Welcome To Techspine Solutions

Click Here   to Download IEEE Titles

Click Here   to Download Management Titles

Click Here   to Download Embedded - Mechanical - Automobile Titles

Click Here   to Download Embedded Titles

Click Here   to Download MBA Titles

Click Here   to Download MCom Titles

Click Here   to Download UG BBA, BCom Titles

Click Here   to Download VB 6.0 Titles

iddomaintechnologytitleyearcategory
1NETWORK SECURITYDOTNETDROPS: DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY2018IEEE
2NETWORK SECURITYDOTNETPRIVACY-PRESERVING LOCATION-BASED SERVICES QUERY SCHEME AGAINST QUANTUM ATTACKS2018IEEE
3NETWORK SECURITYDOTNETDYNAMIC PACKET FORWARDING VERIFICATION IN SDN2018IEEE
4NETWORK SECURITYDOTNETA SECURE EXCEPTION MODE FOR FAULT-ATTACK-RESISTANT PROCESSING2018IEEE
5NETWORK SECURITYDOTNETPFP: IMPROVING THE RELIABILITY OF DEDUPLICATION-BASED STORAGE SYSTEMS WITH PER-FILE PARITY2019IEEE
6NETWORK SECURITYDOTNETGENERATION OF SECURE AND RELIABLE HONEYWORDS PREVENTING FALSE DETECTION2019IEEE
7NETWORK SECURITYDOTNETEFFICIENT INTRUSION DETECTION WITH BLOOM FILTERING IN CONTROLLER AREA NETWORKS (CAN)2019IEEE
8NETWORK SECURITYDOTNETA HIGHLY EFFICIENT SIDE CHANNEL ATTACK WITH PROFILING THROUGH RELEVANCE-LEARNING ON PHYSICAL LEAKAGE INFORMATION2019IEEE
9NETWORK SECURITYDOTNETPRIVACY-GUARANTEED TWO-AGENT INTERACTIONS USING INFORMATION-THEORETIC MECHANISMS2017IEEE
10NETWORK SECURITYDOTNETA CROSS TENANT ACCESS CONTROL (CTAC) MODEL FOR CLOUD COMPUTING: FORMAL SPECIFICATION AND VERIFICATION2017IEEE
11NETWORK SECURITYDOTNETSTRONG KEY-EXPOSURE RESILIENT AUDITING FOR SECURE CLOUD STORAGE2017IEEE
12NETWORK SECURITYDOTNETA PRACTICAL SYSTEM FOR PUBLIC-AWARE TARGETED MOBILE ADVERTISING SERVICES2017IEEE
13NETWORK SECURITYDOTNETMINING DEFICIENCIES OF ONLINE REPUTATION SYSTEMS: METHODOLOGIES EXPERIMENTS AND IMPLICATIONS2017IEEE
14NETWORK SECURITYDOTNETAUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS2017IEEE
15NETWORK SECURITYDOTNETA SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD2017IEEE
16NETWORK SECURITYDOTNETA SEMANTICS-AWARE APPROACH TO THE AUTOMATED NETWORK PROTOCOL IDENTIFICATION2017IEEE
17NETWORK SECURITYDOTNETTMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY ACCESS CONTROL SYSTEM IN PUBLIC CLOUD STORAGE2017IEEE
18NETWORK SECURITYDOTNETENABLING FINE-GRAINED MULTI-KEYWORD SEARCHSUPPORTING CLASSIFIED SUB-DICTIONARIES OVER ENCRYPTED CLOUD DATA2017IEEE
19NETWORK SECURITYDOTNETACTIVETRUST: SECURE AND TRUSTABLE ROUTING IN WIRELESS SENSOR NETWORKS2017IEEE
20NETWORK SECURITYDOTNETCHERRY-PICKING RELIABLE PUF BITS WITH DIFFERENTIAL SEQUENCE CODING2016IEEE
21NETWORK SECURITYDOTNETEFFICIENT AND ANONYMOUS MOBILE USER AUTHENTICATION PROTOCOL USING SELF-CERTIFIED PUBLIC KEY CRYPTOGRAPHY FOR MULTI-SERVER ARCHITECTURES2016IEEE
22NETWORK SECURITYDOTNETPPM-HDA: PRIVACY-PRESERVING AND MULTIFUNCTIONAL HEALTH DATA AGGREGATION WITH FAULT TOLERANCE2016IEEE
23NETWORK SECURITYDOTNETA WEB TRAFFIC ANALYSIS ATTACK USING ONLY TIMING INFORMATION2016IEEE
24NETWORK SECURITYDOTNETSTEGANALYSIS FEATURES FOR CONTENT-ADAPTIVE JPEG STEGANOGRAPHY2016IEEE
