|
YEAR--2014
|
|
DOMAIN
|
- Cloud-Assisted
Mobile-Access of Health Data With Privacy and Auditability
|
Secure Computing
|
- Fast
Nearest Neighbor Search with Keywords
|
Data Mining
|
- Personalized
web search using Browsing history and domain Knowledge
|
Data Mining
|
- Secure
Outsourced Attribute-Based Signatures
|
Parallel
and Distributed Systems
|
- Secure-Mining-of-Association-Rules-in-Horizontally-Distributed-Databases
|
Data Mining
|
- Supporting
Privacy Protection in Personalized Web Search
|
Data Mining
|
- XSPath
Navigation on XML Schemas Made Easy
|
Data Mining
|
- A Hybrid
Cloud Approach for Secure Authorized Deduplication
|
Parallel and Distributed Systems
|
- A
Probabilistic Misbehavior Detection Scheme toward Efficient Trust
Establishment in Delay-Tolerant Networks
|
Parallel and Distributed Systems
|
- A
QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
|
MOBILE COMPUTING
|
- A Scalable
Two-Phase Top-Down Specialization Approach for Data Anonymization Using
MapReduce on Cloud
|
Parallel and Distributed Systems
|
- A System
for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis
|
Parallel and Distributed Systems
|
- A Tag
Encoding Scheme against Pollution Attack to Linear Network Coding
|
Parallel and Distributed Systems
|
- Accuracy-Constrained
Privacy-Preserving Access Control Mechanism for Relational Data
|
Data Mining
|
- Balancing
Performance, Accuracy, and Precision for Secure Cloud Transactions
|
Parallel and Distributed Systems
|
- Bandwidth
Distributed Denial of Service: Attacks and Defenses
|
Flooding Attacks
|
- Behavioral
Malware Detection in Delay Tolerant Networks
|
Parallel and Distributed Systems
|
- Cooperative
Caching for Efficient Data Access in Disruption Tolerant Networks
|
Mobile Computing
|
- Cooperative
Spectrum Sharing: A Contract-Based Approach
|
Mobile Computing
|
- Decentralized
Access Control with Anonymous Authentication of Data Stored in Clouds
|
Parallel and Distributed Systems
|
- Enabling
Trustworthy Service Evaluation in Service-Oriented Mobile Social
Networks
|
Parallel and Distributed Systems
|
- Facilitating
Document Annotation Using Content and Querying Value
|
Data Mining
|
- Interpreting
the Public Sentiment Variations on Twitter
|
Data Mining
|
- Keyword
Query Routing
|
Data Mining
|
- k-Zero Day
Safety: A Network Security Metric for Measuring the Risk of Unknown
Vulnerabilities
|
Secure Computing
|
- Modeling of
Distributed File Systems for Practical Performance Analysis
|
Parallel and Distributed Systems
|
- Network
Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks
|
Parallel and Distributed Systems
|
- PACK:
Prediction-Based Cloud Bandwidth and Cost Reduction System
|
Networking
|
- Preserving
Location Privacy in Geo-Social Applications
|
Mobile Computing
|
- Oruta:
Privacy-Preserving Public Auditing for Shared Data in the Cloud
|
Cloud Computing
|
- Product
Aspect Ranking and Its Applications
|
Data Mining
|
- Two
Provably Secure Password Hashing Algorithms
|
Networking
|
- Secure Data
Retrieval for Decentralized Disruption-Tolerant Military Networks
|
Networking
|
- Set
Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed
Groups
|
Data Mining
|
- Hiding in
the Mobile Crowd Location Privacy through Collaboration
|
Networking
|
- Scalable
Distributed Service Integrity Attestation for Software-as-a-Service
Clouds
|
Parallel and Distributed Systems
|
- Automatic
Test Packet Generation
|
Networking
|
- Key-Aggregate
Cryptosystem for Scalable Data Sharing in Cloud Storage
|
Parallel and Distributed Systems
|
- A Cocktail
Approach for Travel Package Recommendation
|
Data Mining
|
- Efficient
Prediction of Difficult Keyword Queries over Databases
|
Data Mining
|
- Multicast
Capacity in MANET with Infrastructure Support
|
Parallel and Distributed Systems
|
- PROFILR:
Toward Preserving Privacy and Functionality in Geosocial Networks
|
|
- Efficient
Authentication for Mobile and Pervasive Computing
|
Mobile Computing
|
- Friendbook:
A Semantic-based Friend Recommendation System for Social Networks
|
Mobile Computing
|
- Optimal
Distributed Malware Defense in Mobile Networks with Heterogeneous
Devices
|
Android
|
- Towards
Differential Query Services in Cost-Efficient Clouds
|
Parallel and Distributed Systems
|
- Expressive,
Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage
|
Parallel and Distributed Systems
|
- Cost-Effective
Resource Allocation of Overlay Routing Relay Nodes
|
Networking
|
- Shared
Authority Based Privacy-preserving Authentication Protocol in Cloud
Computing
|
Cloud
Computing
|
- Privacy-Preserving
Multi-Keyword Ranked Search over Encrypted Cloud Data
|
Parallel and Distributed Systems
|
- Secure Data
Aggregation in Wireless Sensor Networks Filtering out the Attacker’s
Impact
|
Information Forensics and Security
|
- The Design
and Evaluation of An Information Sharing System for Human Networks
|
Parallel and Distributed Systems
|
- Traffic
Pattern-Based Content Leakage Detection for Trusted Content Delivery
Networks
|
Parallel and Distributed Systems
|
- Distributed,
concurrent, and independent access to encrypted cloud databases
|
Parallel and Distributed Systems
|
- Captcha as
Graphical Passwords—A New Security Primitive Based on Hard AI Problems
|
Security
|
- Building
Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
|
Data Mining
|
- Boundary
Cutting for Packet Classification
|
Networking
|
- Leveraging
Social Networks for P2P Content based File Sharing in Disconnected
MANETs
|
Networking
|
- Data Mining
with Big Data
|
Data Mining
|
No comments:
Post a Comment