Secure outsourced attribute based signatures
Shared authority based privacy preserving authentication protocol in cloud computing
Securing broker less publish subscribe systems using identity-based encryption
Key aggregate cryptosystem for scalable data sharing in cloud storage
Xs path navigation on xml schemas made easy
Behavioral malware detection in delay tolerant networks
A two stage deanonymization attack against anonymized social networks
Qos aware geographic opportunistic routing in wireless sensor networks
Privacy preserving multi-keyword ranked search over encrypted cloud data
LOCAWARD A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM
Exploiting service similarity for privacy in location based search queries
Enabling trustworthy service evaluation in service oriented mobile social networks
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS
Quality assessment of stereoscopic 3 d image compression by binocular integration behaviors
MODELING OF SPEAKING RATE INFLUENCES ON MANDARIN SPEECH PROSODY AND ITS APPLICATION TO SPEAKING RATE-CONTROLLED TTS
Identity based distributed provable data possession in multi-cloud storage
D2 p distributed dynamic pricing policy in smart grid for phe vs management
On false data injection attacks against power system