25NETWORK SECURITYDOTNETAUDITING A CLOUD PROVIDERÆS COMPLIANCE WITH DATA BACKUP REQUIREMENTS: A GAMETHEORETICAL ANALYSIS2016IEEE
26NETWORK SECURITYDOTNETGENERIC AND EFFICIENT CONSTRUCTIONS OF ATTRIBUTE-BASED ENCRYPTION WITH VERIFIABLE OUTSOURCED DECRYPTION2016IEEE
27NETWORK SECURITYDOTNETGROUP SECRET KEY GENERATION IN WIRELESS NETWORKS: ALGORITHMS AND RATE OPTIMIZATION2016IEEE
28NETWORK SECURITYDOTNETPRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE2016IEEE
29NETWORK SECURITYDOTNETANONYMOUS TWO-FACTOR AUTHENTICATION IN DISTRIBUTED SYSTEMS: CERTAIN GOALS ARE BEYOND ATTAINMENT2016IEEE
30NETWORK SECURITYDOTNETDDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS2016IEEE
31NETWORK SECURITYDOTNETCAPTCHA AS GRAPHICAL PASSWORDSùA NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS2016IEEE
32NETWORK SECURITYDOTNETSECRET KEY GENERATION IN THE TWO-WAY RELAY CHANNEL WITH ACTIVE ATTACKERS2016IEEE
33NETWORK SECURITYDOTNETDYNAMIC AUTHENTICATION WITH SENSORY INFORMATION FOR THE ACCESS CONTROL SYSTEMS2016IEEE
34NETWORK SECURITYDOTNETSECURE CONTINUOUS AGGREGATION IN WIRELESS SENSOR NETWORKS2016IEEE
35NETWORK SECURITYDOTNETA SECURE PAYMENT SCHEME WITH LOW COMMUNICATION AND PROCESSING OVERHEAD FOR MULTIHOP WIRELESS NETWORKS2016IEEE
36NETWORK SECURITYDOTNETSPOC: A SECURE AND PRIVACY-PRESERVING OPPORTUNISTIC COMPUTING FRAMEWORK FOR MOBILE-HEALTHCARE EMERGENCY2016IEEE
37NETWORK SECURITYDOTNETPACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS2016IEEE
38NETWORK SECURITYDOTNETOPASS: A USER AUTHENTICATION PROTOCOL RESISTANT TO PASSWORD STEALING AND PASSWORD REUSE ATTACKS2016IEEE
39NETWORK SECURITYDOTNETDOUBLEGUARD: DETECTING INTRUSIONS IN MULTITIER WEB APPLICATIONS2016IEEE
40NETWORKINGDOTNETDETECTING AND MITIGATING TARGET LINK-FLOODING ATTACKS USING SDN2018IEEE
41NETWORKINGDOTNETFLOW MANAGEMENT AND LOAD BALANCING IN DYNAMIC HETEROGENEOUS LANS2018IEEE
42NETWORKINGDOTNETTRAFFIC CLASSIFICATION BASED ON ZERO-LENGTH PACKETS2018IEEE
43NETWORKINGDOTNETFUSO: FAST MULTI-PATH LOSS RECOVERY FOR DATA CENTER NETWORKS2018IEEE
44NETWORKINGDOTNETHIAUTH: HIDDEN AUTHENTICATION FOR PROTECTING SOFTWARE DEFINED NETWORKS2019IEEE
45NETWORKINGDOTNETWORMHOLE: THE HIDDEN VIRUS PROPAGATION POWER OF A SEARCH ENGINE IN SOCIAL NETWORKS2019IEEE
46NETWORKINGDOTNETGENERATION OF SECURE AND RELIABLE HONEYWORDS PREVENTING FALSE DETECTION2019IEEE
47NETWORKINGDOTNETEFFICIENT MULTI-FACTOR AUTHENTICATED KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS2019IEEE
48NETWORKINGDOTNETEFFICIENT MULTIFACTOR AUTHENTICATION KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS2017IEEE
49NETWORKINGDOTNETCOLLABORATIVE AUTHENTICATION IN DECENTRALIZED DENSE MOBILE NETWORKS WITH KEY REDISTRIBUTION2017IEEE
50NETWORKINGDOTNETCONTENT-AWARE CONCURRENT MULTIPATH TRANSFER FOR HIGH-DEFINITION VIDEO STREAMING OVER HETEROGENEOUS WIRELESS NETWORKS2016IEEE
51NETWORKINGDOTNETDISCHARGING THE NETWORK FROM ITS FLOW CONTROL HEADACHES: PACKET DROPS AND HOL BLOCKING2016IEEE
