 
                           
                         | 
 | Name of Student | Title of Paper | Name of Journal / Conference | National/ International | Year of Publication | |
| 1 | Poonam N. Railkar, | “Smartphone-based    Context Aware Proactive System for Profile Translation | In Springer journal of Communications in mobile computing | International | 2013-2014 | |
| 2 | Shinde Jyoti R, | “Double Guard: Detecting Intrusions in Multi-Tier Web Applications,” | Scholarly Research Journal for Interdisciplinary Studies | International | 2013-2014 | |
| 3 | Priyanka N Kamble | “Decision Theory based Auto-delegation (DTA-d) scheme for Ubiquitous Computing,” | International Journal of Computer Applications 79(7):1-6,Foundation of Computer Science, New York, USA. | International | 2013-2014 | |
| 4 | Poonam Railkar, | “Review and Reputation based Trust Score Calculation for WLAN (RRTSC),” | International Journal of Computer    Applications 79(7):1-6, | International | 2013-2014 | |
| 5 | Shruti Utpat, | “Secure authentication protocol for ubiquitous computing,” | International Journal of Computer    Applications 79(7):1-6, | International | 2013-2014 | |
| 6 | G. S. Bhamare, | “Enhancement of Color Image in RGB Space” | International Journal of Engineering Research & Technology (IJERT)2014 | International | 2013-2014 | |
| 7 | Vaibhav Bharati | “Advanced Cooperative Provable Data Possession Based data Intergrity verification for multi-Cloud Storage” | International Journal Of Computer Applications | International | 2013-2014 | |
| 8 | Piyush Sonewar | “A survey of Intrusion Detection System for Web Application” | International journal of Engg research & Technology | International | 2013-2014 | |
| 9 | Sonali Thosar | “Privacy preserving integrity verification for securing cloud storage” | International journal of Engg research & Technology | International | 2013-2014 | |
| 10 | R Kagade, | “Robust Topology, Self-Scheduling Approach Based on Remaining Energy for WSN” | (IJCSIT) International Journal of Computer Science and Information Technologies | International | 2013-2014 | |
| 11 | Sonia Pise, | “Green Could Computing for Smart Phones through Multimedia Cloud” | International Journal of Computer Information Systems, | International | 2013-2014 | |
| 12 | Anuse Ambuja, | “Detection And Prevention of Misbehaving Users in Anonymizing Networks” | (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (6), 1034-1037 , 2013 | International | 2013-2014 | |
| 13 | Madhura Sanap, | “Bin SDR : Effective Algorithm for Wireless Sensor-actor Network” | ICACNI , Advances in Intelligent Systems and Computing, Springer Vol. 243,June 2013 | International | 2013-2014 | |
| 14 | Pramod Mane | “Watchdog Three Tier Technique to secure WSN” | International Journal of | International | 2013-2014 | |
| 15 | Rajendra Navale, | “An efficient Load balancing algorithm for energy utilization in WSN” | International Journal of computer Applications Nov 2013 | International | 2013-2014 | |
| 16 | Rajendra Navale, | “A Distributed topology control technique for low interference and load balancing for energy utilization in WSN” | International Journal of Scientific and Engg. Research July 2013 | International | 2013-2014 | |
| 17 | Ashwini Borude | “Next    Generation | International Journal of Information Technology and Sys. (IJITS) | International | 2013-2014 | |
| 18 | S. P. Dugam | “An Overview of a Method for Increasing Performance and Energy Efficiency of Geographic Routing Protocol in Sensor Networks” | ”.International | International | 2013-2014 | |
| 19 | Anuja gaikwad | “Enhancement Of BFF Algorithm For Energy Aware Path Selection In FISH Network.” | International Journal on Computer Science and Technology (IJCST) | International | 2013-2014 | |
| 20 | R. Dayma | “Optimal Traffic Engineering in Link State Routing Protocols” | International Journal of Computer Applications. (IJCA) | International | 2013-2014 | |
| 21 | Prashant Dhangar, Amit magar,Yogesh Waghmare | “Lightweight DNS for Multipurpose and Multifunctional Devices.” | International Journal of Engineering and Innovative Technology(IJEIT 201304-1758) | International | 2013-2014 | |
| 22 | Ankita Shinde | “Classification based on Predictive Association Rule for Discrimination Prevention” | International Journal of Computer Applications | International | 2013-2014 | |
| 23 | Snehal Pise | “Security of Personal Health Records through Attribute Based Encryption in Cloud Computing” | International Journal of Engineering Research and Technology (IJERT) | International | 2013-2014 | |
