|
Name of Student |
Title of Paper |
Name of Journal / Conference |
National/ International |
Year of Publication |
|
1 |
Poonam N. Railkar, |
“Smartphone-based Context Aware Proactive System for Profile Translation |
In Springer journal of Communications in mobile computing |
International |
2013-2014 |
|
2 |
Shinde Jyoti R, |
“Double Guard: Detecting Intrusions in Multi-Tier Web Applications,” |
Scholarly Research Journal for Interdisciplinary Studies |
International |
2013-2014 |
|
3 |
Priyanka N Kamble |
“Decision Theory based Auto-delegation (DTA-d) scheme for Ubiquitous Computing,” |
International Journal of Computer Applications 79(7):1-6,Foundation of Computer Science, New York, USA. |
International |
2013-2014 |
|
4 |
Poonam Railkar, |
“Review and Reputation based Trust Score Calculation for WLAN (RRTSC),” |
International Journal of Computer Applications 79(7):1-6, |
International |
2013-2014 |
|
5 |
Shruti Utpat, |
“Secure authentication protocol for ubiquitous computing,” |
International Journal of Computer Applications 79(7):1-6, |
International |
2013-2014 |
|
6 |
G. S. Bhamare, |
“Enhancement of Color Image in RGB Space” |
International Journal of Engineering Research & Technology (IJERT)2014 |
International |
2013-2014 |
|
7 |
Vaibhav Bharati |
“Advanced Cooperative Provable Data Possession Based data Intergrity verification for multi-Cloud Storage” |
International Journal Of Computer Applications |
International |
2013-2014 |
|
8 |
Piyush Sonewar |
“A survey of Intrusion Detection System for Web Application” |
International journal of Engg research & Technology |
International |
2013-2014 |
|
9 |
Sonali Thosar |
“Privacy preserving integrity verification for securing cloud storage” |
International journal of Engg research & Technology |
International |
2013-2014 |
|
10 |
R Kagade, |
“Robust Topology, Self-Scheduling Approach Based on Remaining Energy for WSN” |
(IJCSIT) International Journal of Computer Science and Information Technologies |
International |
2013-2014 |
|
11 |
Sonia Pise, |
“Green Could Computing for Smart Phones through Multimedia Cloud” |
International Journal of Computer Information Systems, |
International |
2013-2014 |
|
12 |
Anuse Ambuja, |
“Detection And Prevention of Misbehaving Users in Anonymizing Networks” |
(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (6), 1034-1037 , 2013 |
International |
2013-2014 |
|
13 |
Madhura Sanap, |
“Bin SDR : Effective Algorithm for Wireless Sensor-actor Network” |
ICACNI , Advances in Intelligent Systems and Computing, Springer Vol. 243,June 2013 |
International |
2013-2014 |
|
14 |
Pramod Mane |
“Watchdog Three Tier Technique to secure WSN” |
International Journal of |
International |
2013-2014 |
|
15 |
Rajendra Navale, |
“An efficient Load balancing algorithm for energy utilization in WSN” |
International Journal of computer Applications Nov 2013 |
International |
2013-2014 |
|
16 |
Rajendra Navale, |
“A Distributed topology control technique for low interference and load balancing for energy utilization in WSN” |
International Journal of Scientific and Engg. Research July 2013 |
International |
2013-2014 |
|
17 |
Ashwini Borude |
“Next Generation |
International Journal of Information Technology and Sys. (IJITS) |
International |
2013-2014 |
|
18 |
S. P. Dugam |
“An Overview of a Method for Increasing Performance and Energy Efficiency of Geographic Routing Protocol in Sensor Networks” |
”.International |
International |
2013-2014 |
|
19 |
Anuja gaikwad |
“Enhancement Of BFF Algorithm For Energy Aware Path Selection In FISH Network.” |
International Journal on Computer Science and Technology (IJCST) |
International |
2013-2014 |
|
20 |
R. Dayma |
“Optimal Traffic Engineering in Link State Routing Protocols” |
International Journal of Computer Applications. (IJCA) |
International |
2013-2014 |
|
21 |
Prashant Dhangar, Amit magar,Yogesh Waghmare |
“Lightweight DNS for Multipurpose and Multifunctional Devices.” |
International Journal of Engineering and Innovative Technology(IJEIT 201304-1758) |
International |
2013-2014 |
|
22 |
Ankita Shinde |
“Classification based on Predictive Association Rule for Discrimination Prevention” |
International Journal of Computer Applications |
International |
2013-2014 |
|
23 |
Snehal Pise |
