S.No |
Code |
Title |
Category |
---|---|---|---|
1 |
LSD1201 |
A New Cell Counting Based Attack Against Tor |
NETWORKING |
2 |
LSD1202 |
AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies |
WIRELESS COMMUNICATIONS |
3 |
LSD1203 |
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks |
IMAGE PROCESSING |
4 |
LSD1204 |
Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points |
IMAGE PROCESSING |
5 |
LSD1205 |
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs |
SECURE COMPUTING |
6 |
LSD1206 |
Query Planning for Continuous Aggregation Queries |
DATA MINING |
7 |
LSD1207 |
Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms |
NETWORKING |
8 |
LSD1208 |
Robust Face-Name Graph Matching for Movie Character Identify |
IMAGE PROCESSING |
9 |
LSD1209 |
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption |
PARALLEL & DISTRIBUTED SYSTEMS |
10 |
LSD1210 |
Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks |
INTERNATIONAL CONFERENCE |
11 |
LSD1211 |
Protecting Location Privacy Sensor Networks Against a Global Eavesdropper |
MOBILE COMPUTING |
12 |
LSD1212 |
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency |
PARALLEL & DISTRIBUTED SYSTEMS |
13 |
LSD1213 |
Topology control in mobile ad hoc networks with cooperative communications |
MOBILE COMPUTING |
14 |
LSD1214 |
Secure And Efficient Handover Authentication Based On Bilinear Pairing Functions |
SECURE COMPUTING |
15 |
LSD1215 |
Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs |
PARALLEL & DISTRIBUTED SYSTEMS |
16 |
LSD1216 |
Latency Equalization as a New Network Service Primitive |
NETWORKING |
17 |
LSD1217 |
Efficient audit service outsourcing for data integrity in clouds |
SYSTEMS & SOFTWARE |
18 |
LSD1218 |
Fair Torrent A Deficit – Based Distributed Algorithm to Ensure Fairness in peer to peer Systems |
NETWORKING |
19 |
LSD1219 |
Automatic Reconfiguration for Large Scale Reliable Storage Systems |
SECURE COMPUTING |
20 |
LSD1220 |
BECAN:A Bandwidth Efficient Cooperative Authentication Scheme |
PARALLEL & DISTRIBUTED SYSTEMS |
21 |
LSD1221 |
Expert Discovery and Interactions in Mixed Service Oriented Systems |
SERVICES COMPUTING |
22 |
LSD1222 |
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks |
INFORMATION FORENSICS & SECURITY |
23 |
LSD1223 |
Towards Secure and Dependable Storage Services in Cloud Computing |
SERVICES COMPUTING |
24 |
LSD1224 |
Network Assisted Mobile Computing with Optimal Uplink Query Processing |
MOBILE COMPUTING |
25 |
LSD1225 |
Revisiting Defenses against Large-Scale Online Password Guessing Attacks |
SECURE COMPUTING |
26 |
LSD1226 |
Automatic Image Equalization and Contrast Enhancement Using Gaussian Mixture Modeling | IMAGE PROCESSING |
27 |
LSD1227 |
Cashing in on the Cache in the Cloud | CLOUD COMPUTING |
28 |
LSD1228 |
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data |
CLOUD COMPUTING |
29 |
LSD1229 |
An Online Learning Approach to Occlusion Boundary Detection |
IMAGE PROCESSING |
30 |
LSD1230 |
Creating Evolving User Behavior Profiles Automatically |
KNOWLEDGE & DATA ENGINEERING |
31 |
LSD1231 |
Enhanced Data Security Model for Cloud Computing |
CLOUD COMPUTING |
32 |
LSD1232 |
Cloud Computing Security From Single to Multi-Clouds |
CLOUD COMPUTING |
33 |
LSD1233 |
Catching Packet Droppers & Modifiers in Wireless Sensor Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
34 |
LSD1234 |
On The Security & Efficiency of Content Distribution via Network Coding |
SECURE COMPUTING |
35 |
LSD1235 |
Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks |
MOBILE COMPUTING |
36 |
LSD1236 |
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism |
SECURE COMPUTING |
37 |
LSD1237 |
Semi Supervised Biased Maximum Margin Analysis for Interactive Image Retrieval |
IMAGE PROCESSING |