| 24 | Shantanu Sasane | “Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS” | International Journal of Engineering Research & Technology (IJERT | International | 2013-2014 | |
| 25 | Ms. Manali Dubal | “On Pseudo-Random Number Generation using Elliptic Curve Cryptography” | International Symposium on Security in Computing and Communications (SSCC’13),22 – 24 SJCE, Mysore, India. | International | 2013-2014 | |
| 26 | Priyanka Takalkar | “Secure Data Transmission Model in MANET” | SSCC | International | 2013-2014 | |
| 27 | Priyanka Takalkar | “Futuristic Trolley for Intelligent Billing with amalgamation of RFID and ZIGBEE” | http://www.ijcaonline.org/proceedings/icrtet/number5/11792-1357 | International | 2013-2014 | |
| 28 | Shruti Utpat, | “A SIP Based Authentication  | International journal of advance engineering and technology(IJARCET) | International | 2013-2014 | |
| 29 | Arti Naik | “Weather Prediction Using Error Minimization Algorithm on Feed forward Artificial Neural Network” | Intelligent Computing, Networking, and Informatics Advances in Intelligent Systems and Computing | International | 2013-2014 | |
| 30 | 
 Arti R. Naik | “Weather Prediction Using Error Minimization Algorithm on Feed forward Artificial Neural Network” | (IJARCET) | International | 2013-2014 | |
| 31 | 
 Arti Naik, | “Weather Prediction Using Error Minimization Algorithm on Feed forward Artificial Neural Network” | Intelligent Computing, Networking, and Informatics Advances in Intelligent Systems and Computing | International | 2013-2014 | |
| 32 | PriyankaTakalkar, | “Secure Data Transmission Model in MANET” | International Journal of Computer application | International | 2013-2014 | |
| 33 | PriyankaTakalkar | “Trust Based Secure Data Transmission model in MANET” | International Journal of Emerging Technology in advanced Engineering | International | 2013-2014 | |
| 34 | PriyankaTakalkar, | “Secure Data Transmission Model in MANET” | International Journal of Computer application | International | 2013-2014 | |
| 35 | PriyankaTakalkar, | “Trust Based Secure Data Transmission model in MANET” | International Journal of Emerging Technology in advanced Engineering | International | 2013-2014 | |
| 36 | Shweta Bora, Arpita Dixit, Sonali Chemate, Nikita Kolpekwar | Real Time Carpooling System for Android Platform | IJEIT | International | 2013-2014 | |
| 37 | S.Y. Kulkarni | Tracing Replicated Mobile Nodes in Wireless Sensor Network | International Journal of Engineering Practices | International | 2012-2013 | |
| 38 | P. N.Railkar, | Proposed secure context aware profile translation | IJITS | International | 2012-2013 | |
| 39 | P. N. Railkar, | Proposed profile translation in context aware proactive system | IJCSE | International | 2012-2013 | |
| 40 | Sachin Babar | “ Localization and tracking for wireless sensor network “ | Journal of advances in Engineering Sciences | 
 | 2012-2013 | |
| 41 | Sachin Babar, | Proposed on Device Capability based Authentication using AES-GCM for Internet of Things(IoT) | 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems | International | 2012-2013 | |
| 42 | P. N. Railkar, | Proposed Profile Translation based Proactive Adaptation using Context Management (PTPACM) in Smartphones | IACC-2013 | International | 2012-2013 | |
| 43 | R. A. Kudale | Green Routing for WSN-2012 | International Journal for Science & research Publication | International | 2012-2013 | |
| 44 | M. Sanap | Effective Performance analysis for Bin Periodic algorithm for WSAN -2012 | IJCSIT | International | 2012-2013 | |
| 45 | Dnyanada S. Patil, | “Using Multi-agent Sourcing Method for Detection and Elimination of Rogue Access Points in WLAN-802.11,” | International Journal of Computer    Applications | International | 2012-2013 | |
| 46 | Poonam N. Railkar, | “Activity Modelling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart phones,” | International Journal of Computer    Applications | International | 2012-2013 | |
| 47 | Ketaki Shah, AnujaRaundal, GouriBhandari, SantwanaRathi, PoonamRailkar, | “Proposed profile translation In context aware proactive system,” | Indian Journal of Computer Science and Engineering (IJCSE) Dec 2012-Jan 2013. | National | 2012-2013 | |
| 48 | Priti Rathi, | “Certificate Revocation In Mobile Ad Hoc Networks,” | In International Journal of    Application or Innovation in Engineering & Management (IJAIEM) | International | 2012-2013 | |
| 49 | Jitendra Ingale, 
 
