Java is one of the world’s most important and widely used computer languages, and it has held this distinction for many years. Unlike some other computer languages whose influence has weared with passage if time, while java’s has grown.

IEEE 2015 - 2016 Cloud Computing
1.Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud





Abstracts Base Paper Enquiry
2.CloudArmor: Supporting Reputation-based Trust Management for Cloud Services





Abstracts Base Paper Enquiry
3.Identity Based Encryption with Outsourced Revocation in Cloud Computing





Abstracts Base Paper Enquiry
4.Secure Distributed Deduplication Systems with Improved Reliability





Abstracts Base Paper Enquiry
5.Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted





Abstracts Base Paper Enquiry

Results 1-2 of 2

IEEE 2015 - 2016 Data Mining
1.Malware Propagation in Large Scale Networks





Abstracts Base Paper Enquiry
2.Designing High Performance Web-Based Computing Services to Promote Telemedicine Database





Abstracts Base Paper Enquiry
3.Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection





Abstracts Base Paper Enquiry
4.Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge





Abstracts Base Paper Enquiry
5.Context-Based Diversification for Keyword Queries over XML Data





Abstracts Base Paper Enquiry

Results 1-2 of 2

IEEE 2015 - 2016 Image Processing
1.Query Specific Rank Fusion for Image Retrieval





Abstracts Base Paper Enquiry
2.Mining weakly labeled web facial images for search based face annotation





Abstracts Base Paper Enquiry
3.Learning to Rank Image Tags With Limited Training Examples





Abstracts Base Paper Enquiry
4.An Attribute-Assisted Reranking Model for Web Image Search





Abstracts Base Paper Enquiry
5.EMR A Scalable Graph based Ranking Model for Content based Image Retrieval





Abstracts Base Paper Enquiry
IEEE 2015 - 2016 Information and Forensic Security
1.Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption





Abstracts Base Paper Enquiry
2.Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter





Abstracts Base Paper Enquiry
3.Key Updating for Leakage Resiliency with Application to AES Modes of Operation





Abstracts Base Paper Enquiry
IEEE 2015 - 2016 Networking
1.Cloud cyber attack against Social Network





Abstracts Base Paper Enquiry
2.A Distortion Resistant Routing Framework for Video Traffic in Wireless Multihop Networks





Abstracts Base Paper Enquiry
3.Energy Efficient Fault Tolerant Data Storage And Processing In Mobile Cloud





Abstracts Base Paper Enquiry
4.A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks





Abstracts Base Paper Enquiry
5.Secure Data Aggregation Technique for WSN in the Presence of Collusion Attacks





Abstracts Base Paper Enquiry
IEEE 2015 - 2016 Secure Computing
IEEE 2015 - 2016 Mobile Computing
1.User-Defined Privacy Grid System for Continuous Location-Based Services





Abstracts Base Paper Enquiry
IEEE 2015 - 2016 Service Computing