52NETWORKINGDOTNETMOBILITY PREDICTION BASED JOINT STABLE ROUTING AND CHANNEL ASSIGNMENT FOR MOBILE AD HOC COGNITIVE NETWORKS2016IEEE
53NETWORKINGDOTNETSIMULTANEOUSLY GENERATING SECRET AND PRIVATE KEYS IN A COOPERATIVE PAIRWISE-INDEPENDENT NETWORK2016IEEE
54NETWORKINGDOTNETTASK SCHEDULING FOR MAXIMIZING PERFORMANCE AND RELIABILITY CONSIDERING FAULT RECOVERY IN HETEROGENEOUS DISTRIBUTED SYSTEMS IEEE
55NETWORKINGDOTNETTOWARDS DISTRIBUTED OPTIMAL MOVEMENT STRATEGY FOR DATA GATHERING IN WIRELESS SENSOR NETWORKS2016IEEE
56NETWORKINGDOTNETIP FAST REROUTING AND DISJOINT MULTIPATH ROUTING WITH THREE EDGE-INDEPENDENT SPANNING TREES2016IEEE
57NETWORKINGDOTNETTAG-ORDERING POLLING PROTOCOLS IN RFID SYSTEMS2016IEEE
58NETWORKINGDOTNETPACKET-LEVEL NETWORK COMPRESSION: REALIZATION AND SCALING OF THE NETWORK-WIDE BENEFITS2016IEEE
59NETWORKINGDOTNETMAXIMIZING NETWORK TOPOLOGY LIFETIME USING MOBILE NODE ROTATION2016IEEE
60NETWORKINGDOTNETAN EFFICIENT DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS2016IEEE
61NETWORKINGDOTNETA DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS2016IEEE
62NETWORKINGDOTNETAUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS2015IEEE
63NETWORKINGDOTNETAN EFFICIENT DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS2016IEEE
64NETWORKINGDOTNETA DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS2015IEEE
65NETWORKINGDOTNETPACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM2016IEEE
66NETWORKINGDOTNETRELIABLE BULK-DATA DISSEMINATION IN DELAY TOLERANT NETWORKS2016IEEE
67NETWORKINGDOTNETNETWORK CODING AWARE COOPERATIVE MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS2016IEEE
68NETWORKINGDOTNETFAST TRANSMISSION TO REMOTE COOPERATIVE GROUPS: A NEW KEY MANAGEMENT PARADIGM2016IEEE
69NETWORKINGDOTNETDISTORTION-AWARE SCALABLE VIDEO STREAMING TO MULTINETWORK CLIENTS2016IEEE
70NETWORKINGDOTNETA DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS2016IEEE
71NETWORKINGDOTNETA HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS2016IEEE
72NETWORKINGDOTNETMITIGATING ROUTING MISBEHAVIOR IN DISRUPTION TOLERANT NETWORKS2016IEEE
73NETWORKINGDOTNETIMPROVING ENERGY SAVING AND RELIABILITY IN WIRELESS SENSOR NETWORKS USING A SIMPLE CRT-BASED PACKET-FORWARDING SOLUTION2016IEEE
74DATA MININGDOTNETSCALABLE CONTENT-AWARE COLLABORATIVE FILTERING FOR LOCATION RECOMMENDATION2018IEEE
75DATA MININGDOTNETA GENERAL FRAMEWORK FOR IMPLICIT AND EXPLICIT SOCIAL RECOMMENDATION IEEE
76DATA MININGDOTNETACHIEVING DATA TRUTHFULNESS AND PRIVACY PRESERVATION IN DATA MARKETS2018IEEE
77DATA MININGDOTNETCOMPLEMENTARY ASPECT-BASED OPINION MINING2018IEEE
78DATA MININGDOTNETCUSTOMER REVIEWS ANALYSIS WITH DEEP NEURAL NETWORKS FOR E-COMMERCE RECOMMENDER SYSTEMS2018IEEE
79DATA MININGDOTNETDLTA: A FRAMEWORK FOR DYNAMIC CROWDSOURCING CLASSIFICATION TASKS2018IEEE
80DATA MININGDOTNETCOOPERATIVE FRAUD DETECTION MODEL WITH PRIVACY-PRESERVING IN REAL CDR DATASETS2019IEEE
81DATA MININGDOTNETEFFECTIVE HEART DISEASE PREDICTION USING HYBRID MACHINE LEARNING TECHNIQUES2019IEEE
82DATA MININGDOTNETHIERARCHICAL MULTI-CLUE MODELLING FOR POI POPULARITY PREDICTION WITH HETEROGENEOUS TOURISTINFORMATION2019IEEE
