| 1. |
A robust digital watermarking scheme for video copyright protection in the wavelet domain |
 |
 |
| 2. |
Orchestrating Bulk Data Transfers across geo-distributed datacenters |
 |
 |
| 3. |
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
 |
 |
| 4. |
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation |
 |
 |
| 5. |
Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage |
 |
 |
| 6. |
Secure Auditing and Deduplicating Data in Cloud |
 |
 |
| 7. |
Identity-based Encryption with Outsourced Revocation in Cloud Computing |
 |
 |
| 8. |
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation |
 |
 |
| 9. |
Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem |
 |
 |
| 10. |
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory |
 |
 |
| 11. |
An efficient algorithm for the bursting of service-based applications in hybrid Clouds |
 |
 |
| 12. |
Cloud-based Multimedia Content Protection System |
 |
 |
| 13. |
Combining Efficiency, Fidelity, and Flexibility in Resource Information Services |
 |
 |
| 14. |
Cloud Armor Supporting Reputation-based Trust Management for Cloud Services |
 |
 |
| 15. |
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications |
 |
 |
| 16. |
Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds |
 |
 |
| 17. |
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption |
 |
 |
| 18. |
Audit Free Cloud Storage via Deniable Attribute based Encryption |
 |
 |
| 19. |
CHARM: A Cost-efficient Multi cloud Data Hosting Scheme with High Availability |
 |
 |
| 20. |
Demystifying the Clouds: Harnessing Resource Utilization Models for Cost Effective Infrastructure Alternatives |
 |
 |
| 21. |
Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
 |
 |
| 22. |
Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud |
 |
 |
| 23. |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
 |
 |
| 24. |
Enabling Cloud Storage Auditing with Key Exposure Resistance |
 |
 |
| 25. |
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage |
 |
 |
| 26. |
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices |
 |
 |
| 27. |
Privacy Preserving Public Auditing for Regenerating Code Based Cloud Storage |
 |
 |
| 28. |
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud |
 |
 |
| 29. |
Provable Multi copy Dynamic Data Possession in Cloud Computing Systems |
 |
 |
| 30. |
Reactive Resource Provisioning Heuristics for Dynamic Data flows on Cloud Infrastructure |
 |
 |
| 31. |
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing |
 |
 |
| 32. |
Reducing Fragmentation for In-line De duplication Backup Storage via Exploiting Backup History and Cache Knowledge |
 |
 |
| 33. |
Secure Auditing and De duplicating Data in Cloud |
 |
 |
| 34. |
Secure Distributed De duplication Systems with Improved Reliability |
 |
 |
| 35. |
Public Integrity Auditing for Dynamic Data Sharing with Multi User Modification |
 |
 |
| 36. |
Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning |
 |
 |
| 37. |
Cloud-Trust a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds |
 |
 |
| 38. |
CPU Provisioning Algorithms for Service Differentiation in Cloud-Based Environments |
 |
 |
| 39. |
A secure data self-destructing scheme in cloud computing |
 |
 |
| 40. |
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage |
 |
 |
| 41. |
Discovery of Ranking Fraud for Mobile Apps |
 |
 |
| 42. |
Towards Effective Bug Triage with Software Data Reduction Techniques |
 |
 |
| 43. |
Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions |
 |
 |
| 44. |
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data |
 |
 |
| 45. |
Rule-Based Method for Entity Resolution |
 |
 |
| 46. |
Subgraph Matching with Set Similarity in a Large Graph Database |
 |
 |
| 47. |
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites |
 |
 |
| 48. |
Fast Best-Effort Pattern Matching in Large Attributed Graphs |
 |
 |
| 49. |
CAHR: A Contextually Adaptive Home-Based Rehabilitation Framework |
 |
 |
| 50. |
Query Aware Determinization of Uncertain Objects |
 |
 |
| 51. |
PAGE: A Partition Aware Engine for Parallel Graph Computation |
 |
 |
| 52. |
Active Learning for Ranking through Expected Loss Optimization |
 |
 |
| 53. |
RRW – A Robust and Reversible Watermarking Technique for Relational Data |
 |
 |
| 54. |
Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces |
 |
 |
| 55. |
Learning to Rank Image Tags with Limited Training Examples |
 |
 |
| 56. |
Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image |
 |
 |
| 57. |
Multiview Alignment Hashing for Efficient Image |
 |
 |
| 58. |
Single Image Super-Resolution Based on Gradient Profile Sharpness |
 |
 |
| 59. |
Detection and Rectification of Distorted Fingerprints |
 |
 |
| 60. |
Learning Fingerprint Reconstruction: From Minutiae to Image |
 |
 |
| 61. |
An Attribute assisted Re ranking Model for Web Image Search |
 |
 |
| 62. |
Steganography Using Reversible Texture Synthesis/strong> |
 |
 |
| 63. |
Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images |
 |
 |
| 64. |
FRAppE: Detecting Malicious Facebook Applications |
 |
 |
| 65. |
Key recovery Attacks on KIDS, a Keyed Anomaly Detection System |
 |
 |
| 66. |
Authenticated Key Exchange Protocols for Parallel Network File Systems |
 |
 |
| 67. |
Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword Search |
 |
 |
| 68. |
Secure Distributed De duplication Systems with Improved Reliability |
 |
 |
| 69. |
A Computational Dynamic Trust Model for User Authorization |
 |
 |
| 70. |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
 |
 |
| 71. |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
 |
 |
| 72. |
A Computational Dynamic Trust Model for User Authorization |
 |
 |
| 73. |
Secure Distributed Deduplication Systems with Improved Reliability |
 |
 |
| 74. |
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel |
 |
 |
| 75. |
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations |
 |
 |
| 76. |
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption |
 |
 |
| 77. |
A Trusted IaaS Environment with Hardware Security Module |
 |
 |
| 78. |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
 |
 |
| 79. |
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds |
 |
 |
| 80. |
Data Collection in Multi-Application Sharing Wireless Sensor Networks |
 |
 |
| 81. |
Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks |
 |
 |
| 82. |
Data Collection in Multi Application Sharing Wireless Sensor Networks |
 |
 |
| 83. |
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks |
 |
 |
| 84. |
User-Defined Privacy Grid System for Continuous Location-Based Services |
 |
 |
| 85. |
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks |
 |
 |
| 86. |
Optimum Power Allocation in Sensor Networks for Active Radar Applications |
 |
 |
| 87. |
Efficient Data Query in Intermittently Connected Mobile Ad Hoc Social Networks |
 |
 |
| 88. |
Defending Against Collaborative Attacks by Malicious Nodes in MANETs A Cooperative Bait Detection Approach |
 |
 |
| 89. |
Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis |
 |
 |
| 90. |
Detecting Malicious Face book Applications |
 |
 |