- DocumentoA neighbor trust-based mechanism to protect mobile networksenviado porjpinfotechjp
- DocumentoA Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computingenviado porjpinfotechjp
- DocumentoTrustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systemsenviado porjpinfotechjp
- DocumentoTrust-based Privacy-Preserving Photo Sharing in Online Social Networksenviado porjpinfotechjp
- DocumentoTrust-based Collaborative Privacy Management in Online Social Networksenviado porjpinfotechjp
- DocumentoTransactional Behavior Verification inBusiness Process as a Service Configurationenviado porjpinfotechjp
- DocumentoTowards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verificationenviado porjpinfotechjp
- DocumentoSpammer Detection and Fake User Identification on Social Networksenviado porjpinfotechjp
- DocumentoSensitive Label Privacy Preservation with Anatomization for Data Publishingenviado porjpinfotechjp
- DocumentoSecure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoTenviado porjpinfotechjp
- DocumentoSecure Key Agreement and Key Protection for Mobile Device User Authenticationenviado porjpinfotechjp
- DocumentoSecure Data Group Sharing and ConditionalDissemination with Multi-Owner in CloudComputingenviado porjpinfotechjp
- DocumentoSecure and Efficient Skyline Queries on Encrypted Dataenviado porjpinfotechjp
- DocumentoRevocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Cloudsenviado porjpinfotechjp
- DocumentoRetrieving Hidden Friendsenviado porjpinfotechjp
- DocumentoProvably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applicationsenviado porjpinfotechjp
- DocumentoProvable Data Possession With Outsourced Data Transferenviado porjpinfotechjp
- DocumentoProfit Maximization for Cloud Brokers in Cloud Computingenviado porjpinfotechjp
- DocumentoPrivacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendationenviado porjpinfotechjp
- DocumentoPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Dataenviado porjpinfotechjp
- DocumentoPrivacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Serverenviado porjpinfotechjp
- DocumentoPrivacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Settingenviado porjpinfotechjp
- DocumentoPrivacy-Preserving Aggregate Queries for Optimal Location Selectionenviado porjpinfotechjp
- DocumentoPrivacy Preserving Searchable Encryption with Fine-grained Access Controlenviado porjpinfotechjp
- DocumentoPredicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithmsenviado porjpinfotechjp
- DocumentoDetecting Malicious Social Bots Based on Clickstream Sequencesenviado porjpinfotechjp
- DocumentoDating with Scambotsenviado porjpinfotechjp
- DocumentoCrypt-DACenviado porjpinfotechjp
- DocumentoK-nearest Neighbors Search byRandom Projection Forestsenviado porjpinfotechjp
- DocumentoHierarchical Density-Based Clustering using MapReduceenviado porjpinfotechjp
- DocumentoHadoop Map Reduce for Mobile Cloudsenviado porjpinfotechjp
- DocumentoDeadline-aware Map Reduce Job Scheduling with Dynamic Resource Availabilityenviado porjpinfotechjp
- DocumentoA Systematic Approach Toward Description andClassification of Cyber crime Incidentsenviado porjpinfotechjp
- DocumentoA Survey on Geographically Distributed Big-Data Processing using Map Reduceenviado porjpinfotechjp
- DocumentoWho You Should Not Followenviado porjpinfotechjp
- DocumentoTrust-based Privacy-Preserving Photo Sharing in Online Social Networksenviado porjpinfotechjp
- DocumentoTrust Relationship Prediction in Alibaba E-Commerce Platformenviado porjpinfotechjp
- DocumentoTransactional Behavior Verification inBusiness Process as a Service Configurationenviado porjpinfotechjp
- DocumentoTowards Robust Image Steganographyenviado porjpinfotechjp
- DocumentoTowards Achieving Keyword Search over DynamicEncrypted Cloud Data with Symmetric-Key BasedVerificationenviado porjpinfotechjp
- DocumentoSpammer Detection and Fake User Identification on Social Networksenviado porjpinfotechjp
- DocumentoSensitive Label Privacy Preservation with Anatomization for Data Publishingenviado porjpinfotechjp
- DocumentoSecuring Data in Internet of Things (IoT) UsingCryptography and Steganography Techniquesenviado porjpinfotechjp
- DocumentoRevocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Cloudsenviado porjpinfotechjp
- DocumentoPrivacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Settingenviado porjpinfotechjp
- DocumentoPredicting Cyberbullying on Social Media in the BigData Era Using Machine Learning Algorithmsenviado porjpinfotechjp
- DocumentoPeer Prediction Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networksenviado porjpinfotechjp
- DocumentoNew Framework of Reversible Data Hiding in Encrypted JPEG Bitstreamsenviado porjpinfotechjp
- Documento2018-2019 Ieee Python Project Titlesenviado porjpinfotechjp