IEEE 2015 - 2016 Secure Computing
1.Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers





Abstracts Base Paper Enquiry
2.A Computational Dynamic Trust Model for User Authorization





Abstracts Base Paper Enquiry
3.Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks





Abstracts Base Paper Enquiry
4.A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks





Abstracts Base Paper Enquiry
5.Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted





Abstracts Base Paper Enquiry
6.Continuous and Transparent User Identity Verification for Secure Internet





Abstracts Base Paper Enquiry
7.Securing Network Processors with High Performance Hardware Monitors





Abstracts Base Paper Enquiry
8.My Privacy My Decision Control of Photo Sharing on Online Social Networks





Abstracts Base Paper Enquiry
9.Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks





Abstracts Base Paper Enquiry
10.DDSGA: A Data-Driven Semi-Global AlignmentApproach for Detecting Masquerade Attacks





Abstracts Base Paper Enquiry