Reliable Re-Encryption in Unreliable Clouds`

Java

Cloud Computing

PFYWY 2

Costing of Cloud Computing Services: A Total Cost of Ownership Approach

Java

Cloud Computing

PFYWY 3

Ensuring Distributed Accountability for Data Sharing in the Cloud

Java

Cloud Computing

PFYWY 4

Cloud Data Production for Masses

Java

Cloud Computing

PFYWY 5

A secure erasure code based cloud storage system with secure data forwarding

Java

Secure Computing

PFYWY 6

Policy-by-Example for Online Social Networks

Java

Networking

PFYWY 7

Packet-Hiding Methods for Preventing Selective Jamming Attacks

Java

Secure Computing

PFYWY 8

FADE: Secure Overlay Cloud Storage with File Assured Deletion

Java

Secure Computing

PFYWY 9

Risk-Aware Mitigation for MANET Routing Attacks

Java

Secure Computing

PFYWY 10

Learn to Personalized Image Search from the Photo Sharing Websites

Java

Multimedia

PFYWY 11

Organizing User Search Histories

Java

Knowledge and Data


Engineering

PFYWY 12

Slicing A New Approach to Privacy Preserving+C39Data Publishing

Java

Knowledge and Data


Engineering

12 | P a g e

IEEE Projects (2012-13)


PFYWY 13

Ranking Model Adaptation FOR DOMAIN-SPECIFIC SEARCH

Java

Knowledge and Data


Engineering

PFYWY 14

Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud

Java

Parallel and
Distributed Systems

PFYWY 15

Trust modeling in social tagging of multimedia content

Java

Multimedia

PFYWY 16

RIHT: A novel hybrid IP trace back scheme

Java

Multimedia

PFYWY 17

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

Java

Wireless
Communications

PFYWY 18

Cut Detection in Wireless Sensor Networks

Java

Wireless
Communications

PFYWY 19

Automatic Discovery of Association Orders between Name and Aliases from the
Web using Anchor Texts-based Co-occurrences

Java

International
Conference (science)

PFYWY 20

Efficient Computation of Range Aggregates against Uncertain Location Based


Queries

Java

International
Conference

PFYWY 21

Statistical Entity Extraction from Web

Java

International
Conference

PFYWY 22

Efficient Similarity Search over Encrypted Data

Java

International
Conference (science)

PFYWY 23

Scalable and cost-effective interconnection of data-center servers using dual server


ports

Java

Networking

PFYWY 24

Caching Strategies Based on Information Density Estimation in Wireless Adhoc

Java

Networking

13 | P a g e

IEEE Projects (2012-13)


Networks

PFYWY 25

Modeling and Detection of Camouflaging Worm

Java

Networking

PFYWY 26

Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks

Java

Networking

PFYWY 27

Clustering with Multi-Viewpoint based Similarity Measure

Java

Networking

PFYWY 28

Sketch4Match Content-based Image Retrieval system using sketches

Java

Image Processing

PFYWY 29

Embedded Extended Visual Cryptography Schemes

Java

Secure Computing

PFYWY 30

Competitive Study of Cryptography techniques over block Cipher

Java

Secure Computing

PFYWY 31

Temporal Data Clustering via Weighted Clustering Ensemble with Different


Representations

Java

Knowledge and Data


Engineering

PFYWY 32

Architecting a secure enterprise data sharing Environment to the edge

Java

Secure Computing

PFYWY 33

Analysis on Credit Card Fraud Detection Methods

Java

Secure Computing

PFYWY 34

Subspace-Based Striping Noise Reduction in Hyper spectral Images

Java

Image Processing

PFYWY 35

Intrusion detection An Energy efficient approach in Heterogeneous WSN

Java

Secure Computing

14 | P a g e

IEEE Projects (2012-13)


PFYWY 36

Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast


Service

Java

Networking

PFYWY 37

Geographical Routing With Location Service in Intermittently Connected MANETs

Java

Networking

PFYWY 38

Resource Management Using Dynamical Load Prediction and Multiprocessor


Cooperation

Java

Networking

PFYWY 39

On the Information Flow Required for Tracking Control in Networks of Mobile


Sensing Agents

Java

Networking

PFYWY 40

Mobile Sampling of Sensor Field Data Using Controlled Broadcast

Java

Networking

PFYWY 41

Secure Communications Over Wireless Broadcast Networks: Stability and Utility


Maximization

Java

Networking

PFYWY 42

Enabling Public Audit ability and Data Dynamics for Storage Security in Cloud
Computing

