Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

Abstract Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community […]

Read More →

NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

ABSTRACT: In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact […]

Read More →

MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE ADHOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING

ABSTRACT: File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. […]

Read More →

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

Abstract Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. […]

Read More →

Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

Abstract—Media streaming applications have recently attracted a large number of users in the Internet. With the advent of these […]

Read More →

IMPROVING WEB NAVIGATION USABILITY BY COMPARING ACTUAL AND ANTICIPATED USAGE

ABSTRACT: We present a new method to identify navigation related Web usability problems based on comparing actual and anticipated […]

Read More →

Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques

Due to the broadcast nature of radio propagation, wireless transmission can be readily overheard by unauthorized users for interception […]

Read More →

IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING

ABSTRACT: Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an […]

Read More →

IDENTITY-BASED DISTRIBUTED PROVABLE DATA POSSESSION IN MULTI-CLOUD STORAGE

ABSTRACT: Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether […]

Read More →

GENERATING SEARCHABLE PUBLIC-KEY CIPHERTEXTS WITH HIDDEN STRUCTURES FOR FAST KEYWORD SEARCH

ABSTRACT: In this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible […]

Read More →