83DATA MININGDOTNETMULTI-PARTY HIGH-DIMENSIONAL DATA PUBLISHING UNDER DIFFERENTIAL PRIVACY2019IEEE
84DATA MININGDOTNETPRIVACY-PRESERVING SOCIAL MEDIA DATA PUBLISHING FOR PERSONALIZED RANKING-BASED RECOMMENDATION2019IEEE
85DATA MININGDOTNETA MULTI-LAYER DUAL ATTENTION DEEP LEARNING MODEL WITH REFINED WORD EMBEDDINGS FOR ASPECT-BASED SENTIMENT ANALYSIS2019IEEE
86DATA MININGDOTNETSENTIDIFF: COMBINING TEXTUAL INFORMATION AND SENTIMENT DIFFUSION PATTERNS FOR TWITTER SENTIMENT ANALYSIS2019IEEE
87DATA MININGDOTNETA NEW ROBUST APPROACH FOR REVERSIBLE DATABASE WATERMARKING WITH DISTORTION CONTROL2019IEEE
88DATA MININGDOTNETPERSONAL WEB REVISITATION BY CONTEXT AND CONTENT KEYWORDS WITH RELEVANCE FEEDBACK2019IEEE
89DATA MININGDOTNETEFFICIENT ALGORITHMS FOR MINING TOP-K HIGH UTILITY ITEMSETS2019IEEE
90DATA MININGDOTNETPROBABILISTIC STATIC LOAD-BALANCING OF PARALLEL MINING OF FREQUENT SEQUENCES2017IEEE
91DATA MININGDOTNETSENTIMENT EMBEDDINGS WITH APPLICATIONS TO SENTIMENT ANALYSIS2016IEEE
92DATA MININGDOTNETSIMILARITY MEASURE SELECTION FOR CLUSTERING TIME SERIES DATABASES2016IEEE
93DATA MININGDOTNETSURVEY ON ASPECT-LEVEL SENTIMENT ANALYSIS2016IEEE
94DATA MININGDOTNETTASC:TOPIC-ADAPTIVE SENTIMENT CLASSIFICATION ON DYNAMIC TWEETS2016IEEE
95DATA MININGDOTNETMINING HEALTH EXAMINATION RECORDSùA GRAPH-BASED APPROACH2016IEEE
96DATA MININGDOTNETACTIVE LEARNING FOR RANKING THROUGH EXPECTED LOSS OPTIMIZATION2016IEEE
97DATA MININGDOTNETDISCOVERY OF RANKING FRAUD FOR MOBILE APPS2016IEEE
98DATA MININGDOTNETLEARNING TO RANK USING USER CLICKS AND VISUAL FEATURES FOR IMAGE RETRIEVAL2016IEEE
99DATA MININGDOTNETT-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORATIVE SERVICES2016IEEE
100DATA MININGDOTNETLINQ: A FRAMEWORK FOR LOCATION-AWARE INDEXING AND QUERY PROCESSING2016IEEE
101DATA MININGDOTNETSCALABLE DISTRIBUTED PROCESSING OF K NEAREST NEIGHBOR QUERIES OVER MOVING OBJECTS2016IEEE
102DATA MININGDOTNETRRWùA ROBUST AND REVERSIBLE WATERMARKING TECHNIQUE FOR RELATIONAL DATA2016IEEE
103DATA MININGDOTNETPROGRESSIVE DUPLICATE DETECTION2016IEEE
104DATA MININGDOTNETAUTHENTICATION OF MOVING TOP-K SPATIAL KEYWORD QUERIES2016IEEE
105DATA MININGDOTNETFACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE2016IEEE
106DATA MININGDOTNETFAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS2016IEEE
107DATA MININGDOTNETPRIVACY-PRESERVING AND CONTENT-PROTECTING LOCATION BASED QUERIES2016IEEE
108DATA MININGDOTNETKEYWORD QUERY ROUTING2016IEEE
109DATA MININGDOTNETA SIMILARITY MEASURE FOR TEXT CLASSIFICATION AND CLUSTERING2016IEEE
110DATA MININGDOTNETEFFICIENT AND EFFECTIVE DUPLICATE DETECTION IN HIERARCHICAL DATA2016IEEE
111DATA MININGDOTNETMINING USER QUERIES WITH MARKOV CHAINS: APPLICATION TO ONLINE IMAGE RETRIEVAL2016IEEE
112DATA MININGDOTNETA NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK SESSIONS2016IEEE
113DATA MININGDOTNETANOMALY DETECTION VIA ONLINE OVERSAMPLING PRINCIPAL COMPONENT ANALYSIS2016IEEE
114DATA MININGDOTNETCREATING EVOLVING USER BEHAVIOR PROFILES AUTOMATICALLY2016IEEE