Java

Cloud Computing

PFYWY 43

A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh


Networks

Java

Networking

PFYWY 44

Robust Face-Name Graph Matching for Movie Character Identification

Dot Net

Multimedia

PFYWY 45

A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding

Dot Net

Cloud Computing

PFYWY 46

Topology Control in Mobile Ad Hoc Networks with Cooperative Communications

Dot Net

Wireless
Communications

15 | P a g e

IEEE Projects (2012-13)


PFYWY 47

AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

Dot Net

Wireless
Communications

PFYWY 48

Efficient Audit Service Outsourcing for Data Integrity in Clouds

Dot Net

Cloud Computing

PFYWY 49

View-invariant action recognition based on Artificial Neural Networks

Dot Net

Neural Networks

PFYWY 50

Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor


Networks

Dot Net

Image Processing

PFYWY 51

Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing

Dot Net

Cloud Computing

PFYWY 52

Scalable Scheduling of Updates in Streaming Data Warehouses

Dot Net

Knowledge and Data


Engineering (DM)

PFYWY 53

Efficient and Discovery of Patterns in Sequence Data Sets

Dot Net

Knowledge and Data


Engineering (DM)

PFYWY 54

Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and


Algorithms.

Dot Net

Networking

PFYWY 55

Investigation and Analysis of New Approach of Intelligent Semantic Web Search


engines.

Dot Net

Parallel and
Distributed Systems

PFYWY 56

Data Integrity Proofs In Cloud Storage

Dot Net

Cloud Computing

PFYWY 57

A Personalized Ontology Model For Web Information Gathering

Dot Net

Data Mining

16 | P a g e

IEEE Projects (2012-13)


PFYWY 58

A Query Formulation Language for the Data Web

Dot Net

Data Mining

PFYWY 59

A Web Search Engine Based Approach to Measure Semantic Similarity Between


Words

Dot Net

Data Mining

PFYWY 60

Adaptive Provisioning Of Human Expertise In Service-Oriented Systems

Dot Net

Data Mining

PFYWY 61

Efficient Multi-dimensional Fuzzy Search for Personal Information Management


Systems

Dot Net

Data Mining

PFYWY 62

Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The
Cloud

Dot Net

Data Mining

PFYWY 63

Exploring Application-Level Semantics For Data Compression

Dot Net

Data Mining

PFYWY 64

Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques

Dot Net

Data Mining

PFYWY 65

One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web
Databases

Dot Net

Data Mining

PFYWY 66

Optimal Service Pricing For A Cloud Cache

Dot Net

Data Mining

PFYWY 67

Publishing Search Logs A Comparative Study Of Privacy Guarantees

Dot Net

Data Mining

PFYWY 68

Fuzzy-Zoning-Based Classification for Handwritten Characters

Dot Net

Fuzzy Systems

17 | P a g e

IEEE Projects (2012-13)


PFYWY 69

Adaptive Spectral Transform for Wavelet-Based Color Image Compression

Dot Net

Image Processing

PFYWY 70

Blind Image Watermarking Using a Sample Projection Approach

Dot Net

Information
forensics And
Security

PFYWY 71

Histogram Specification: A Fast and Flexible Method to Process Digital Images

Dot Net

Instrumentation And
Measurement

PFYWY 72

Mining Web Graphs for Recommendations

Dot Net

Knowledge And Data


Engineering

PFYWY 73

Query Planning for Continuous Aggregation Queries over a Network of Data


Aggregators

Dot Net

Knowledge And Data


Engineering

PFYWY 74

Scalable Learning of Collective Behavior

Dot Net

Knowledge And Data


Engineering

PFYWY 75

Bridging Socially-Enhanced Virtual Communities

Dot Net

Networking

PFYWY 76

Unified Approach To Optimizing Performance in Networks Serving Heterogeneous


Flows

Dot Net

Networking

PFYWY 77

A More Secure Steganography Method in Spatial Domain

Dot Net

Secure Computing

PFYWY 78

NABS Novel Approaches for Biometric Systems

Dot Net

Secure Computing

18 | P a g e

You might also like