S.No |
Code |
Title |
Category |
---|---|---|---|
1 |
LSD1601 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
CLOUD COMPUTING |
2 |
LSD1602 |
Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing |
CLOUD COMPUTING |
3 |
LSD1603 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
CLOUD COMPUTING |
4 |
LSD1604 |
Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds |
CLOUD COMPUTING |
5 |
LSD1605 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
CLOUD COMPUTING |
6 |
LSD1606 |
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage |
CLOUD COMPUTING |
7 |
LSD1607 |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
CLOUD COMPUTING |
8 |
LSD1608 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
CLOUD COMPUTING |
9 |
LSD1609 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
CLOUD COMPUTING |
10 |
LSD1610 |
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage |
CLOUD COMPUTING |
11 |
LSD1611 |
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud |
CLOUD COMPUTING |
12 |
LSD1612 |
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection |
CLOUD COMPUTING |
13 |
LSD1613 |
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm |
CLOUD COMPUTING |
14 |
LSD1614 |
A Mixed Generative-Discriminative Based Hashing Method |
DATA MINING |
15 |
LSD1615 |
Personalized Travel Sequence Recommendation on Multi-Source Big Social Media |
DATA MINING |
16 |
LSD1616 |
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy |
DATA MINING |
17 |
LSD1617 |
Text Mining the Contributors to Rail Accidents |
DATA MINING |
18 |
LSD1618 |
User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors |
DATA MINING |
19 |
LSD1619 |
Efficient Certificate less Access Control for Wireless Body Area Networks |
NETWORKING |
20 |
LSD1620 |
Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage |
NETWORKING |
21 |
LSD1621 |
Geographic and Opportunistic Routing for Underwater Sensor Networks |
NETWORKING |
22 |
LSD1622 |
Optimizing Cost for Online Social Networks on Geo-Distributed Clouds |
NETWORKING |
23 |
LSD1623 |
Secure and Efficient data communication protocol for Wireless Body Area Networks |
NETWORKING |
24 |
LSD1624 |
A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks |
MOBILE COMPUTING |
25 |
LSD1625 |
DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks |
MOBILE COMPUTING |
26 |
LSD1626 |
Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps |
MOBILE COMPUTING |
27 |
LSD1627 |
Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs |
MOBILE COMPUTING |
28 |
LSD1628 |
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices |
MOBILE COMPUTING |
29 |
LSD1629 |
Authenticated Key Exchange Protocols for Parallel Network File Systems |
PARALLEL AND DISTRIBUTED SYSTEMS |
30 |
LSD1630 |
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage System |
PARALLEL AND DISTRIBUTED SYSTEMS |
31 |
LSD1631 |
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining |
SECURE COMPUTING |
32 |
LSD1632 |
ID2S Password-Authenticated Key Exchange Protocols |
SECURE COMPUTING |
33 |
LSD1633 |
Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases |
INFORMATION FORENSICS & SECURITY |
34 |
LSD1634 |
Content-Adaptive Steganography by Minimizing Statistical Detectability |
IMAGE PROCESSING |
35 |
LSD1635 |
Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation |
IMAGE PROCESSING |
36 |
LSD1636 |
Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data |
IMAGE PROCESSING |
37 |
LSD1637 |
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
IOT (INTERNET OF THINGS)
|
38 |
LSD1638 |
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys |
SERVICE COMPUTING |