115DATA MININGDOTNETSLICING: A NEW APPROACH FOR PRIVACY PRESERVING DATA PUBLISHING2016IEEE
116DATA MININGDOTNETORGANIZING USER SEARCH HISTORIES2016IEEE
117DATA MININGDOTNETDOUBLE GUARD: DETECTING INTRUSIONS IN MULTITIER WEB APPLICATIONS2016IEEE
118MOBILE COMPUTINGDOTNETA LIGHTWEIGHT SECURE DATA SHARING SCHEME FOR MOBILE CLOUD COMPUTING2019IEEE
119MOBILE COMPUTINGDOTNETMULTI-CDN: TOWARDS PRIVACY IN CONTENT DELIVERY NETWORKS2019IEEE
120MOBILE COMPUTINGDOTNETRISK ASSESSMENT IN SOCIAL NETWORKS BASED ON USER ANOMALOUS BEHAVIOURS2019IEEE
121MOBILE COMPUTINGDOTNETPERSONALIZED PRIVACY-PRESERVING TASK ALLOCATION FOR MOBILE CROWDSENSING2019IEEE
122MOBILE COMPUTINGDOTNETENERGY-EFFICIENT DYNAMIC COMPUTATION OFFLOADING AND COOPERATIVE TASK SCHEDULING IN MOBILE CLOUD COMPUTING2019IEEE
123MOBILE COMPUTINGDOTNETPROVABLY SECURE KEY-AGGREGATE CRYPTOSYSTEMS WITH BROADCAST AGGREGATE KEYS FOR ONLINE DATA SHARING ON THE CLOUD2019IEEE
124MOBILE COMPUTINGDOTNETEFFICIENT MULTIFACTOR AUTHENTICATION KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS2019IEEE
125MOBILE COMPUTINGDOTNETPRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR BIG DATA IN MOBILE CLOUD COMPUTING2017IEEE
126MOBILE COMPUTINGDOTNETA NOVEL BLOCK ENCRYPTION ALGORITHM BASED ON CHAOTIC S-BOX FOR WIRELESS SENSOR NETWORK2017IEEE
127MOBILE COMPUTINGDOTNETAN EFFICIENT INFORMATION MAXIMIZATION BASED ADAPTIVE CONGESTION CONTROL SCHEME IN WIRELESS SENSOR NETWORK2017IEEE
128MOBILE COMPUTINGDOTNETENERGY-EFFICIENT RELAY NODE PLACEMENT IN WIRELESS HETEROGENEOUS NETWORKS WITH CAPACITY CONSTRAINTS2019IEEE
129MOBILE COMPUTINGDOTNETA LOAD-AWARE CLUSTERING MODEL FOR COORDINATED TRANSMISSION IN FUTURE WIRELESS NETWORKS2019IEEE
130MOBILE COMPUTINGDOTNETOPTIMAL RESOURCE ALLOCATION IN RANDOM ACCESS COOPERATIVE COGNITIVE RADIO NETWORKS2019IEEE
131MOBILE COMPUTINGDOTNETPRIVACY AND QUALITY PRESERVING MULTIMEDIA DATA AGGREGATION FOR PARTICIPATORY SENSING SYSTEMS2019IEEE
132MOBILE COMPUTINGDOTNETDISTRIBUTED CHANNEL PROBING FOR EFFICIENT TRANSMISSION SCHEDULING IN WIRELESS NETWORKS2016IEEE
133MOBILE COMPUTINGDOTNETDISTORTION-AWARE CONCURRENT MULTIPATH TRANSFER FOR MOBILE VIDEO STREAMING IN HETEROGENEOUS WIRELESS NETWORKS2016IEEE
134MOBILE COMPUTINGDOTNETPRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS2016IEEE
135MOBILE COMPUTINGDOTNETTOWARDS MAXIMIZING TIMELY CONTENT DELIVERY IN DELAY TOLERANT NETWORKS2016IEEE
136MOBILE COMPUTINGDOTNETA STUDY ON FALSE CHANNEL CONDITION REPORTING ATTACKS IN WIRELESS NETWORKS2016IEEE
137MOBILE COMPUTINGDOTNETCOOPERATIVE PACKET DELIVERY IN HYBRID WIRELESS MOBILE NETWORKS: A COALITIONAL GAME APPROACH2016IEEE
138MOBILE COMPUTINGDOTNETNETWORK-ASSISTED MOBILE COMPUTING WITH OPTIMAL UPLINK QUERY PROCESSING2016IEEE
139MOBILE COMPUTINGDOTNETRELAY SELECTION FOR GEOGRAPHICAL FORWARDING IN SLEEP-WAKE CYCLING WIRELESS SENSOR NETWORKS2016IEEE
140MOBILE COMPUTINGDOTNETVAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS2016IEEE
141MOBILE COMPUTINGDOTNETMITIGATING ROUTING MISBEHAVIOR IN DISRUPTION TOLERANT NETWORKS2016IEEE
