Anda di halaman 1dari 9

SNO

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30

31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61

62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87

IEEE-JAVA-2014-2015 TITLES
A Hybr id Cloud Approach for Secure Authorized Deduplication

A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Red

A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Syst
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
Distributed , Concurrent , and Independent Access to Encrypted Cloud Databases
Expressive , Efficient , and Revocable Data Access Control for Multi - Authority Cloud Storage
Key - Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Performance and cost evaluation of an adaptive encryption architecture for cloud databases
Scalable Distributed Service Integrity Attestation for Software-as-a- Service Clouds
Towards Differential Query Services in Cost - Efficient Clouds
A Cocktail Approach for Travel Package Recommendation
A Super modularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
Data Mining with Big Data
Dealing With Concept Drifts in Process Mining
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
Efficient Prediction of Difficult Keyword Queries over Databases
Facilitating Document Annotation using Content and Querying Value
Fast Nearest Neighbor Search with Keywords
Incremental Affinity Propagation Clustering Based on Message Passing
Keyword Query Routing
Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
Online Feature Selection and Its Applications
Personalized Recommendation Combining User Interest and Social Circle
Privacy-Preserving Enhanced Collaborative Tagging

Secure Outsourced Attribute-Based Signatures


Security Evaluation of Pattern Classifiers under Attack
Supporting Privacy Protection in Personalized Web Search
Towards Online Shortest Path Computation
XS Path : Navigation on XML Schemas Made Easy
Captcha as Graphical PasswordsA New Security Primitive Based on Hard AI Problems
Personalized Geo-Speci fic Tag Recommendation for Photos on Social Websites
An Incentive Frame work for Cellular Traffic Off loading
Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
Co-operative Caching for Efficient Data Access in Disruption Tolerant Networks
Efficient Authentication for Mobile and Pervasive Computing
Face-to-Face Proximity Estimation Using Bluetooth on Smartphones
A Semantic-based Friend Recommendation System for Social Networks
Keylogging-resistant Visual Authentication Protocols
Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices
Preserving Location Privacy in Geo-Social Applications
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
Automatic Test Packet Generation

Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control C
HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
Boundary Cutting for Packet Classi fication
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
A System for Denial-of-Ser vice Attack Detection Based on Multivar iate Correlation Analysis
A Two-stage Deanonymization Attack Against Anonymized Social Networks
Behavioral Malware Detection in Delay Tolerant Networks
Enabling Trust worthy Service Evaluation in Service - Oriented Mobile Social Networks
Exploiting Service Similarity for Privacy in Location - Based Search Queries
Loca Ward : A Security and Privacy Aware Location - Based Rewarding System

On False Data - Injection Attacks against Power System State Estimation : Modeling and Counter m

On the Security of Trustee-Based Social Authentications


Private Searching on Streaming Data Based on Keyword Frequency
RRE : A Game - Theoretic Intrustion Response and Recovery Engine
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attackers Impact
Secure Outsourced Attr ibute-based Signatures
SOS: A Distributed Mobile Q&A System Based on Social Networks

The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algo
The Design and Evaluation of An Information Sharing System for Human Networks
Traffic Pattern-Based Content leakage Detection for Trusted Content Delivery Networks
Captcha as Graphical PasswordsA New Security Primitive Based on Hard AI Problems
Efficient and Privacy - Aware Data Aggregation in Mobile Sensing
PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks
Top-k Query Result Completeness Verification in Tiered Sensor Networks
Web Service Recommendation via Exploiting Location and QoS Information
Privacy - Enhanced Web Service Composition
A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks
Catch Me If You Can Evaluating Android
Collaborative Policy Administration
Context-based Access Control Systems
Context-driven Prescription-Based Personal Activity
Cooperative Positioning and Tracking in Disruption Tolerant Networks
GreenDroid Automated Diagnosis of Energy Inefficiency for Smartphone Applications
Effective Risk Communication for Android Apps
MOSES Supporting and Enforcing Security
Hiding in the Mobile Crowd Location

DOMAIN
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining

Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Image Processing
Image Processing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Net Working
Net Working
Net Working
Net Working
Net Working
Net Working
Net Working
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System

Parllel Distriuting System


Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Secure Computing
Secure Computing
Secure Computing
Secure Computing
Service Computing(web services)
Service Computing(web services)
Android
Android
Android
Android
Android
Android
Android
Android
Android
Android

Anda mungkin juga menyukai