SNo. |
Code |
TITLE |
DOMAIN |
DOWNLOAD |
1 |
LSD1601 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
Cloud Computing |
|
2 |
LSD1602 |
Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing |
Cloud Computing |
|
3 |
LSD1603 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
Cloud Computing |
|
4 |
LSD1604 |
Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds |
Cloud Computing |
|
5 |
LSD1605 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
Cloud Computing |
|
6 |
LSD1606 |
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage |
Cloud Computing |
|
7 |
LSD1607 |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
Cloud Computing |
|
8 |
LSD1608 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
Cloud Computing |
|
9 |
LSD1609 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
Cloud Computing |
|
10 |
LSD1610 |
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage |
Cloud Computing |
|
11 |
LSD1611 |
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud |
Cloud Computing |
|
12 |
LSD1612 |
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection |
Cloud Computing |
|
13 |
LSD1613 |
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm |
Cloud Computing |
|
14 |
LSD1614 |
A Mixed Generative-Discriminative Based Hashing Method |
Data Mining |
|
15 |
LSD1615 |
Personalized Travel Sequence Recommendation on Multi-Source Big Social Media |
Data Mining |
|
16 |
LSD1616 |
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy |
Data Mining |
|
17 |
LSD1617 |
Text Mining the Contributors to Rail Accidents |
Data Mining |
|
18 |
LSD1618 |
User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors |
Data Mining |
|
19 |
LSD1619 |
Efficient Certificate less Access Control for Wireless Body Area Networks |
Networking |
|
20 |
LSD1620 |
Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage |
Networking |
|
21 |
LSD1621 |
Geographic and Opportunistic Routing for Underwater Sensor Networks |
Networking |
|
22 |
LSD1622 |
Optimizing Cost for Online Social Networks on Geo-Distributed Clouds |
Networking |
|
23 |
LSD1623 |
Secure and Efficient data communication protocol for Wireless Body Area Networks |
Networking |
|
24 |
LSD1624 |
A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks |
Mobile Computing |
|
25 |
LSD1625 |
DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks |
Mobile Computing |
|
26 |
LSD1626 |
Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps |
Mobile Computing |
|
27 |
LSD1627 |
Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs |
Mobile Computing |
|
28 |
LSD1628 |
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices |
Mobile Computing |
|
29 |
LSD1629 |
Authenticated Key Exchange Protocols for Parallel Network File Systems |
Parallel & Distributed Systems |
|
30 |
LSD1630 |
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage System |
Parallel & Distributed Systems |
|
31 |
LSD1631 |
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining |
Secure Computing |
|
32 |
LSD1632 |
ID2S Password-Authenticated Key Exchange Protocols |
Secure Computing |
|
33 |
LSD1633 |
Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases |
INFORMATION FORENSICS & SECURITY |
|
34 |
LSD1634 |
Content-Adaptive Steganography by Minimizing Statistical Detectability |
Image Processing |
|
35 |
LSD1635 |
Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation |
Image Processing |
|
36 |
LSD1636 |
Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data |
Image Processing |
|
37 |
LSD1637 |
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
IOT (INTERNET OF THINGS)
|
|
38 |
LSD1638 |
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys |
SERVICE COMPUTING |
|