1 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding.
CLOUD COMPUTING 2012/.NET
2 Cloud Computing Security From Single to Multi-Clouds.CLOUD COMPUTING (IEEE CONFERENCE) 2012/.NET
3 Enhanced Data Security Model for Cloud Computing CLOUD COMPUTING (IEEE CONFERENCE) 2012/.NET
4 Ensuring Distributed Accountability for Data Sharing in the Cloud. CLOUD COMPUTING 2012/.NET
5 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. CLOUD COMPUTING 2012/.NET
6 Outsourced Similarity Search on Metric Data Assets.CLOUD COMPUTING 2012/.NET
7 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING 2012/.NET
8 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. CLOUD COMPUTING 2012/.NET
9 Toward Secure and Dependable Storage Services in Cloud Computing. CLOUD COMPUTING 2012/.NET
10 A Query Formulation Language for the data web KNOWLEDGE AND DATA ENGINEERING 2012/.NET
11 Creating Evolving User Behavior Profiles Automatically KNOWLEDGE AND DATA ENGINEERING 2012/.NET
12 D-Cache: Universal Distance Cache for Metric Access Methods KNOWLEDGE AND DATA ENGINEERING 2012/.NET
13 DDD: A New Ensemble Approach for Dealing with Concept Drift KNOWLEDGE AND DATA ENGINEERING 2012/.NET
14 Efficient Computation of Range Aggregates against Uncertain Location-Based Queries KNOWLEDGE AND DATA ENGINEERING
2012/.NET
15 Efficient Fuzzy Type-Ahead Search in XML Data KNOWLEDGE AND DATA ENGINEERING 2012/.NET
16 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis KNOWLEDGE AND DATA ENGINEERING 2012/.NET
17 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques KNOWLEDGE AND DATA ENGINEERING 2012/.NET
18 Measuring the Sky: On Computing Data Cubes via Skylining the Measures KNOWLEDGE AND DATA ENGINEERING 2012/.NET
19 Mining Web Graphs for Recommendations KNOWLEDGE AND DATA ENGINEERING 2012/.NET
20 Organizing User Search Histories KNOWLEDGE AND DATA ENGINEERING 2012/.NET
21 Publishing Search Logs—A Comparative Study of Privacy Guarantees KNOWLEDGE AND DATA ENGINEERING 2012/.NET
22 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators KNOWLEDGE AND DATA ENGINEERING 2012/.NET
23 ROAD: A New Spatial Object Search Framework for Road Networks KNOWLEDGE AND DATA ENGINEERING 2012/.NET
24 Scalable Learning of Collective Behavior KNOWLEDGE AND DATA ENGINEERING 2012/.NET
25 Slicing: A New Approach for Privacy Preserving Data Publishing KNOWLEDGE AND DATA ENGINEERING 2012/.NET
26 Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings KNOWLEDGE AND DATA ENGINEERING 2012/.NET
27 Bounding the Impact of Unbounded Attacks in Stabilization PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET
28 Catching Packet Droppers and Modifiers in Wireless Sensor Networks PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET
29 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET
30 A New Cell-Counting-Based Attack Against Tor NETWORKING 2012/.NET
31 Optimal Source-Based Filtering of Malicious Traffic NETWORKING 2012/.NET
32 Topology Control in Mobile AD-HOC Networks with Cooperative Communications NETWORKING (IEEE JOURNAL) 2012/.NET
33 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network SECURE COMPUTING (IJCA) 2012/.NET
34 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs SECURE COMPUTING 2012/.NET
35 ES-MPICH2: A Message Passing Interface with Enhanced Security SECURE COMPUTING 2012/.NET
36 On the Security and Efficiency of Content Distribution via Network Coding SECURE COMPUTING 2012/.NET
37 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework forMobile-Healthcare Emergency SECURE COMPUTING 2012/.NET
38 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING 2012/.NET
39 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/.NET
40 Active Visual Segmentation IMAGE PROCESSING 2012/.NET
41 Image Segmentation Based on the Poincaré Map Method IMAGE PROCESSING 2012/.NET
42 K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER IMAGE PROCESSING (IJEST) 2012/.NET
43 Multiple Exposure Fusion for High Dynamic Range Image Acquisition IMAGE PROCESSING 2012/.NET
44 Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval IMAGE PROCESSING 2012/.NET
45 Smile Detection by Boosting Pixel Differences IMAGE PROCESSING 2012/.NET
46 View-invariant action recognition based on Artificial Neural Networks IMAGE PROCESSING 2012/.NET
47 Cooperative Download in Vehicular Environments MOBILE COMPUTING 2012/.NET
48 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation MOBILE COMPUTING 2012/.NET
49 Network Assisted Mobile Computing with Optimal Uplink Query Processing MOBILE COMPUTING 2012/.NET
50 Protecting Location Privacy in Sensor Networks against a Global Eavesdropper MOBILE COMPUTING 2012/.NET
51 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks MOBILE COMPUTING 2012/.NET
52 Revisiting Defenses against Large-Scale Online Password Guessing Attacks SECURE COMPUTING 2012/.NET
53 A Novel Anti phishing framework based on visual cryptography IMAGE PROCESSING 2012/.NET
54 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies NETWORKING (JOURNAL) 2012/.NET
55 Robust Face-Name Graph Matching for Movie Character Identification MULTIMEDIA 2012/.NET
56 Low-Complexity Compression Method for Hyperspectral Images Based on Distributed Source Coding IMAGE PROCESSING 2012/.NET
57 Balancing the Trade-Offs between Query Delay and Data Availability in MANETs PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET
58 Efficient Multidimensional Fuzzy Search for Personal Information Management Systems KNOWLEDGE AND DATA ENGINEERING 2012/.NET
59 Robustness of Offline Signature Verification Based on Gray Level Features IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY
2012/.NET
60 Controllable SecureWatermarking Technique for Tradeoff Between Robustness and Security IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY 2012/.NET
61 A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition IMAGE PROCESSING 2012/.NET
61 A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition IMAGE PROCESSING 2012/.NET
62 Towards Accurate Mobile Sensor Network Localization in Noisy Environments MOBILE COMPUTING 2012/.NET
63 Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism SECURE COMPUTING 2012/.NET
64 Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning LEARNING TECHNOLOGIES 2012/.NET
65 Multi-biometric Cryptosystems Based on Feature-Level Fusion IMAGE PROCESSING 2012/.NET
any one have slicing a new approach for privacy preservation project in the sense call me at 9486870173
ReplyDelete