142CLOUD COMPUTINGDOTNETEFFICIENT TRACEABLE AUTHORIZATION SEARCH SYSTEM FOR SECURE CLOUD STORAGE2019IEEE
143CLOUD COMPUTINGDOTNETPRIVACY AWARE DATA DEDUPLICATION FOR SIDE CHANNEL IN CLOUD STORAGE2019IEEE
144CLOUD COMPUTINGDOTNETA GAME APPROACH TO MULTI-SERVERS LOAD BALANCING WITH LOAD-DEPENDENT SERVER AVAILABILITY CONSIDERATION2018IEEE
145CLOUD COMPUTINGDOTNETDESIGN OF SECURE AUTHENTICATED KEY MANAGEMENT PROTOCOL FOR CLOUD COMPUTING ENVIRONMENTS2018IEEE
146CLOUD COMPUTINGDOTNETBLOCKCHAIN-BASED PERSONAL HEALTH RECORDS SHARING SCHEME WITH DATAINTEGRITY VERIFIABLE2018IEEE
147CLOUD COMPUTINGDOTNETSECURE ENCRYPTED DATA WITH AUTHORIZED DEDUPLICATION IN CLOUD2019IEEE
148CLOUD COMPUTINGDOTNETEFFICIENT DATA PLACEMENT AND REPLICATION FOR QOS-AWARE APPROXIMATE QUERY EVALUATION OF BIG DATA ANALYTICS2019IEEE
149CLOUD COMPUTINGDOTNETENABLING VERIFIABLE AND DYNAMIC RANKED SEARCH OVER OUTSOURCED DATA2019IEEE
150CLOUD COMPUTINGDOTNETMULTI-AUTHORITY ATTRIBUTE-BASED KEYWORD SEARC OVER ENCRYPTED CLOUD DATA2019IEEE
151CLOUD COMPUTINGDOTNETPRIVACY-PRESERVING MULTI-KEYWORD TOP-K SIMILARITY SEARCH OVER ENCRYPTED DATA2019IEEE
152CLOUD COMPUTINGDOTNETREVOCABLE CLOUD-ASSISTED ATTRIBUTE-BASED SIGNCRYPTION IN PERSONAL HEALTH SYSTEM2019IEEE
153CLOUD COMPUTINGDOTNETIDENTITY-BASED AUDITING FOR SHARED CLOUD DATA WITH EFFICIENT AND SECURE SENSITIVE INFORMATION HIDING2019IEEE
154CLOUD COMPUTINGDOTNETACHIEVING SECURE UNIVERSAL AND FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH2019IEEE
155CLOUD COMPUTINGDOTNETSCHEME OVER ENCRYPTED CLOUD DATA2019IEEE
156CLOUD COMPUTINGDOTNETASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS2017IEEE
157CLOUD COMPUTINGDOTNETA ROBUST REPUTATION MANAGEMENT MECHANISM IN THE FEDERATED CLOUD2017IEEE
158CLOUD COMPUTINGDOTNETPROVABLY SECURE KEY-AGGREGATE CRYPTOSYSTEMS WITH BROADCAST AGGREGATE KEYS FOR ONLINE DATA SHARING ON THE CLOUD2017IEEE
159CLOUD COMPUTINGDOTNETBLOCK DESIGN-BASED KEY AGREEMENT FOR GROUP DATA SHARING IN CLOUD COMPUTING2017IEEE
160CLOUD COMPUTINGDOTNETMULTITENANT ACCESS CONTROL FOR CLOUD-AWARE DISTRIBUTED FILE SYSTEMS2017IEEE
161CLOUD COMPUTINGDOTNETROLLBACK MECHANISMS FOR CLOUD MANAGEMENT APIS USING AI PLANNING2017IEEE
162CLOUD COMPUTINGDOTNETTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM2017IEEE
163CLOUD COMPUTINGDOTNETTOWARDS ACHIEVING DATA SECURITY WITH THE CLOUD COMPUTING ADOPTION FRAMEWORK (CCAF)2017IEEE
164CLOUD COMPUTINGDOTNETA SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA2016IEEE
165CLOUD COMPUTINGDOTNETA SCALABLE DATA CHUNK SIMILARITY BASED COMPRESSION APPROACH FOR EFFICIENT BIG SENSING DATA PROCESSING ON CLOUD2016IEEE
166CLOUD COMPUTINGDOTNETATTRIBUTE-BASED ACCESS CONTROL FOR MULTI-AUTHORITY SYSTEMS WITH CONSTANT SIZE CIPHERTEXT IN CLOUD COMPUTING2016IEEE
167CLOUD COMPUTINGDOTNETFLEXIBLE AND FINE-GRAINED ATTRIBUTE-BASED DATA STORAGE IN CLOUD COMPUTING2016IEEE
168CLOUD COMPUTINGDOTNETIDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD2016IEEE
169CLOUD COMPUTINGDOTNETPRIVACY PRESERVING RANKED MULTI-KEYWORD SEARCH FOR MULTIPLE DATA OWNERS IN CLOUD COMPUTING2016IEEE
170CLOUD COMPUTINGDOTNETPROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA TORAGE IN THE CLOUD2016IEEE
171CLOUD COMPUTINGDOTNETENABLING PERSONALIZED SEARCH OVER ENCRYPTED OUTSOURCED DATA WITH EFFICIENCY IMPROVEMENT2016IEEE
172CLOUD COMPUTINGDOTNETEAVESDROPPING PREVENTION FOR NETWORK CODING ENCRYPTED CLOUD STORAGE SYSTEMS2016IEEE
173CLOUD COMPUTINGDOTNETATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING2016IEEE
174CLOUD COMPUTINGDOTNETDYNAMIC REQUEST REDIRECTION AND RESOURCE PROVISIONING FOR CLOUD-BASED VIDEO SERVICES UNDER HETEROGENEOUS ENVIRONMENT2016IEEE
175CLOUD COMPUTINGDOTNETCONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION2016IEEE
176CLOUD COMPUTINGDOTNETPANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE CLOUD2016IEEE
177CLOUD COMPUTINGDOTNETSHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING2016IEEE
178CLOUD COMPUTINGDOTNETPRIVACY-PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE2016IEEE
179CLOUD COMPUTINGDOTNETA HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION2016IEEE
180CLOUD COMPUTINGDOTNETPACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM2016IEEE
181CLOUD COMPUTINGDOTNETSECURE DEDUPLICATION WITH EFFICIENT AND RELIABLE CONVERGENT KEY MANAGEMENT2016IEEE
182CLOUD COMPUTINGDOTNETKEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE2016IEEE
183CLOUD COMPUTINGDOTNETORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD2016IEEE
184CLOUD COMPUTINGDOTNETPRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA2016IEEE
185CLOUD COMPUTINGDOTNETA SECURE DATA SELF-DESTRUCTING SCHEME IN CLOUD COMPUTING2016IEEE
186PARALLEL AND DISTRIBUTED SYSTEMSDOTNETENERGY EFFICIENT COOPERATIVE COMPUTING IN MOBILE WIRELESS SENSOR NETWORKS2018IEEE
187PARALLEL AND DISTRIBUTED SYSTEMSDOTNETA DIFFERENTIATED CACHING MECHANISM TO ENABLE PRIMARY STORAGE DEDUPLICATION IN CLOUDS2018IEEE
188PARALLEL AND DISTRIBUTED SYSTEMSDOTNETADAPTIVE RESOURCE ALLOCATION AND PROVISIONING IN MULTI-SERVICE CLOUD ENVIRONMENTS2018IEEE
189PARALLEL AND DISTRIBUTED SYSTEMSDOTNETPRIVACY-PRESERVING MULTI-KEYWORD TOP-K SIMILARITY SEARCH OVER ENCRYPTED DATA2018IEEE
190PARALLEL AND DISTRIBUTED SYSTEMSDOTNETFLEXIBLE AND EFFICIENT BLOCKCHAIN-BASED ABE SCHEME WITH MULTI-AUTHORITY FOR MEDICAL ON DEMAND IN TELEMEDICINE SYSTEM2018IEEE
191PARALLEL AND DISTRIBUTED SYSTEMSDOTNETA DISTRIBUTED TRUST EVALUATION PROTOCOL WITH PRIVACY PROTECTION FOR INTERCLOUD2019IEEE
192PARALLEL AND DISTRIBUTED SYSTEMSDOTNETCROWDBC: A BLOCKCHAIN-BASED DECENTRALIZED FRAMEWORK FOR CROWDSOURCING2019IEEE
193PARALLEL AND DISTRIBUTED SYSTEMSDOTNETSECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD2019IEEE
194PARALLEL AND DISTRIBUTED SYSTEMSDOTNETAUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS2016IEEE
195PARALLEL AND DISTRIBUTED SYSTEMSDOTNETTASK SCHEDULING FOR MAXIMIZING PERFORMANCE AND RELIABILITY CONSIDERING FAULT RECOVERY IN HETEROGENEOUS DISTRIBUTED SYSTEMS2016IEEE
196PARALLEL AND DISTRIBUTED SYSTEMSDOTNETAN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD2016IEEE