 | “Android Based WS Security and MVC Based UI Representation of Data,” | International Journal of Computer Science, Engineering and Information Technology, Volume: 3 - volume NO: 1 - Issue: February 2013 | International | 2012-2013 | |
| 50 | Madhuri Patil, | “A Novel Approach to improve Detection rate and Search Efficiency of NIDS” | International Journal of Computational Engineering Research January-2013 | International | 2012-2013 | |
| 51 | Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya | “abt[agile billing trolley] with aggregation of rfid and zigbee” | ICRTET | International | 2012-2013 | |
| 52 | Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya | “FUTURISTIC TROLLEY FOR INTELLIGENT BILLING WITH AMALGAMATION OF RFID AND ZIGBEE” | Fe\ 22, 2013ICRTET | International | 2012-2013 | |
| 53 | Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya | Intelligent Billing trolley with coalesce of RFID & ZIGBEE | ICRTET | International | 2012-2013 | |
| 54 | Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya | Trenchant Shopping Trolley with congregation of RFID and Zigbee | IOSR JCE | International | 2012-2013 | |
| 55 | Sagar Latake | “Trust Opportunistic Multicast Routing (TOMR) Protocol in Multihop Wireless Network” | ICRTET 
 
 | International | 2012-2013 | |
| 56 | Sagar Latake 
 | “Tree, Mesh Structure Based and Stateless Multicast Routing Protocols in Wireless Networks” | IJCSIT 
 
 | International | 2012-2013 | |
| 57 | Ms. Manali Dubal | “Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture” | International Journal of Computer Applications (0975 – 8887) Volume 69– No.24, May 2013 | International | 2012-2013 | |
| 58 | S.P.Dugam, | “An Overview of a Method for Increasing Performance and Energy Efficiency of Geographic Routing Protocol in Sensor Networks” | International | International | 2012-2013 | |
| 59 | Manali Dubal 
 | Data security analysis and security extension for smart card using java card | IJATI Vol-2, No.2, DOI:10.512/ijait.2012,2204 | International | 2012-2013 | |
| 60 | Sonal Dhamak, Purvaja Khatod, Vikalpa Landge, Snha Kamble | HMM based enhanced security system for ATM payment | IRACST-2012 ISSN-2250-3498 VOL-2,No.3 | International | 2012-2013 | |
| 61 | Kushal Palesha, Swapnil Patel, Sumit Wani | Android based healthcare monitoring system on mobile cloud | NCPCI 2013, Pune | International | 2012-2013 | |
| 62 | Madhura Sanap 
 
 | Experimental analysis for bin periodic algo. & bin free algo. For wireless sensor N/W | International conference on Emerging trends in electrical comm. & info. Technology 2012 ISBN:81-312-3411-2 Pub:Elserier Ltd. | International | 2012-2013 | |
| 63 | G.Bobhate | Reduction of the semantic gap using Pseudo elevance feedback algorithm | International conference on Advanced Engg. & Technology, Pune ISBN-978-93-82702-11-5 | International | 2012-2013 | |
| 64 | G.Bobhate | Improvement of quality of an image by using Gabor wavelet texture | International conference of computer science and information technology, Nagpur ISBN-978-82208-60-0 | International | 2012-2013 | |
| 65 | S.Y.Kulkarni | Mobile Replication Attack in Wireless Sensor Network | IJSRP International Journal of Scientific    & Research Publication | International | 2011-2012 | |
| 66 | Manish Ranglani | Data Integrity Proofs | International    Conference On (ICSE-2012) | International | 2011-2012 | |
| 67 | R.A.Kudale | Green Routing for Wireless Sensor & Actor Network | C-PGCON-12 | National | 2011-2012 | |
| 68 | S.Y.Kulkarni | Identification of Mobile Replica Node in WSN | C-PGCON-12 | National | 2011-2012 | |
| 69 | Mr. Ritesh Dayama | Optimizing Link State Routing Protocol | C-PGCON-12 | National | 2011-2012 | |
| 70 | NishabenVaghela | IP Based Object Identification using RFID in Ubiquitous Computing | C-PGCON-12 | National | 2011-2012 | |
| 71 | Nitesh Kumar, Jatin Kakani, Rahul Dalal | M-torrent-torrent for java supported mobile phones | International journal of wireless    communication | International | 2011-2012 | |
| 72 | Akhil Mangla | Idea generation algorithm based system | Advanced Materials Research | International | 2010-2011 |