Professional Documents
Culture Documents
42 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage IEEE 2014 61 Attribute-Based Encryption With Verifiable Outsourced Decryption IEEE 2013
A Novel Economic Sharing Model in a Federation of Selfish Cloud Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing
43 IEEE 2014 62 IEEE 2013
Providers Storage System
Dynamic Resource Allocation using Virtual Machines for Cloud
44 NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds IEEE 2014 63 IEEE 2013
Computing Environment
Scalable Distributed Service Integrity Attestation for Software-as-a-
45 IEEE 2014 64 Govcloud: Using Cloud Computing in Public Organizations IEEE 2013
Service Clouds
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Scalable and Secure Sharing of Personal Health Records in Cloud
46 IEEE 2014 65 IEEE 2013
Data Computing using Attribute-based Encryption
47 Proactive Workload Management in Hybrid Cloud Computing IEEE 2014 66 Privacy-Preserving Public Auditing for Secure Cloud Storage IEEE 2013
Enhancing Data Security and Data Integrity Using HASBE Scheme in Cloud
55 IEEE 2013 6 Secure Outsourced Attribute-Based Signatures IEEE 2015
Environment
NETWORKING NETWORKING
Generating Searchable Public-Key Ciphertexts Intrusion detection system(IDS) using layered based approaches for
20 IEEE 2015 39 IEEE 2014
with Hidden Structures for Fast Keyword Search finding attacks
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor IEEE 2014
21 FRAppE: Detecting Malicious Facebook Applications IEEE 2015 40 Networks
Revealing the Trace of High-Quality JPEG Compression Through Secure Data Retrieval for Decentralized Disruption-Tolerant Military
22 IEEE 2015 41 IEEE 2014
Quantization Noise Analysis Networks
SmartCrawler: A Two-stage Crawler for Access Control in Decentralized Online Social Networks: Applying a
23 IEEE 2015 42 IEEE 2014
Efficiently Harvesting Deep-Web Interfaces Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
Data Collection in Multi-Application Sharing Privacy-Preserving Distributed Profile Matching in Proximity-based
24 IEEE 2015 43 IEEE 2014
Wireless Sensor Networks Mobile Social Networks
A Lightweight Secure Scheme for Detecting Provenance Forgery and
25 IEEE 2015 44 Participatory Privacy: Enabling Privacy in Participatory Sensing IEEE 2014
Packet Drop Attacks in Wireless Sensor Networks
Privacy-Preserving Optimal Meeting Location Determination on Mobile Optimizing Cloud Resources for Delivering IPTV Services through
26 IEEE 2014 45 IEEE 2014
Devices Virtualization
A System for Denial-of-Service Attack Detection Based on Multivariate DCIM: Distributed Cache Invalidation Method for Maintaining Cache
27 IEEE 2014 46 IEEE 2014
Correlation Analysis Consistency in Wireless Mobile Networks
A System for Denial-of-Service Attack Detection Based on Multivariate
28 IEEE 2014 47 EAACK—A Secure Intrusion-Detection System for MANETs IEEE 2013
Correlation Analysis
Behavioral Detection and Containment of Proximity Malware in Delay EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc
29 IEEE 2014 48 IEEE 2013
Tolerant Networks Networks
Dynamic Trust Management for Delay Tolerant Networks and Its Behavior Rule Specification-based Intrusion Detection for Safety Critical
30 IEEE 2014 49 IEEE 2014
Application to Secure Routing Medical Cyber Physical Systems
GAODV: A Modified AODV against single and collaborative Black Hole
31 Reliable Energy Efficient Routing Algorithms in Wireless Ad Hoc Networks IEEE 2014 50 IEEE 2013
attacks in MANETs
E-MACs: Towards More Secure and More Efficient Constructions of Secure IEEE 2014 CDS-Based Virtual Backbone Construction With Guaranteed Routing
32 51 IEEE 2013
