001 |
ENABLING CLOUD STORAGE AUDITING WITH KEY -EXPOSURE RESISTANCE |
Abstract |
002 |
TOWARRDS ONLINE SHOTEST PATH OVER THE NETWORK |
Abstract |
003 |
A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD |
Abstract |
004 |
PROGRESSIVE DUPLICATE DETECTION |
Abstract |
005 |
CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN CLOUD COMPUTING |
Abstract |
006 |
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA |
Abstract |
007 |
CLOUDQUAL: A QUALITY MODEL FOR
CLOUD SERVICES
|
Abstract |
008 |
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE)
FOR GROUP DATA SHARING VIA CLOUD STORAGE
|
Abstract |
009 |
A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMPUTING |
Abstract |
010 |
DATA MINING WITH BIG DATA |
Abstract |
011 |
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION
IN CLOUD COMPUTING SYSTEMS
|
Abstract |
012 |
DETECTING MALICIOUS FACEBOOK APPLICATIONS |
Abstract |
013 |
PRIVACY-PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE |
Abstract |
014 |
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS |
Abstract |
015 |
ON SUMMARIZATION AND TIMELINE GENERATION
FOR EVOLUTIONARY TWEET STREAMS
|
Abstract |
016 |
CLOUDARMOR: SUPPORTING REPUTATION-BASED
TRUST MANAGEMENT FOR CLOUD SERVICES
|
Abstract |
017 |
CLOUDQUAL: A QUALITY MODEL FOR
CLOUD SERVICES
|
Abstract |
018 |
A HYBRID CLOUD APPROACH FOR SECURE
AUTHORIZED DEDUPLICATION
|
Abstract |
019 |
DATA MINING WITH BIG DATA |
Abstract |
020 |
FINGERPRINT COMPRESSION BASED ON SPARSE
REPRESENTATION
|
Abstract |
021 |
PACK: PREDICTION-BASED CLOUD BANDWIDTH
AND COST REDUCTION SYSTEM
|
Abstract |
022 |
SCALABLE DISTRIBUTED SERVICE INTEGRITY
ATTESTATION FOR SOFTWARE-AS-A-SERVICE CLOUDS
|
Abstract |
023 |
PROFILR: TOWARD PRESERVING PRIVACY AND
FUNCTIONALITY IN GEOSOCIAL NETWORKS
|
Abstract |
024 |
AUTOMATIC TEST PACKET GENERATION |
Abstract |
025 |
SECURE DATA RETRIEVAL FOR DECENTRALIZED
DISRUPTION-TOLERANT MILITARY NETWORKS
|
Abstract |
026 |
HIDING IN THE MOBILE CROWD- LOCATION PRIVACY THROUGH COLLABORATION |
Abstract |
027 |
BEHAVIORAL MLAWARE DETECTION IN DELAY TOLERANT NETWORKS |
Abstract |
028 |
SECURE DATA AGGREGATION IN WIRELESS SENSOR
NETWORKS: FILTERING OUT THE ATTACKER’S IMPACT
|
Abstract |
029 |
EFFICIENT DATA COLLECTION FOR LARGE-SCALE MOBILE
MONITORING APPLICATIONS
|
Abstract |
030 |
HOP-BY-HOP MESSAGE AUTHENTICATION
AND SOURCE PRIVACY IN WIRELESS
SENSOR NETWORKS
|
Abstract |
031 |
FOCUS: AN ENHANCED LEARNING TO CRAWL WEB FORUMS |
Abstract |
032 |
DISTRIBUTED COOPERATIVE CACHING IN SOCIAL WIRELESS NETWORKS |
Abstract |
033 |
PACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS |
Abstract |
034 |
SCALABLE DISTRIBUTED SERVICE INTEGRITY ATTESTATION FOR SOFTWARE-AS-A-SERVICE CLOUDS |
Abstract |
035 |
A LOAD BALANCING MODEL BASED ON CLOUD PARTITIONINGFOR THE PUBLIC CLOUD |
Abstract |
036 |
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING |
Abstract |
037 |
OPTIMAL CLIENT-SERVER ASSIGNMENT FOR INTERNET
DISTRIBUTED SYSTEMS
|
Abstract |
038 |
WIRELESS SENSOR NETWORKS: A STUDY ON CONGESTION ROUTING ALGORITHMS |
Abstract |
039 |
SECURE DATA COLLECTION IN WIRELESS SENSOR NETWORKS USING RANDOM
ROUTING ALGORITHMS
|
Abstract |
040 |
CLOUD COMPUTING FOR EMERGING MOBILE CLOUD APPS |
Abstract |
041 |
CONTENT CACHING AND SCHEDULING IN WIRELESS NETWORKS |
Abstract |
042 |
COST-EFFECTIVE RESOURCE ALLOCATION OF OVERLAY
ROUTING RELAY NODES
|
Abstract |
043 |
SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK |
Abstract |
044 |
IMPROVED SECURITY USING CAPTCHA AS GRAPHICAL PASSWORD |
Abstract |
045 |
GRAPHICAL PASSWORD AUTHENTICATION |
Abstract |