Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
research topics in computer science and engineering
#1

1. Flow Aware Differential Delay Routing for next-generation Ethernet over SONET/SDH
2. Attack on a Higher-Order Masking of the AES Based on Homographic Functions
3. Multi Merge and Split Buffer Management Scheme for Video-on-Demand Systems
4. A Program Generator for Intel AES-NI Instructions
5. Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks
6. The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
7. Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity
8. Speeding up Web Access using Weighted Association Rules
9. Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface
10. Greedy Distinguishers and Nonrandomness Detectors
11. One Byte per Clock: A Novel RC4 Hardware
12. Cryptanalysis of Tav-128 Hash function
13. Video Placement and Disk Load Balancing Algorithm for VoD Proxy Server
14. An Universal Assessment Methodology for Evaluating Students' and Teachers' Performance in an Academic Institute
15. Impossible Differential Cryptanalysis of AES-128
16. ECC2K-130 on NVIDIA GPUs
17. Weighted Intra-Transactional Rule Mining for Database Intrusion Detection
18. New Boomerang Attacks on ARIA
19. A New Approach For Anonymous Publication in P2P File Sharing Applications
20. Random Euclidean Addition Chain Generation and Its Apllication to Point Multiplication
21. CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key
22. FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages
23. Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
24. Partial Key Exposure Attack on RSA -- Improvements for Limited Lattice Dimensions
25. Indifferentiability Beyond the Birthday Bound for the Xor of Two Public Random Permutations
26. Cryptanalysis of a Perturbated White-Box AES Implementation
27. Combined Security Analysis of the One- and Three-pass Unified Model Key Agreement Protocols
28. A System For Automatic Evaluation Of Programs For Correctness And Peroformance
29. A Security Auditing Framework for an Enterprise LAN
30. Design And Implementation Of An Automatic Program Evaluation System
31. The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants
32. Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3
33. Speeding Up The Wide-pipe: Secure and Fast Hashing
34. User Model to Design Adaptable Interfaces for Motor-Impaired Users
Reply

#2
to get information about the topic "research topics in computer science and engineering" full report refer the page link bellow

http://seminarsprojects.net/Thread-proje...ngineering
Reply

#3

i want to get a literature topic for seminar
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.