Subgraph matching with set similarity in a

il y a 8 ans 276 Vues

Rule based method for entity resolution

il y a 8 ans 287 Vues

Privacy policy inference of user uploaded

il y a 8 ans 646 Vues

Discovery of ranking fraud for mobile apps

il y a 8 ans 336 Vues

Secure auditing and deduplicating data in cloud

il y a 8 ans 2590 Vues

Provable multicopy dynamic data possession

il y a 8 ans 1177 Vues

Orchestrating bulk data transfers across

il y a 8 ans 205 Vues

New algorithms for secure outsourcing of

il y a 8 ans 211 Vues

Identity based encryption with outsourced

il y a 8 ans 270 Vues

Cost effective authentic and anonymous

il y a 8 ans 292 Vues

Control cloud data access privilege and

il y a 8 ans 255 Vues

A trusted iaa s environment

il y a 8 ans 238 Vues

A profit maximization scheme with guaranteed

il y a 8 ans 255 Vues

User defined privacy grid system

il y a 8 ans 181 Vues

Learning to rank image tags with limited

il y a 8 ans 372 Vues

Detecting malicious facebook applications

il y a 8 ans 800 Vues

Collusion tolerable privacy-preserving sum

il y a 8 ans 270 Vues

Automatic face naming by learning discriminative

il y a 8 ans 310 Vues

A computational dynamic trust model

il y a 8 ans 284 Vues

Space efficient verifiable secret sharing

il y a 8 ans 139 Vues