SNo. |
Code |
TITLE |
DOMAIN |
DOWNLOAD |
1 |
LSD1201 |
A New Cell Counting Based Attack Against Tor |
Networking |
|
2 |
LSD1202 |
AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies |
Wireless Communications |
|
3 |
LSD1203 |
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks |
Image Processing |
|
4 |
LSD1204 |
Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points |
Image Processing |
|
5 |
LSD1205 |
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs |
Secure Computing |
|
6 |
LSD1206 |
Query Planning for Continuous Aggregation Queries |
Data Mining |
|
7 |
LSD1207 |
Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms |
Networking |
|
8 |
LSD1208 |
Robust Face-Name Graph Matching for Movie Character Identify |
Image Processing |
|
9 |
LSD1209 |
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption |
Parallel & Distributed Systems |
|
10 |
LSD1210 |
Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks |
International Conference |
|
11 |
LSD1211 |
Protecting Location Privacy Sensor Networks Against a Global Eavesdropper |
Mobile Computing |
|
12 |
LSD1212 |
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency |
Parallel & Distributed Systems |
|
13 |
LSD1213 |
Topology control in mobile ad hoc networks with cooperative communications |
Mobile Computing |
|
14 |
LSD1214 |
Secure And Efficient Handover Authentication Based On Bilinear Pairing Functions |
Secure Computing |
|
15 |
LSD1215 |
Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs |
Parallel & Distributed Systems |
|
16 |
LSD1216 |
Latency Equalization as a New Network Service Primitive |
Networking |
|
17 |
LSD1217 |
Efficient audit service outsourcing for data integrity in clouds |
Systems & Software |
|
18 |
LSD1218 |
Fair Torrent A Deficit – Based Distributed Algorithm to Ensure Fairness in peer to peer Systems |
Networking |
|
19 |
LSD1219 |
Automatic Reconfiguration for Large Scale Reliable Storage Systems |
Secure Computing |
|
20 |
LSD1220 |
BECAN:A Bandwidth Efficient Cooperative Authentication Scheme |
Parallel & Distributed Systems |
|
21 |
LSD1221 |
Expert Discovery and Interactions in Mixed Service Oriented Systems |
Service Computing |
|
22 |
LSD1222 |
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks |
Information Forensics & Security |
|
23 |
LSD1223 |
Towards Secure and Dependable Storage Services in Cloud Computing |
Service Computing |
|
24 |
LSD1224 |
Network Assisted Mobile Computing with Optimal Uplink Query Processing |
Mobile Computing |
|
25 |
LSD1225 |
Revisiting Defenses against Large-Scale Online Password Guessing Attacks |
Secure Computing |
|
26 |
LSD1226 |
Automatic Image Equalization and Contrast Enhancement Using Gaussian Mixture Modeling |
Image Processing |
|
27 |
LSD1227 |
Cashing in on the Cache in the Cloud |
Cloud Computing |
|
28 |
LSD1228 |
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data |
Cloud Computing |
|
29 |
LSD1229 |
An Online Learning Approach to Occlusion Boundary Detection |
Image Processing |
|
30 |
LSD1230 |
Creating Evolving User Behavior Profiles Automatically |
Knowledge & Data Engineering |
|
31 |
LSD1231 |
Enhanced Data Security Model for Cloud Computing |
Cloud Computing |
|
32 |
LSD1232 |
Cloud Computing Security From Single to Multi-Clouds |
Cloud Computing |
|
33 |
LSD1233 |
Catching Packet Droppers & Modifiers in Wireless Sensor Networks |
Parallel & Distributed Systems |
|
34 |
LSD1234 |
On The Security & Efficiency of Content Distribution via Network Coding |
Secure Computing |
|
35 |
LSD1235 |
Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks |
Mobile Computing |
|
36 |
LSD1236 |
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism |
Secure Computing |
|
37 |
LSD1237 |
Semi Supervised Biased Maximum Margin Analysis for Interactive Image Retrieval |
Image Processing |
|