“Security of Personal Health Records through Attribute Based Encryption in Cloud Computing” |
International Journal of Engineering Research and Technology (IJERT) |
International |
2013-2014 |
|
24 |
Shantanu Sasane |
“Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS” |
International Journal of Engineering Research & Technology (IJERT |
International |
2013-2014 |
|
25 |
Ms. Manali Dubal |
“On Pseudo-Random Number Generation using Elliptic Curve Cryptography” |
International Symposium on Security in Computing and Communications (SSCC’13),22 – 24 SJCE, Mysore, India. |
International |
2013-2014 |
|
26 |
Priyanka Takalkar |
“Secure Data Transmission Model in MANET” |
SSCC |
International |
2013-2014 |
|
27 |
Priyanka Takalkar |
“Futuristic Trolley for Intelligent Billing with amalgamation of RFID and ZIGBEE” |
http://www.ijcaonline.org/proceedings/icrtet/number5/11792-1357 |
International |
2013-2014 |
|
28 |
Shruti Utpat, |
“A SIP Based Authentication |
International journal of advance engineering and technology(IJARCET) |
International |
2013-2014 |
|
29 |
Arti Naik |
“Weather Prediction Using Error Minimization Algorithm on Feed forward Artificial Neural Network” |
Intelligent Computing, Networking, and Informatics Advances in Intelligent Systems and Computing |
International |
2013-2014 |
|
30 |
Arti R. Naik |
“Weather Prediction Using Error Minimization Algorithm on Feed forward Artificial Neural Network” |
(IJARCET) |
International |
2013-2014 |
|
31 |
Arti Naik, |
“Weather Prediction Using Error Minimization Algorithm on Feed forward Artificial Neural Network” |
Intelligent Computing, Networking, and Informatics Advances in Intelligent Systems and Computing |
International |
2013-2014 |
|
32 |
PriyankaTakalkar, |
“Secure Data Transmission Model in MANET” |
International Journal of Computer application |
International |
2013-2014 |
|
33 |
PriyankaTakalkar |
“Trust Based Secure Data Transmission model in MANET” |
International Journal of Emerging Technology in advanced Engineering |
International |
2013-2014 |
|
34 |
PriyankaTakalkar, |
“Secure Data Transmission Model in MANET” |
International Journal of Computer application |
International |
2013-2014 |
|
35 |
PriyankaTakalkar, |
“Trust Based Secure Data Transmission model in MANET” |
International Journal of Emerging Technology in advanced Engineering |
International |
2013-2014 |
|
36 |
Shweta Bora, Arpita Dixit, Sonali Chemate, Nikita Kolpekwar |
Real Time Carpooling System for Android Platform |
IJEIT |
International |
2013-2014 |
|
37 |
S.Y. Kulkarni |
Tracing Replicated Mobile Nodes in Wireless Sensor Network |
International Journal of Engineering Practices |
International |
2012-2013 |
|
38 |
P. N.Railkar, |
Proposed secure context aware profile translation |
IJITS |
International |
2012-2013 |
|
39 |
P. N. Railkar, |
Proposed profile translation in context aware proactive system |
IJCSE |
International |
2012-2013 |
|
40 |
Sachin Babar |
“ Localization and tracking for wireless sensor network “ |
Journal of advances in Engineering Sciences |
|
2012-2013 |
|
41 |
Sachin Babar, |
Proposed on Device Capability based Authentication using AES-GCM for Internet of Things(IoT) |
3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems |
International |
2012-2013 |
|
42 |
P. N. Railkar, |
Proposed Profile Translation based Proactive Adaptation using Context Management (PTPACM) in Smartphones |
IACC-2013 |
International |
2012-2013 |
|
43 |
R. A. Kudale |
Green Routing for WSN-2012 |
International Journal for Science & research Publication |
International |
2012-2013 |
|
44 |
M. Sanap |
Effective Performance analysis for Bin Periodic algorithm for WSAN -2012 |
IJCSIT |
International |
2012-2013 |
|
45 |
Dnyanada S. Patil, |
“Using Multi-agent Sourcing Method for Detection and Elimination of Rogue Access Points in WLAN-802.11,” |
International Journal of Computer Applications |
International |
2012-2013 |
|
46 |
Poonam N. Railkar, |
“Activity Modelling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart phones,” |
International Journal of Computer Applications |
International |
2012-2013 |
|
47 |
Ketaki Shah, AnujaRaundal, GouriBhandari, SantwanaRathi, PoonamRailkar, |
“Proposed profile translation In context aware proactive system,” |
Indian Journal of Computer Science and Engineering (IJCSE) Dec 2012-Jan 2013. |
