CODE |
TITLE |
DOMAIN |
YEAR |
SDVL-01 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
Cloud Computing |
2016 |
SDVL-02 |
Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
Cloud Computing |
2016 |
SDVL-03 |
Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption Function for E-health Clouds |
Cloud Computing |
2016 |
SDVL-04 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
Cloud Computing |
2016 |
SDVL-05 |
Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates |
Cloud Computing |
2016 |
SDVL-06 |
Fine-grained Two-factor Access Control for Web-based Cloud Computing Services |
Cloud Computing |
2016 |
SDVL-07 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
Cloud Computing |
2016 |
SDVL-08 |
Leveraging Data De duplication to Improve the Performance of Primary Storage Systems in the Cloud |
Cloud Computing |
2016 |
SDVL-09 |
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage |
Cloud Computing |
2016 |
SDVL-10 |
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage |
Cloud Computing |
2016 |
SDVL-11 |
Efficient Certificate less Access Control for Wireless Body Area Networks |
Net Working |
2016 |
SDVL-12 |
Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage |
Net Working |
2016 |
SDVL-13 |
Geographic and Opportunistic Routing for Underwater Sensor Networks |
Net Working |
2016 |
SDVL-14 |
Optimizing Cost for Online Social Networks on Geo-Distributed Clouds |
Net Working |
2016 |
SDVL-15 |
Secure and Efficient data communication protocol for Wireless Body Area Networks |
Net Working |
2016 |
SDVL-16 |
Authenticated Key Exchange Protocols for Parallel Network File Systems |
Net Working |
2016 |
SDVL-17 |
Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems |
Net Working |
2016 |
SDVL-18 |
Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems |
Network Security |
2016 |
SDVL-19 |
ID2S Password-Authenticated Key Exchange Protocols |
Network Security |
2016 |
SDVL-20 |
Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases |
Network Security |
2016 |
SDVL-21 |
A Joint Time Synchronization and Localization Design For Mobile Underwater Sensor Networks |
Mobile Computing |
2016 |
SDVL-22 |
DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks |
Mobile Computing |
2016 |
SDVL-23 |
Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps |
Mobile Computing |
2016 |
SDVL-24 |
Traffic De-correlation Techniques for Countering a Global Eavesdropper in WSNs |
Mobile Computing |
2016 |
SDVL-25 |
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices |
Mobile Computing |
2016 |