- DocumentA neighbor trust-based mechanism to protect mobile networkstéléversé parjpinfotechjp
- DocumentA Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computingtéléversé parjpinfotechjp
- DocumentTrustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systemstéléversé parjpinfotechjp
- DocumentTrust-based Privacy-Preserving Photo Sharing in Online Social Networkstéléversé parjpinfotechjp
- DocumentTrust-based Collaborative Privacy Management in Online Social Networkstéléversé parjpinfotechjp
- DocumentTransactional Behavior Verification inBusiness Process as a Service Configurationtéléversé parjpinfotechjp
- DocumentTowards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verificationtéléversé parjpinfotechjp
- DocumentSpammer Detection and Fake User Identification on Social Networkstéléversé parjpinfotechjp
- DocumentSensitive Label Privacy Preservation with Anatomization for Data Publishingtéléversé parjpinfotechjp
- DocumentSecure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoTtéléversé parjpinfotechjp
- DocumentSecure Key Agreement and Key Protection for Mobile Device User Authenticationtéléversé parjpinfotechjp
- DocumentSecure Data Group Sharing and ConditionalDissemination with Multi-Owner in CloudComputingtéléversé parjpinfotechjp
- DocumentSecure and Efficient Skyline Queries on Encrypted Datatéléversé parjpinfotechjp
- DocumentRevocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Cloudstéléversé parjpinfotechjp
- DocumentRetrieving Hidden Friendstéléversé parjpinfotechjp
- DocumentProvably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applicationstéléversé parjpinfotechjp
- DocumentProvable Data Possession With Outsourced Data Transfertéléversé parjpinfotechjp
- DocumentProfit Maximization for Cloud Brokers in Cloud Computingtéléversé parjpinfotechjp
- DocumentPrivacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendationtéléversé parjpinfotechjp
- DocumentPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Datatéléversé parjpinfotechjp
- DocumentPrivacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Servertéléversé parjpinfotechjp
- DocumentPrivacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Settingtéléversé parjpinfotechjp
- DocumentPrivacy-Preserving Aggregate Queries for Optimal Location Selectiontéléversé parjpinfotechjp
- DocumentPrivacy Preserving Searchable Encryption with Fine-grained Access Controltéléversé parjpinfotechjp
- DocumentPredicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithmstéléversé parjpinfotechjp
- DocumentDetecting Malicious Social Bots Based on Clickstream Sequencestéléversé parjpinfotechjp
- DocumentDating with Scambotstéléversé parjpinfotechjp
- DocumentCrypt-DACtéléversé parjpinfotechjp
- DocumentK-nearest Neighbors Search byRandom Projection Foreststéléversé parjpinfotechjp
- DocumentHierarchical Density-Based Clustering using MapReducetéléversé parjpinfotechjp
- DocumentHadoop Map Reduce for Mobile Cloudstéléversé parjpinfotechjp
- DocumentDeadline-aware Map Reduce Job Scheduling with Dynamic Resource Availabilitytéléversé parjpinfotechjp
- DocumentA Systematic Approach Toward Description andClassification of Cyber crime Incidentstéléversé parjpinfotechjp
- DocumentA Survey on Geographically Distributed Big-Data Processing using Map Reducetéléversé parjpinfotechjp
- DocumentWho You Should Not Followtéléversé parjpinfotechjp
- DocumentTrust-based Privacy-Preserving Photo Sharing in Online Social Networkstéléversé parjpinfotechjp
- DocumentTrust Relationship Prediction in Alibaba E-Commerce Platformtéléversé parjpinfotechjp
- DocumentTransactional Behavior Verification inBusiness Process as a Service Configurationtéléversé parjpinfotechjp
- DocumentTowards Robust Image Steganographytéléversé parjpinfotechjp
- DocumentTowards Achieving Keyword Search over DynamicEncrypted Cloud Data with Symmetric-Key BasedVerificationtéléversé parjpinfotechjp
- DocumentSpammer Detection and Fake User Identification on Social Networkstéléversé parjpinfotechjp
- DocumentSensitive Label Privacy Preservation with Anatomization for Data Publishingtéléversé parjpinfotechjp
- DocumentSecuring Data in Internet of Things (IoT) UsingCryptography and Steganography Techniquestéléversé parjpinfotechjp
- DocumentRevocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Cloudstéléversé parjpinfotechjp
- DocumentPrivacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Settingtéléversé parjpinfotechjp
- DocumentPredicting Cyberbullying on Social Media in the BigData Era Using Machine Learning Algorithmstéléversé parjpinfotechjp
- DocumentPeer Prediction Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networkstéléversé parjpinfotechjp
- DocumentNew Framework of Reversible Data Hiding in Encrypted JPEG Bitstreamstéléversé parjpinfotechjp
- Document2018-2019 Ieee Python Project Titlestéléversé parjpinfotechjp