National |
2012-2013 |
|
48 |
Priti Rathi, |
“Certificate Revocation In Mobile Ad Hoc Networks,” |
In International Journal of Application or Innovation in Engineering & Management (IJAIEM) |
International |
2012-2013 |
|
49 |
Jitendra Ingale,
|
“Android Based WS Security and MVC Based UI Representation of Data,” |
International Journal of Computer Science, Engineering and Information Technology, Volume: 3 - volume NO: 1 - Issue: February 2013 |
International |
2012-2013 |
|
50 |
Madhuri Patil, |
“A Novel Approach to improve Detection rate and Search Efficiency of NIDS” |
International Journal of Computational Engineering Research January-2013 |
International |
2012-2013 |
|
51 |
Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya |
“abt[agile billing trolley] with aggregation of rfid and zigbee” |
ICRTET |
International |
2012-2013 |
|
52 |
Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya |
“FUTURISTIC TROLLEY FOR INTELLIGENT BILLING WITH AMALGAMATION OF RFID AND ZIGBEE” |
Fe\ 22, 2013ICRTET |
International |
2012-2013 |
|
53 |
Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya |
Intelligent Billing trolley with coalesce of RFID & ZIGBEE |
ICRTET |
International |
2012-2013 |
|
54 |
Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya |
Trenchant Shopping Trolley with congregation of RFID and Zigbee |
IOSR JCE |
International |
2012-2013 |
|
55 |
Sagar Latake |
“Trust Opportunistic Multicast Routing (TOMR) Protocol in Multihop Wireless Network” |
ICRTET
|
International |
2012-2013 |
|
56 |
Sagar Latake
|
“Tree, Mesh Structure Based and Stateless Multicast Routing Protocols in Wireless Networks” |
IJCSIT
|
International |
2012-2013 |
|
57 |
Ms. Manali Dubal |
“Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture” |
International Journal of Computer Applications (0975 – 8887) Volume 69– No.24, May 2013 |
International |
2012-2013 |
|
58 |
S.P.Dugam, |
“An Overview of a Method for Increasing Performance and Energy Efficiency of Geographic Routing Protocol in Sensor Networks” |
International |
International |
2012-2013 |
|
59 |
Manali Dubal
|
Data security analysis and security extension for smart card using java card |
IJATI Vol-2, No.2, DOI:10.512/ijait.2012,2204 |
International |
2012-2013 |
|
60 |
Sonal Dhamak, Purvaja Khatod, Vikalpa Landge, Snha Kamble |
HMM based enhanced security system for ATM payment |
IRACST-2012 ISSN-2250-3498 VOL-2,No.3 |
International |
2012-2013 |
|
61 |
Kushal Palesha, Swapnil Patel, Sumit Wani |
Android based healthcare monitoring system on mobile cloud |
NCPCI 2013, Pune |
International |
2012-2013 |
|
62 |
Madhura Sanap
|
Experimental analysis for bin periodic algo. & bin free algo. For wireless sensor N/W |
International conference on Emerging trends in electrical comm. & info. Technology 2012 ISBN:81-312-3411-2 Pub:Elserier Ltd. |
International |
2012-2013 |
|
63 |
G.Bobhate |
Reduction of the semantic gap using Pseudo elevance feedback algorithm |
International conference on Advanced Engg. & Technology, Pune ISBN-978-93-82702-11-5 |
International |
2012-2013 |
|
64 |
G.Bobhate |
Improvement of quality of an image by using Gabor wavelet texture |
International conference of computer science and information technology, Nagpur ISBN-978-82208-60-0 |
International |
2012-2013 |
|
65 |
S.Y.Kulkarni |
Mobile Replication Attack in Wireless Sensor Network |
IJSRP International Journal of Scientific & Research Publication |
International |
2011-2012 |
|
66 |
Manish Ranglani |
Data Integrity Proofs |
International Conference On (ICSE-2012) |
International |
2011-2012 |
|
67 |
R.A.Kudale |
Green Routing for Wireless Sensor & Actor Network |
C-PGCON-12 |
National |
2011-2012 |
|
68 |
S.Y.Kulkarni |
Identification of Mobile Replica Node in WSN |
C-PGCON-12 |
National |
2011-2012 |
|
69 |
Mr. Ritesh Dayama |
Optimizing Link State Routing Protocol |
C-PGCON-12 |
National |
2011-2012 |
|
70 |
NishabenVaghela |
IP Based Object Identification using RFID in Ubiquitous Computing |
C-PGCON-12 |
National |
2011-2012 |
|
71 |
Nitesh Kumar, Jatin Kakani, Rahul Dalal |
M-torrent-torrent for java supported mobile phones |
International journal of wireless communication |
International |
2011-2012 |
|
72 |
Akhil Mangla |
Idea generation algorithm based system |
Advanced Materials Research |
International |
2010-2011 |