M.E., Ph.D.(Computer Engineering),
Senior Member IEEE, LMISTE, LMCSI, Member ACM, Member IAENG (H.K.),
Professor at Department of Computer Engineering,
Bansilal Ramnath Agarwal Charitable Trust's,
Vishwakarma Institute of Information Technology, Pune
Guided 23 PG Student since 2012
ME Students Thesis InformationSr. No | Name of Student | Thesis title | Year of completion | Co-guide |
---|---|---|---|---|
1. | Vaghela Nisha | Object Identification in Ubiquitous Networking | 2012 | |
2. | Utpat Shruti | A Secure Authentication Scheme For Ubiquitous Computing | 2012 | |
3. | Ingale Jitendra | Proposed One Time Password Generation Scheme For Mobile Handsets As Otpgen | 2013 | |
4. | Patil Dnyanada | Multiagent-Based Sourcing For Rap Detection And Elimination In Wlan | 2013 | |
5. | Poonam Ninad Railkar | Smartphone–Based Context Aware Proactive System For Profile Translation (S-CAPSPT) | 2013 | |
6. | Rathi Priti | Proposed threshold based certificate revocation for solving false accusation attack in mobile Ad-Hoc network | 2014 | |
7. | Kamble Priyanka Nanasaheb | Decision Theory based Auto-Delegation (DTA-d) scheme for ubiquitous computing. | 2015 | |
8. | Kolekar Sachin Madhukar | Authentication and secrete sharing or data privacy for mobile cloud using ECC | 2015 | |
9. | Pandule Amruta | Review and reputation based trust score calculation for W-LAN | 2015 | P.N Railkar |
10. | Snehal Pundkar | PPAS:Proactive Personalization through Abstraction for Smart Phones | 2015 | P.N Railkar |
11. | Nancy Ambritta P. | A Distributed And Attack Resilient Model For Identity And Access Management in Future Internet | 2015 | P.N Railkar |
12. | Deepa Naik | Knowledge Based Network Security Situation Awareness | 2016 | |
13. | Sandesh Mahamure | Device to Device Communication Using IMAP Protocol For IOT | 2016 | P.N Railkar |
14. | Suprit U Kulkarni | Fuzzy Min-Max Neural Network for Pattern Classification Using Map-Reduce | 2016 | |
15. | Ms.Kashmira Deshpande | A Novel Ticket-based Human Resource Efforts Tracking and Estimation System for Ubicomp | 2017 | |
16. | Shreya P. Amilkanthwar | Architecture and Protocol for Sensor Internet Search and Shearing Based on Learning Methods | 2017 | P.N Railkar |
17. | Pritee Gavhane | Information Fusion for multi-sensory data | 2017 | |
18. | Bhavana Madhukar Bachhav | Large Data Management In Iot Application For Supply Chain Environment | 2018 | |
19. | Arundhati Vilas Ubhad | Software Defined Networking Architecture For Empowering Internet Of Things And Enhancing Security Features Using Sdn For Supply Chain Management | 2018 | |
20. | Sawant Namrata Tanaji | Short Detection To Avoid Signalling Attack In Wireless Sensor Network | 2018 | |
21. | Apune Sagar Sambhaji | Intrusion Detection In Industrial Automation By Joint Admin Authorization | 2018 | |
22. | Apurva Rajeshrao Wattamwar | Privacy Awareness Protocol For Machine To Machine Communication In Iot | 2019 | Dr. G. R.Shinde |
23. | Rajkumar Patil | Trust Mangment For Device To Device Communication In Iot Using Learning Techniques | 2020 | Dr. G. R.Shinde |
Sr. No. | Scholars Name | Thesis Title | Remarks |
---|---|---|---|
1 | Sachin Godse | Elliptic Curve Cryptography Based Fast and Secure Vehicle Authentication with Relevence Based Message Prioritization and Malicious Node Detection | Completed |
2 | Pankaj Chandre | Intrusion Prevention System Using Deep Packet Inspection for Wireless Sensor Network | Ongoing |
3 | Poonam Railkar | Secure and Distributed Algorithms for Machine to Machine Communication in Internet of Things | Ongoing |
4 | Abolee V Patil | Proactive Algorithm for Reviewer Assignment Problem using Machine Learning Techniques | Ongoing |
5 | Vijay M Khadse | Algorithms for Data Analytics using Machine Learning in Internet of Things | Ongoing |
6 | Rachana Ashtekar | Data Confidentiality Algorithm for Online Social Networks | Ongoing |
7 | Mahendra Salunke | Lightweight Algorithm for Embedded Security in Machine-to-Machine Communication towards Internet of Things | Ongoing |
8 | Gaurav Jumnake | Algorithm to Detect Malignancy in Human Cells for Colorectal Cancer using Learning Techniques | Ongoing |
9 | Pooja Shelar | Architectural and Algorithmic Approach for Energy-Aware Secure Data Transmission in UWSN | Ongoing |