Professional Documents
Culture Documents
1 Two-Cloud Secure Database for Numeric-Related SQL Range Queries with 2017
Privacy Preserving
2 Practical Privacy-Preserving Content-Based Retrieval in Cloud Image 2017
Repositories
3 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds 2017
9 Customer Satisfaction Aware Optimal Multi Server Configuration for Profit 2017
Maximization in Cloud Computing
10 Privacy Protection based Access Control Scheme in Cloud-based Services 2017
11 TAFC: Time and Attribute Factors Combined Access Control on Time- 2017
Sensitive Data in Public Cloud
12 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: 2017
Formal Specification and Verification
13 VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword 2017
Search over Encrypted Cloud Data
14 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 2017
17 Cost Optimization for Dynamic Replication and Migration of Data in Cloud 2017
Data Centers
18 Energy-aware Load Balancing and Application Scaling for the Cloud 2017
Ecosystem
19 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud 2017
20 A Secure and Verifiable Access Control Scheme for Big Data Storage in 2017
Clouds
21 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate 2017
Keys for Online Data Sharing on the Cloud
22 Privacy-Preserving Multi keyword Similarity Search Over Outsourced 2017
Cloud Data
23 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical 2017
Data Sharing
24 On the Security of Data Access Control for Multi authority Cloud Storage 2017
Systems
25 Identity-based Remote Data Integrity Checking with Perfect Data Privacy 2017
Preserving for Cloud Storage
26 Identity-Based Private Matching over Outsourced Encrypted Datasets 2017
44 Keyword Search with Access Control over Encrypted Cloud Data 2017
1 Twitter Trends Manipulation: A First Look Inside the Security of Twitter 2017
Trending
2 NetSpam: a Network-based Spam Detection Framework for Reviews in 2017
Online Social Media
3 My Privacy My Decision: Control of Photo Sharing on Online Social 2017
Networks
4 A Multilevel Access Control Scheme for Data Security in Transparent 2017
Computing
5 Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic 2017
Path Identifiers
6 Efficiently Promoting Product Online Outcome: An Iterative Rating Attack 2017
Utilizing Product and Market Property
Data Mining
1 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets 2017
20 Social Q&A: An Online Social Network Based Question and Answer System 2017
Mobile Computing
1 A Proxy-based Collaboration System to Minimize Content Download Time 2017
and Energy Consumption
2 Detecting Mobile Malicious Web pages in Real Time 2017
2 Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered 2017
Sensor Network
3 E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing 2017
Protocol for Wireless Sensor Networks
4 Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor 2017
Network Using Type-2 Fuzzy Logic
5 Lightweight Three-factor Authentication and Key Agreement Protocol for 2017
Internet-integrated Wireless Sensor Networks
6 Research on Trust Sensing based Secure Routing Mechanism for Wireless 2017
Sensor Network
7 Traffic De correlation Techniques for Countering a Global Eavesdropper in 2017
WSNs
8 Cooperative Query Answer Authentication Scheme over Anonymous 2017
Sensing Data
Android Projects
1 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 2017
2 Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of 2017
Sale Terminal
3 A Classroom Scheduling Service for Smart Classes 2017
10 Shake In: Secure User Authentication of Smart phones with Habitual Single 2017
handed Shakes
11 Shuffle Dog Characterizing and Adapting User-Perceived Latency of 2017
Android Apps
12 Team Phone Networking Smart phones for Disaster Recovery 2017
3 Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage 2017
Systems
4 Transactional Behavior Verification in Business Process as a Service 2017
Configuration
5 Efficient and Privacy-preserving Min and k-th Min Computations in Mobile 2017
Sensing Systems
6 My Privacy My Decision: Control of Photo Sharing on Online Social 2017
Networks
7 SADI: A Novel Model to Study the Propagation of Social Worms in 2017
Hierarchical Networks
8 An Overlay Architecture for Throughput Optimal Multipath Routing 2017