| CODE | TITLE | DOMAIN | YEAR |
| SDVL-01 | A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data | Cloud Computing | 2016 |
| SDVL-02 | Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing | Cloud Computing | 2016 |
| SDVL-03 | Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption Function for E-health Clouds | Cloud Computing | 2016 |
| SDVL-04 | Dynamic and Public Auditing with Fair Arbitration for Cloud Data | Cloud Computing | 2016 |
| SDVL-05 | Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates | Cloud Computing | 2016 |
| SDVL-06 | Fine-grained Two-factor Access Control for Web-based Cloud Computing Services | Cloud Computing | 2016 |
| SDVL-07 | Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud | Cloud Computing | 2016 |
| SDVL-08 | Leveraging Data De duplication to Improve the Performance of Primary Storage Systems in the Cloud | Cloud Computing | 2016 |
| SDVL-09 | KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage | Cloud Computing | 2016 |
| SDVL-10 | Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage | Cloud Computing | 2016 |
| SDVL-11 | Efficient Certificate less Access Control for Wireless Body Area Networks | Net Working | 2016 |
| SDVL-12 | Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage | Net Working | 2016 |
| SDVL-13 | Geographic and Opportunistic Routing for Underwater Sensor Networks | Net Working | 2016 |
| SDVL-14 | Optimizing Cost for Online Social Networks on Geo-Distributed Clouds | Net Working | 2016 |
| SDVL-15 | Secure and Efficient data communication protocol for Wireless Body Area Networks | Net Working | 2016 |
| SDVL-16 | Authenticated Key Exchange Protocols for Parallel Network File Systems | Net Working | 2016 |
| SDVL-17 | Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems | Net Working | 2016 |
| SDVL-18 | Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems | Network Security | 2016 |
| SDVL-19 | ID2S Password-Authenticated Key Exchange Protocols | Network Security | 2016 |
| SDVL-20 | Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases | Network Security | 2016 |
| SDVL-21 | A Joint Time Synchronization and Localization Design For Mobile Underwater Sensor Networks | Mobile Computing | 2016 |
| SDVL-22 | DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks | Mobile Computing | 2016 |
| SDVL-23 | Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps | Mobile Computing | 2016 |
| SDVL-24 | Traffic De-correlation Techniques for Countering a Global Eavesdropper in WSNs | Mobile Computing | 2016 |
| SDVL-25 | WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices | Mobile Computing | 2016 |