Académique Documents
Professionnel Documents
Culture Documents
</td>
</tr>
<tr height="35">
<td align="center">6</td>
<td colspan="6" align="left" class="tdl5">Secure Auditing and De
duplicating Data in Cloud
</td>
</tr>
<tr height="35">
<td align="center">7</td>
<td colspan="6" align="left" class="tdl5">A Secure Anti-Collusio
n Data Sharing Scheme for Dynamic Groups in the Cloud
</td>
</tr>
<tr height="35">
<td align="center">8</td>
<td colspan="6" align="left" class="tdl5">Audit-Free Cloud Stora
ge via Deniable Attribute-based Encryption
</td>
</tr>
<tr height="35">
<td align="center">9</td>
<td colspan="6" align="left" class="tdl5">Provable Multi copy Dy
namic Data Possession in Cloud Computing Systems
</td>
</tr>
<tr height="35">
<td align="center">10</td>
<td colspan="6" align="left" class="tdl5">Circuit Cipher text-po
licy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Compu
tin</td>
</tr>
<tr height="35">
<td align="center">11</td>
<td colspan="6" align="left" class="tdl5">Control Cloud Data Acc
ess Privilege and Anonymity With Fully Anonymous
</td>
</tr>
<tr height="35">
<td align="center">12</td>
<td colspan="6" align="left" class="tdl5">Attribute-Based Encryp
tion
</td>
</tr>
<tr height="35">
<td align="center">13</td>
<td colspan="6" align="left" class="tdl5">Enabling Cloud Storage
Auditing with Key-Exposure Resistance
</td>
</tr>
<tr height="35">
<td align="center">14</td>
<td colspan="6" align="left" class="tdl5">Enabling Fine-grained
Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud
Da</td>
</tr>
<tr height="35">
<td align="center">15</td>
<td colspan="6" align="left" class="tdl5">Privacy-Preserving Pub
lic Auditing for Regenerating-Code-Based Cloud Storage
</td>
</tr>
<tr height="35">
<td align="center">16</td>
<td colspan="6" align="left" class="tdl5">Panda: Public Auditing
for Shared Data with Efficient User Revocation in the Cloud
</td>
</tr>
<tr height="35">
<td align="center">17</td>
<td colspan="6" align="left" class="tdl5">SelCSP: A Framework to
Facilitate Selection of Cloud Service Providers
</td>
</tr>
<tr height="35">
<td align="center">18</td>
<td colspan="6" align="left" class="tdl5">T-Broker: A Trust-Awar
e Service Brokering Scheme for Multiple Cloud Collaborative Services
</td>
</tr>
<tr height="35">
<td align="center">19</td>
<td colspan="6" align="left" class="tdl5">EnDAS: Efficient Encry
pted Data Search as a Mobile Cloud Service
</td>
</tr>
<tr height="35">
<td align="center">20</td>
<td colspan="6" align="left" class="tdl5">On the Security ofData
Access Control for Multiauthority CloudStorageSystems
</td>
</tr>
<tr height="35">
<td align="center">21</td>
<td colspan="6" align="left" class="tdl5">Security Analysis on O
ne-to-Many OrderPreserving Encryption Based Cloud data Search
</td>
</tr>
<tr height="35">
<td align="center">22</td>
<td colspan="6" align="left" class="tdl5">A Profit Maximization
Scheme with GuaranteedQuality of Service in Cloud Computing
</td>
</tr>
<tr height="35">
<td align="center">23</td>
<td colspan="6" align="left" class="tdl5">OPoR Enabling Proof of
Retrievability in Cloud Computing with Resource Constrained Devices
</td>
</tr>
<tr height="35">
<td align="center">24</td>
<td colspan="6" align="left" class="tdl5">DATA MINING
</td>
</tr>
<tr height="35">
<td align="center">25</td>
<td colspan="6" align="left" class="tdl5">Entity Linking with a
Knowledge Base Issues Techniques and Solutions
</td>
</tr>
<tr height="35">
<td align="center">26</td>
<td colspan="6" align="left" class="tdl5">Smart Crawler A Two-st
age Crawler for Efficiently Harvesting Deep-Web Interfaces
</td>
</tr>
<tr height="35">
<td align="center">27</td>
<td colspan="6" align="left" class="tdl5">Making Digital Artifac
ts on the Web Verifiable and Reliable
</td>
</tr>
<tr height="35">
<td align="center">28</td>
<td colspan="6" align="left" class="tdl5">Best Keyword Cover Sea
rch
</td>
</tr>
<tr height="35">
<td align="center">29</td>
<td colspan="6" align="left" class="tdl5">MOBILE COMPUTING
</td>
</tr>
<tr height="35">
<td align="center">30</td>
<td colspan="6" align="left" class="tdl5">Friendbook: A Semantic
-Based Friend Recommendation System for Social Networks
</td>
</tr>
<tr height="35">
<td align="center">31</td>
<td colspan="6" align="left" class="tdl5">SECURE COMPUTING
</td>
</tr>
<tr height="35">
<td align="center">32</td>
<td colspan="6" align="left" class="tdl5">Trust-based Service Ma
nagement for Social Internet of Things Systems
</td>
</tr>
<tr height="35">
<td align="center">33</td>
<td colspan="6" align="left" class="tdl5">NETWORKING
</td>
</tr>
<tr height="35">
<td align="center">34</td>
<td colspan="6" align="left" class="tdl5">Authenticated Key Exch
ange Protocols for Parallel Network File Systems
</td>
</tr>
<tr height="35">
<td align="center">35</td>
<td colspan="6" align="left" class="tdl5">A Proximity-Aware Inte
rest-Clustered P2P File Sharing System
</td>
</tr>
<tr height="35">
<td align="center">36</td>
</tr>
<tr height="35">
<td align="center">47</td>
<td colspan="6" align="left" class="tdl5">Smart Crawler A Two-st
age Crawler for Efficiently Harvesting Deep-Web Interfaces
</td>
</tr>
<tr height="35">
<td align="center">48</td>
<td colspan="6" align="left" class="tdl5">Making Digital Artifac
ts on the Web Verifiable and Reliable
</td>
</tr>
<tr height="35">
<td align="center">49</td>
<td colspan="6" align="left" class="tdl5">NETWORKING
</td>
</tr>
<tr height="35">
<td align="center">50</td>
<td colspan="6" align="left" class="tdl5">Authenticated Key Exch
ange Protocols for Parallel Network File Systems
</td>
</tr>
<tr height="35">
<td align="center">51</td>
<td colspan="6" align="left" class="tdl5">
</td>
</tr>
</table>
<script>
jQuery(document).ready(function () {
jQuery("#test").click(function () {
alert("one");
})
});
</script>
<script>
function downloadfile(file_download, id, type, msg) {
alert("Please login to download the file");
}
</script>