Sie sind auf Seite 1von 2

S.

N
O
1

2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21

Project Title
SAE: Toward Efficient Cloud Data Analysis Service for
Large-Scale Social Networks
On Summarization and Timeline Generation for
Evolutionary Tweet Streams
A Secure and Dynamic Multi-keyword Ranked Search
Scheme over Encrypted Cloud Data
EnDAS Efficient Encrypted Data Search as a Mobile
Cloud Service
FRAppE: Detecting Malicious Facebook Applications
Steganography Using Reversible Texture Synthesis
Smar tCrawler : A Two-stage Crawler for Efficiently Har
vesting Deep-Web Interfaces
PSMPA: Patient Self-Controllable and Multi-Level
Privacy-Preserving Cooperative Authentication in
Distributed m-Healthcare Cloud Computing System
Passive IP Traceback: Disclosing the Locations
of IP Spoofers From Path Backscatter
Route-Saver: Leveraging Route APIs for Accurate and
Efficient Query Processing at Location-Based Services
Secure Auditing and Deduplicating Data in Cloud
Privacy Policy Inference of User-Uploaded Images on
Content Sharing Sites
A Distributed Three-hop Routing Protocol to Increase the
Capacity of Hybrid Wireless Networks
An Attribute-assisted Re ranking Model for Web Image
Search
Authenticated Key Exchange Protocols for Parallel
Network File Systems
Cost-Aware SEcure Routing (CASER) Protocol Design
for Wireless Sensor Networks
Dynamic Routing for Data Integrity and Delay
Differentiated Services in Wireless Sensor Networks
EMR: A Scalable Graph-based Ranking Model for
Content-based Image Retrieval
A Lightweight Secure Scheme for Detecting Provenance
Forgery and Packet Drop Attacks in Wireless Sensor
Networks
My Privacy My Decision: Control of Photo Sharing on
Online Social Networks
Software Puzzle: A Countermeasure to Resource-Inflated

Tech

JAVA

JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
DOTNE
T
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA

22
23
24
25
26
27

28
29
30
31
32
33
34
35
36
37
38

Denial-of-Service Attacks
Tweet Segmentation and Its Application to Named Entity
Recognition
Opportunistic Routing Algorithm for Relay Node
Selection in Wireless Sensor Networks
Privacy-Preserving and Truthful Detection of Packet
Dropping Attacks in Wireless Ad Hoc Networks
Effective Key Management in Dynamic Wireless Sensor
Networks
Discovery of Ranking Fraud for Mobile Apps
Key-Aggregate Searchable Encryption (KASE) for Group
Data Sharing via Cloud Storage

Maximizing P2P File Access Availability in Mobile Ad


Hoc Networks though Replication for Efficient File
Sharing
Anonymizing Collections of Tree-Structured Data
Audit-Free Cloud Storage via Deniable Attribute-based
Encryption
A Scalable and Reliable Matching Service for ContentBased Publish/Subscribe Systems
Public Integrity Auditing for Shared Dynamic Cloud Data
with Group User Revocation
A Distortion-Resistant Routing Framework for Video
Traffic in Wireless Multihop Networks
Continuous and Transparent User Identity Verification for
Secure Internet Services
Location-Aware and Personalized Collaborative Filtering
for Web Service Recommendation
A Profit Maximization Scheme with Guaranteed
Quality of Service in Cloud Computing
Progressive Duplicate Detection
User-Defined Privacy Grid System for Continuous
Location-Based Services

JAVA
JAVA
JAVA
JAVA
JAVA
JAVA

JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA

Das könnte Ihnen auch gefallen