1
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding.
CLOUD COMPUTING
2012/.NET
2
Cloud Computing Security From Single to Multi-Clouds.CLOUD COMPUTING (IEEE CONFERENCE)
2012/.NET
3
Enhanced Data Security Model for Cloud Computing
CLOUD COMPUTING (IEEE CONFERENCE)
2012/.NET
4
Ensuring Distributed Accountability for Data Sharing in the Cloud. CLOUD COMPUTING
2012/.NET
5
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing.
CLOUD COMPUTING
2012/.NET
6
Outsourced Similarity Search on Metric Data Assets.CLOUD COMPUTING
2012/.NET
7
Privacy-Preserving Public Auditing for Secure Cloud Storage
CLOUD COMPUTING
2012/.NET
8
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption.
CLOUD COMPUTING
2012/.NET
9
Toward Secure and Dependable Storage Services in Cloud Computing. CLOUD COMPUTING
2012/.NET
10
A Query Formulation Language for the data web
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
11
Creating Evolving User Behavior Profiles Automatically
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
12
D-Cache: Universal Distance Cache for Metric Access Methods
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
13
DDD: A New Ensemble Approach for Dealing with Concept Drift
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
14
Efficient Computation of Range Aggregates against Uncertain Location-Based Queries KNOWLEDGE AND DATA ENGINEERING
2012/.NET
15
Efficient Fuzzy Type-Ahead Search in XML Data
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
16
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
17
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
18
Measuring the Sky: On Computing Data Cubes via Skylining the Measures
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
19
Mining Web Graphs for Recommendations
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
20
Organizing User Search Histories
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
21
Publishing Search Logs—A Comparative Study of Privacy
Guarantees
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
22
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators KNOWLEDGE AND DATA ENGINEERING
2012/.NET
23
ROAD: A New Spatial Object Search Framework for Road
Networks
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
24
Scalable Learning of Collective Behavior
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
25
Slicing: A New Approach for Privacy Preserving Data Publishing
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
26
Tree-Based Mining for Discovering Patterns of Human
Interaction in Meetings
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
27
Bounding the Impact of Unbounded Attacks in
Stabilization
PARALLEL AND DISTRIBUTED SYSTEMS
2012/.NET
28
Catching Packet Droppers and Modifiers in Wireless Sensor Networks
PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET
29
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
PARALLEL AND DISTRIBUTED SYSTEMS
2012/.NET
30
A New Cell-Counting-Based Attack Against Tor NETWORKING
2012/.NET
31
Optimal Source-Based Filtering of Malicious Traffic
NETWORKING
2012/.NET
32
Topology Control in Mobile AD-HOC Networks with Cooperative Communications
NETWORKING (IEEE JOURNAL)
2012/.NET
33
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network
SECURE COMPUTING (IJCA)
2012/.NET
34
Design and Implementation of TARF: A Trust-Aware
Routing Framework for WSNs
SECURE COMPUTING
2012/.NET
35
ES-MPICH2: A Message Passing Interface with Enhanced
Security
SECURE COMPUTING
2012/.NET
36
On the Security and Efficiency of Content Distribution via
Network Coding
SECURE COMPUTING
2012/.NET
37
SPOC: A Secure and Privacy-preserving Opportunistic
Computing Framework forMobile-Healthcare Emergency
SECURE COMPUTING
2012/.NET
38
A Novel Data Embedding Method Using Adaptive Pixel Pair
Matching
IMAGE PROCESSING
2012/.NET
39
A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group
IMAGE PROCESSING
2012/.NET
40
Active Visual Segmentation
IMAGE PROCESSING
2012/.NET
41
Image Segmentation Based on the Poincaré Map Method
IMAGE PROCESSING
2012/.NET
42
K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER
IMAGE PROCESSING (IJEST)
2012/.NET
43
Multiple Exposure Fusion for High Dynamic Range Image
Acquisition
IMAGE PROCESSING
2012/.NET
44
Semi-supervised Biased Maximum Margin Analysis for
Interactive Image Retrieval
IMAGE PROCESSING
2012/.NET
45
Smile Detection by Boosting Pixel Differences
IMAGE PROCESSING
2012/.NET
46
View-invariant action recognition based on Artificial
Neural Networks
IMAGE PROCESSING
2012/.NET
47
Cooperative Download in Vehicular Environments
MOBILE COMPUTING
2012/.NET
48
Distributed Throughput Maximization in Wireless
Networks via Random Power Allocation
MOBILE COMPUTING
2012/.NET
49
Network Assisted Mobile Computing with Optimal Uplink
Query Processing
MOBILE COMPUTING
2012/.NET
50
Protecting Location Privacy in Sensor Networks against a
Global Eavesdropper
MOBILE COMPUTING
2012/.NET
51
Toward Reliable Data Delivery for Highly Dynamic Mobile
Ad Hoc Networks
MOBILE COMPUTING
2012/.NET
52
Revisiting Defenses against Large-Scale Online Password
Guessing Attacks
SECURE COMPUTING
2012/.NET
53
A Novel Anti phishing framework based on visual cryptography
IMAGE PROCESSING
2012/.NET
54
AMPLE: An Adaptive Traffic Engineering
System Based on
Virtual Routing Topologies
NETWORKING (JOURNAL)
2012/.NET
55
Robust Face-Name Graph Matching for Movie Character
Identification
MULTIMEDIA
2012/.NET
56
Low-Complexity Compression Method for Hyperspectral
Images Based on Distributed Source Coding
IMAGE PROCESSING
2012/.NET
57
Balancing the Trade-Offs between Query Delay and Data
Availability in MANETs
PARALLEL AND DISTRIBUTED SYSTEMS
2012/.NET
58
Efficient Multidimensional Fuzzy Search for Personal
Information Management Systems
KNOWLEDGE AND DATA ENGINEERING
2012/.NET
59
Robustness of Offline Signature Verification Based on Gray
Level Features
IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY
2012/.NET
60
Controllable SecureWatermarking Technique for Tradeoff
Between Robustness and Security
IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY
2012/.NET
61
A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition
IMAGE PROCESSING
2012/.NET
61
A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition
IMAGE PROCESSING
2012/.NET
62
Towards Accurate Mobile Sensor Network
Localization in Noisy Environments
MOBILE COMPUTING
2012/.NET
63
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism
SECURE COMPUTING
2012/.NET
64
Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning
LEARNING TECHNOLOGIES
2012/.NET
65
Multi-biometric Cryptosystems Based on Feature-Level Fusion
IMAGE PROCESSING
2012/.NET
Download Base papers:
https://rapidshare.com/files/2544105175/Dot NET.rar