Posts

old
VULNERABILITY ANALYSIS IN SOA-BASED BUSINESS PROCESSES

VULNERABILITY ANALYSIS IN SOA-BASED BUSINESS PROCESSES

VULNERABILITY ANALYSIS IN SOA-BASED BUSINESS PROCESSES

old
Data Integrity Proofs in Cloud Storage

Data Integrity Proofs in Cloud Storage

Data Integrity Proofs in Cloud Storage

old
Robust Correlation of Encrypted Attack Traffic  Through Stepping Stones by Flow Watermarking

Robust Correlation of Encrypted Attack Traffic Through...

Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Flow ...

old
Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection

Jamming-Aware Traffic Allocation for Multiple-Path Rout...

Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selec...

old
Continuous Neighbor Discovery in Asynchronous Sensor Networks

Continuous Neighbor Discovery in Asynchronous Sensor Ne...

Continuous Neighbor Discovery in Asynchronous Sensor Networks

old
The Geometric Efficient Matching Algorithm for  Firewalls

The Geometric Efficient Matching Algorithm for Firewalls

The Geometric Efficient Matching Algorithm for Firewalls

old
Distributed Adaptation of Quantized Feedback for  Downlink Network MIMO Systems

Distributed Adaptation of Quantized Feedback for Downl...

Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems

old
Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks

Adaptive Fault Tolerant QoS Control Algorithms for Maxi...

Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of...

old
Integration of Sound Signature in Graphical Password Authentication System

Integration of Sound Signature in Graphical Password Au...

Integration of Sound Signature in Graphical Password Authentication System

old
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks

Network Coding Based Privacy Preservation against Traff...

Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop ...

old
Self-Reconfigurable Wireless Mesh Networks

Self-Reconfigurable Wireless Mesh Networks

Self-Reconfigurable Wireless Mesh Networks

old
Live Streaming with Receiver-based Peer-division Multiplexing

Live Streaming with Receiver-based Peer-division Multip...

Live Streaming with Receiver-based Peer-division Multiplexing

old
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data

Privacy-Preserving Multi-keyword Ranked Search over Enc...

Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data

old
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud

Exploiting Dynamic Resource Allocation for Efficient Pa...

Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in...

old
OPTIMAL SERVICE PRICING FOR A CLOUD CACHE

OPTIMAL SERVICE PRICING FOR A CLOUD CACHE

OPTIMAL SERVICE PRICING FOR A CLOUD CACHE

old
A personalized ontology model for web information gathering

A personalized ontology model for web information gathe...

A personalized ontology model for web information gathering