197PARALLEL AND DISTRIBUTED SYSTEMSDOTNETSECURE AND DISTRIBUTED DATA DISCOVERY AND DISSEMINATION IN WIRELESS SENSOR NETWORKS2016IEEE
198PARALLEL AND DISTRIBUTED SYSTEMSDOTNETSHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING2016IEEE
199PARALLEL AND DISTRIBUTED SYSTEMSDOTNETA PROBABILISTIC MISBEHAVIOR DETECTION SCHEME TOWARD EFFICIENT TRUST ESTABLISHMENT IN DELAY-TOLERANT NETWORKS2016IEEE
200PARALLEL AND DISTRIBUTED SYSTEMSDOTNETHOP-BY-HOP MESSAGE AUTHENTICATION AND SOURCE PRIVACY IN WIRELESS SENSOR NETWORKS2016IEEE
201PARALLEL AND DISTRIBUTED SYSTEMSDOTNETA SECURE PAYMENT SCHEME WITH LOW COMMUNICATION AND PROCESSING OVERHEAD FOR MULTIHOP WIRELESS NETWORKS2016IEEE
202 WEB SERVICEDOTNETFLOW CLASSIFICATION FOR SOFTWARE-DEFINED DATA CENTERS USING STREAM MINING2019IEEE
203 WEB SERVICEDOTNETA CLOUD BROKERAGE ARCHITECTURE FOR EFFICIENT CLOUD SERVICE SELECTION2019IEEE
204 WEB SERVICEDOTNETSECO-LDA: MINING SERVICE CO-OCCURRENCE TOPICS FOR COMPOSITION RECOMMENDATION2019IEEE
205 WEB SERVICEDOTNETQOS-AWARE SERVICE SELECTION USING AN INCENTIVE MECHANISM2019IEEE
206 WEB SERVICEDOTNETRESCUE WINGS: MOBILE COMPUTING AND ACTIVE SERVICES SUPPORT FOR DISASTER RESCUE2018IEEE
207 WEB SERVICEDOTNETSMARTCRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERFACES2018IEEE
208 WEB SERVICEDOTNETTICREC: A PROBABILISTIC FRAMEWORK TO UTILIZE TEMPORAL INFLUENCE CORRELATIONS FOR TIME-AWARE LOCATION RECOMMENDATIONS2016IEEE
209 WEB SERVICEDOTNETNETWORK AND QOS-BASED SELECTION OF COMPLEMENTARY SERVICES2016IEEE
210 WEB SERVICEDOTNETQOS-AWARE WEB SERVICE RECOMMENDATION BY COLLABORATIVE FILTERING2016IEEE
211 WEB SERVICEDOTNETSERVICE-CENTRIC FRAMEWORK FOR A DIGITAL GOVERNMENT APPLICATION2016IEEE
578WEB TECHNOLOGYDOTNETPREVENTION OF DATA LEAKERS IN SPARTIAL DOMAINIEEEIEEE
579WEB TECHNOLOGYDOTNETINFORMATION-THEORETIC OUTLIER DETECTION FOR LARGE-SCALE CATEGORICAL DATAIEEEIEEE
580WEB TECHNOLOGYDOTNETORGANIZING USER SEARCH HISTORIESIEEEIEEE
581WEB TECHNOLOGYDOTNETA MACHINE LEARNING APPROACH FOR IDENTIFYING DISEASE-TREATMENT RELATIONS IN SHORT TEXTSIEEEIEEE
582WEB TECHNOLOGYDOTNETSERVICE-CENTRIC FRAMEWORK FOR A DIGITAL GOVERNMENT APPLICATIONIEEEIEEE
583WEB TECHNOLOGYDOTNETDDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKSIEEEIEEE
584WEB TECHNOLOGYDOTNETCONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTIONIEEEIEEE
585WEB TECHNOLOGYDOTNETSLICING: A NEW APPROACH FOR PRIVACY PRESERVING DATA PUBLISHINGIEEEIEEE
586WEB TECHNOLOGYDOTNETSHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTINGIEEEIEEE
587WEB TECHNOLOGYDOTNETPACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEMIEEEIEEE
588WEB TECHNOLOGYDOTNETFAST NEAREST NEIGHBOR SEARCH WITH KEYWORDSIEEEIEEE
589WEB TECHNOLOGYDOTNETMINING USER QUERIES WITH MARKOV CHAINS: APPLICATION TO ONLINE IMAGE RETRIEVALIEEEIEEE
590WEB TECHNOLOGYDOTNETA NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK SESSIONSIEEEIEEE
591WEB TECHNOLOGYDOTNETANOMALY DETECTION VIA ONLINE OVERSAMPLING PRINCIPAL COMPONENT ANALYSISIEEEIEEE
592WEB TECHNOLOGYDOTNETA SECURE DATA SELF-DESTRUCTING SCHEME IN CLOUD COMPUTINGIEEEIEEE