DOT NET TOPICS

A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage

A New Lightweight Symmetric Searchable Encryption Scheme for String Identification

Achieving Data Truthfulness and Privacy Preservation in Data Markets

An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data

Anonymous and Traceable Group Data Sharing in Cloud Computing

Block Design-based Key Agreement for Group Data Sharing in Cloud Computing

Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing

Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records

Cloud Storage for Electronic Health Records Based on Secret Sharing with Verifiable Reconstruction Outsourcing

Efficient Regular Language Search for Secure Cloud Storage

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

Privacy-Preserving Outsourced Calculation Toolkit in the Cloud

Semantic-based Compound Keyword Search over Encrypted Cloud Data

A Clinical Decision Support Framework for Heterogeneous Data Sources

Flexible Wildcard Searchable Encryption System

Transactional Behavior Verification in Business Process as a Service Configuration

A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds

AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage

Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud.

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection

Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm

A Mixed Generative-Discriminative Based Hashing Method

Personalized Travel Sequence Recommendation on Multi-Source Big Social Media

Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy

Text Mining the Contributors to Rail Accidents

User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors

Efficient Certificateless Access Control for Wireless Body Area Networks

Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage

Geographic and Opportunistic Routing for Underwater Sensor Networks

Optimizing Cost for Online Social Networks on Geo-Distributed Clouds

Secure and Efficient data communication protocol for Wireless Body Area Networks

A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks

DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks

Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps

Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs

WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices

Authenticated Key Exchange Protocols for Parallel Network File Systems

Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems

Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining

ID2S Password-Authenticated Key Exchange Protocols

Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases

Content-Adaptive Steganography by Minimizing Statistical Detectability

Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation

Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data

EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data

Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Cloud-Based Multimedia Content Protection System

Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds

Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

PSMPA: Patient Self-Controllable and Multi-Level Privacy- Preserving Cooperative Authentication in Distributed m- Healthcare Cloud Computing System

SelCSP: A Framework to Facilitate Selection of Cloud Service Providers

Discovery of Ranking Fraud for Mobile Apps

PAGE: A Partition Aware Engine for Parallel Graph Computation

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites

Query Aware Determinization of Uncertain Objects

Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization

Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis

Universal Network Coding-Based Opportunistic Routing for Unicast

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks

Optimal Configuration of Network Coding in Ad Hoc Networks

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

Authenticated Key Exchange Protocols for Parallel Network File Systems

Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System

An Attribute-Assisted Reranking Model for Web Image Search

Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images

Detection and Rectification of Distorted Fingerprints

Eye Gaze Tracking With a Web Camera in a Desktop Environment

Learning Fingerprint Reconstruction: From Minutiae to Image

Multiview Alignment Hashing for Efficient Image Search

Single Image Superresolution Based on Gradient Profile Sharpness

Steganography Using Reversible Texture Synthesis

Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation

Click to See More

This project contains:

Base Paper

Flow Diagram

Source Code

Screenshots

Web shots

Running procedure video

Complete PPT

readme

Free Enquiry Now!