| 
 | 
  
YEAR--2014 
 | 
 
  | 
 | 
  
DOMAIN 
   
   
 | 
 
  
- Cloud-Assisted
       Mobile-Access of Health Data With Privacy and Auditability
 
 
 | 
  
Secure Computing 
 | 
 
  
- Fast
       Nearest Neighbor Search with Keywords
 
 
 | 
  
Data Mining 
 | 
 
  
- Personalized
       web search using Browsing history and domain Knowledge
 
 
 | 
  
Data Mining 
 | 
 
  
- Secure
       Outsourced Attribute-Based Signatures
 
 
 | 
  
Parallel
  and Distributed Systems 
 | 
 
  
- Secure-Mining-of-Association-Rules-in-Horizontally-Distributed-Databases
 
 
 | 
  
Data Mining 
 | 
 
  
- Supporting
       Privacy Protection in Personalized Web Search
 
 
 | 
  
Data Mining 
 | 
 
  
- XSPath
       Navigation on XML Schemas Made Easy
 
 
 | 
  
Data Mining 
 | 
 
  
- A Hybrid
       Cloud Approach for Secure Authorized Deduplication
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- A
       Probabilistic Misbehavior Detection Scheme toward Efficient Trust
       Establishment in Delay-Tolerant Networks
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- A
       QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
 
 
 | 
  
MOBILE COMPUTING 
 | 
 
  
- A Scalable
       Two-Phase Top-Down Specialization Approach for Data Anonymization Using
       MapReduce on Cloud
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- A System
       for Denial-of-Service Attack Detection Based on Multivariate Correlation
       Analysis
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- A Tag
       Encoding Scheme against Pollution Attack to Linear Network Coding
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Accuracy-Constrained
       Privacy-Preserving Access Control Mechanism for Relational Data
 
 
 | 
  
Data Mining 
 | 
 
  
- Balancing
       Performance, Accuracy, and Precision for Secure Cloud Transactions
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Bandwidth
       Distributed Denial of Service: Attacks and Defenses
 
 
 | 
  
Flooding Attacks 
 | 
 
  
- Behavioral
       Malware Detection in Delay Tolerant Networks
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Cooperative
       Caching for Efficient Data Access in Disruption Tolerant Networks
 
 
 | 
  
Mobile Computing 
 | 
 
  
- Cooperative
       Spectrum Sharing: A Contract-Based Approach
 
 
 | 
  
Mobile Computing 
 | 
 
  
- Decentralized
       Access Control with Anonymous Authentication of Data Stored in Clouds
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Enabling
       Trustworthy Service Evaluation in Service-Oriented Mobile Social
       Networks
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Facilitating
       Document Annotation Using Content and Querying Value
 
 
 | 
  
Data Mining 
 | 
 
  
- Interpreting
       the Public Sentiment Variations on Twitter
 
 
 | 
  
Data Mining 
 | 
 
  
- Keyword
       Query Routing
 
 
 | 
  
Data Mining 
 | 
 
  
- k-Zero Day
       Safety: A Network Security Metric for Measuring the Risk of Unknown
       Vulnerabilities
 
 
 | 
  
Secure Computing 
 | 
 
  
- Modeling of
       Distributed File Systems for Practical Performance Analysis
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Network
       Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- PACK:
       Prediction-Based Cloud Bandwidth and Cost Reduction System
 
 
 | 
  
Networking 
 | 
 
  
- Preserving
       Location Privacy in Geo-Social Applications
 
 
 | 
  
Mobile Computing 
 | 
 
  
- Oruta:
       Privacy-Preserving Public Auditing for Shared Data in the Cloud
 
 
 | 
  
Cloud Computing 
 | 
 
  
- Product
       Aspect Ranking and Its Applications
 
 
 | 
  
Data Mining 
 | 
 
  
- Two
       Provably Secure Password Hashing Algorithms
 
 
 | 
  
Networking 
 | 
 
  
- Secure Data
       Retrieval for Decentralized Disruption-Tolerant Military Networks
 
 
 | 
  
Networking 
 | 
 
  
- Set
       Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed
       Groups
 
 
 | 
  
Data Mining 
 | 
 
  
- Hiding in
       the Mobile Crowd Location Privacy through Collaboration
 
 
 | 
  
Networking 
 | 
 
  
- Scalable
       Distributed Service Integrity Attestation for Software-as-a-Service
       Clouds
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Automatic
       Test Packet Generation
 
 
 | 
  
Networking 
 | 
 
  
- Key-Aggregate
       Cryptosystem for Scalable Data Sharing in Cloud Storage
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- A Cocktail
       Approach for Travel Package Recommendation
 
 
 | 
  
Data Mining 
 | 
 
  
- Efficient
       Prediction of Difficult Keyword Queries over Databases
 
 
 | 
  
Data Mining 
 | 
 
  
- Multicast
       Capacity in MANET with Infrastructure Support
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- PROFILR:
       Toward Preserving Privacy and Functionality in Geosocial Networks
 
 
 | 
  
  
 | 
 
  
- Efficient
       Authentication for Mobile and Pervasive Computing
 
 
 | 
  
Mobile Computing 
 | 
 
  
- Friendbook:
       A Semantic-based Friend Recommendation System for Social Networks
 
 
 | 
  
Mobile Computing 
 | 
 
  
- Optimal
       Distributed Malware Defense in Mobile Networks with Heterogeneous
       Devices
 
 
 | 
  
Android 
 | 
 
  
- Towards
       Differential Query Services in Cost-Efficient Clouds
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Expressive,
       Efficient, and Revocable Data Access Control for Multi-Authority Cloud
       Storage
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Cost-Effective
       Resource Allocation of Overlay Routing Relay Nodes
 
 
 | 
  
Networking 
 | 
 
  
- Shared
       Authority Based Privacy-preserving Authentication Protocol in Cloud
       Computing
 
 
 | 
  
Cloud
  Computing 
 | 
 
  
- Privacy-Preserving
       Multi-Keyword Ranked Search over Encrypted Cloud Data
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Secure Data
       Aggregation in Wireless Sensor Networks Filtering out the Attacker’s
       Impact
 
 
 | 
  
Information Forensics and Security 
 | 
 
  
- The Design
       and Evaluation of An Information Sharing System for Human Networks
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Traffic
       Pattern-Based Content Leakage Detection for Trusted Content Delivery
       Networks
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Distributed,
       concurrent, and independent access to encrypted cloud databases
 
 
 | 
  
Parallel and Distributed Systems 
 | 
 
  
- Captcha as
       Graphical Passwords—A New Security Primitive Based on Hard AI Problems
 
 
 | 
  
Security 
 | 
 
  
- Building
       Confidential and Efficient Query Services in the Cloud with RASP Data
       Perturbation
 
 
 | 
  
Data Mining 
 | 
 
  
- Boundary
       Cutting for Packet Classification
 
 
 | 
  
Networking 
 | 
 
  
- Leveraging
       Social Networks for P2P Content based File Sharing in Disconnected
       MANETs
 
 
 | 
  
Networking 
 | 
 
  
- Data Mining
       with Big Data
 
 
 | 
  
Data Mining 
 | 
 
 
No comments:
Post a Comment