Channels Cost in Wireless Sensor Networks
Channel Aware Encryption and Decision Fusion for Wireless Sensor
33 Optimal Multicast Capacity and Delay Tradeoffs in MANETs IEEE 2014 52 IEEE 2013
Networks
STARS: A Statistical Traffic Pattern Discovery System for Anonymous Evaluating the Vulnerability of Network Mechanisms to Sophisticated
34 IEEE 2014 53 IEEE 2013
MANET communications DDoS Attacks
66 The detection and defence of DoS attack for wireless sensor network IEEE 2013 9 Research Directions for Engineering Big Data Analytics Software IEEE 2015
An Optimal Distributed Malware Defense System for Mobile Networks Co-Extracting Opinion Targets and Opinion Words from Online Reviews
67 IEEE 2014 10 IEEE 2015
with Heterogeneous Devices Based on the Word Alignment Model
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Discover the Expert: Context-Adaptive Expert Selection for Medical
68 IEEE 2013 11 IEEE 2015
Networks Diagnosis
Toward Privacy Preserving and Collusion Resistance in a Location Proof Identity-based Encryption with Outsourced Revocation in Cloud
69 IEEE 2013 12 IEEE 2015
Updating System Computing
Adding Persuasive features in Graphical Password to increase the capacity IEEE 2013
70 13 PAGE: A Partition Aware Engine for Parallel Graph Computation IEEE 2015
of KBAM
Constructing a Global Social Service Network
71 Hacktivism Trends, Digital Forensic Tools and Challenges: A Survey IEEE 2013 14 IEEE 2015
for Better Quality of Web Service Discovery
21 Rule-Based Method for Entity Resolution IEEE 2015 40 Crowd sourcing Predictors of Behavioral Outcomes IEEE 2014
Secure Distributed Deduplication Systems with An Ontology-based Framework for Context-aware Adaptive E-learning
22 IEEE 2015 41 IEEE 2014
Improved Reliability System
SmartCrawler: A Two-stage Crawler for
23 IEEE 2015 42 PMSE: A Personalized Mobile Search Engine IEEE 2014
Efficiently Harvesting Deep-Web Interfaces
24 Exploiting Service Similarity for Privacy in Location Based Search Querier IEEE 2014 43 SUSIE: Search Using Services and Information Extraction IEEE 2014
29 Efficient Ranking on Entity Graphs with Personalized Relationships IEEE 2014 48 Efficient Instant-Fuzzy Search with Proximity Ranking IEEE 2014
30 Secure Mining of Association Rules in Horizontally Distributed Databases IEEE 2014 49 Keyword Query Routing IEEE 2014
9 Learning to Rank Image Tags With Limited Training Examples IEEE 2015 3 Research Directions for Engineering Big Data Analytics Software IEEE 2015
21 Combined texture and Shape Features for Content Based Image Retrieval IEEE 2013 6 Sesame: A Secure and Convenient Mobile Solution IEEE 2015
22 An Encryption and Decryption Algorithm for Image Based on DNA IEEE 2013 7 Anti-theft for Android Based Devices IEEE 2014
Steganography using Genetic Algorithm along with Visual Cryptography Location Based Encrypted to improve the Security of Data Acess in Cloud IEEE 2014
23 IEEE 2013 8
for Wireless Network Application Computing
Reversible Data Hiding in Encrypted Images by Reserving Room before Wireless Sensor Networks Using Android Virtual Devices and Near Field
24 IEEE 2013 9 IEEE 2014
Encryption CommunicationPeer-To-Peer Emulation
Privacy -Preserving Optimal meeting Location Determination on Mobile
25 Securing Visual Cryptographic Shares using Public Key Encryption IEEE 2013 10 IEEE 2014
Devices
For further details contact: 14 Balancing the Trade Off Between query delay & Data Availability IEEE 2014
52-53, 2nd Floor, 8th F Main, Near ICICI Bank, 16 R3 reliable rooting enhancement for WSN IEEE 2014
Phone: 080-4130 7435, 98451 66723, 98866 92401 18 Cluster Based Certificate Revocation with Vindication Capability IEEE 2014