Subgraph matching with set similarity in a

8 years ago 276 Views

Rule based method for entity resolution

8 years ago 287 Views

Privacy policy inference of user uploaded

8 years ago 646 Views

Discovery of ranking fraud for mobile apps

8 years ago 336 Views

Secure auditing and deduplicating data in cloud

8 years ago 2590 Views

Provable multicopy dynamic data possession

8 years ago 1177 Views

Orchestrating bulk data transfers across

8 years ago 205 Views

New algorithms for secure outsourcing of

8 years ago 211 Views

Identity based encryption with outsourced

8 years ago 270 Views

Cost effective authentic and anonymous

8 years ago 292 Views

Control cloud data access privilege and

8 years ago 255 Views

A trusted iaa s environment

8 years ago 238 Views

A profit maximization scheme with guaranteed

8 years ago 255 Views

User defined privacy grid system

8 years ago 181 Views

Learning to rank image tags with limited

8 years ago 372 Views

Detecting malicious facebook applications

8 years ago 800 Views

Collusion tolerable privacy-preserving sum

8 years ago 270 Views

Automatic face naming by learning discriminative

8 years ago 310 Views

A computational dynamic trust model

8 years ago 284 Views

Space efficient verifiable secret sharing

8 years ago 139 Views