DOTNET IEEE

Dot Net IEEE Titles

S.NO Dotnet IEEE Titles Abstract
1 Query aware determinization of uncertain objects View
2 Shared authority based privacy-preserving authentication protocol in cloud computing View
3 Single image super-resolution based on gradient profile sharpness View
4 Neighbor similarity trust against Sybil attack in p2p e-commerce View
5 Pages partition aware engine for parallel graph computation View
6 T-broker a trust-aware service brokering scheme for multiple cloud collaborative services View
7 Annotating search result from web databases View
8 Attribute based access scalable media in cloud assisted content sharing networks View
9 Cam_ cloud assisted privacy preserving mobile health monitoring View
10 Cloud computing security from single to multi-clouds View
11 . Dynamic resource allocation using virtual machines for cloud computing environment View
12 Efficient computation of range aggregates View
13 Enabling data dynamic & indirect mutual trust cloud computing View
14 Malicious node detection using a dual threshold in wireless sensor networks View
15 Mining web graphs for recommendations View
16 Mona: secure multi-owner data sharing for dynamic groups in the cloud View
17 Privacy preserving data sharing with anonymous id View
18 Privacy-preserving public auditing for secure cloud storage View
19 A proxy-based architecture for dynamic discovery and invocation of web services from mobile devices View
20 A query formulation language for the data web View
21 A secure erasure code-based cloud storage system with secure data forwarding View
22 Distributed throughput maximization in wireless sensor network View
23 A gossip protocol for dynamic resource management in large cloud environments View
24 Horizontal aggregations in sql to prepare data sets for data mining analysis View
25 Optimal source-based filtering of malicious traffic View
26 Protecting location privacy in sensor networks against a global eavesdropper View
27 Revisiting defenses against large-scale online password guessing attacks View
28 Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption View
29 Semi supervised biased maximum margin analysis for interactive image retrieval View
30 Slicing: a new approach for privacy preserving data publishing View
31 . Tree-based mining for discovering patterns of human interaction in meetings View
32 A novel anti phishing visual cryptographic framework View
33 Enhanced data security model for cloud computing View
34 Review of apriority based frequent item set mining solutions on big data View
35 Watermarking-based secure plaintext image protocols for storage, show, deletion and retrieval in the cloud View
36 Scalable and efficient authentication scheme for secure smart grid communication View
37 A novel feature matching ranked search mechanism over encrypted cloud data View
38 A secure data dynamics and public auditing scheme for cloud storage View
39 A verifiable semantic searching scheme by optimal matching over encrypted data in public cloud View
40 Fast secure and anonymous key agreement against bad randomness for cloud computing View
41 Key-escrow free attribute-based multi-keyword search with dynamic policy update in cloud computing View
42 Key-policy attribute-based encryption with keyword search in virtualized environments View
43 .A secure and efficient cloud-centric internet of medical thingsenabled smart healthcare system with public verifiability View
44 A secure enhanced key-policy attribute-based temporary keyword search scheme in the cloud View
45 dentity-based encryption transformation for flexible sharing of encrypted data in public cloud View
46 Authentication and key agreement based on anonymous identity for peer- to-peer cloud View
47 Fine-grained access control in the era of cloud computing: an analytical review View
48 Personalized market basket prediction with temporal annotated recurring sequences View
49 Drops: division and replication of data in cloud for optimal performance and securit View
50 Mining users trust from e commerce reviews based on sentiment similarity analysis View
51 Spammer detection and fake user identification on social networks View
52 Privacy-preserving attribute-based keyword search in shared multiowner setting View
53 Revocable identity-based broadcast proxy re-encryption for data sharing in clouds View
54 Dynamic multi keyword ranked search based on bloom filter over encrypted cloud data View
55 Data integrity auditing without private key storage for secure cloud storage View
56 Enabling verifiable and dynamic ranked search over outsourced data View
57 Hidden cipher text policy attribute-based encryption with fast decryption for personal health record system View
58 .A practical attribute-based document collection hierarchical encryption scheme in cloud computing View
59 Privacy preservation for outsourced medical data with flexible access control View
60 Privacy preserving indexing and query processing for secure dynamic cloud storage View
61 SEPDP secure and efficient privacy preserving provable data possession in cloud storage View
62 An efficient and privacy preserving biometric identification scheme in cloud computing View
63 Secured outsourcing towards a cloud computing environment based on DNA cryptography View
64 Detection of suicide-related posts in twitter data streams View
65 Combining data owner-side and cloud-side access control for encrypted cloud storage View
66 Characterizing and predicting early reviewers for effective product marketing on e commerce websites View
67 Event detection and identification of influential spreaders in social media data streams View
68 Enabling identity-based integrity auditing and data sharing with sensitive information hiding View
69 Class: cloud log assuring soundness and secrecy scheme for cloud forensics View
70 Provably secure and lightweight identity based authenticated data sharing protocol for cyber physical environmen View
71 Efficient retrieval over documents encrypted by attributes in cloud computing View
72 Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing View
73 Semantic aware searching over encrypted data for cloud computing View
74 Privacy-preserving search over encrypted personal health record in multi-source cloud View
75 Search rank fraud and malware detection in Google play View
76 Detecting stress based on social interaction in social networks View
77 TAFC time and attribute factors combined access control for timesensitive data in public cloud View
78 Optimal resource scheduling and allocation system View
79 .SeGoAC: a tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing View
80 Shilling attack models in recommender system View
81 FastGeo: efficient geometric range queries on encrypted spatial data View
82 Query reorganization algorithms for efficient Boolean information filtering View
83 Continuous top-k monitoring on document streams View
84 Energy efficient clustering algorithm for multi-hop wireless sensor network using type-2 fuzzy logic View
85 Trajectory community discovery and recommendation by multisource diffusion modeling View
1 Privacy protection based access control scheme in cloud-based services View
86 User service rating prediction by exploring the social user rating behaviours View
87 My privacy my decision View
88 Net spam-a network based spam detection framework View
89 Heterogeneous cloud computing network View
90 Net spam-a network based spam detection framework View
91 Achieving energy efficiency in data centers using an artificial intelligence abstraction model View
92 An efficient file hierarchy attribute-based encryption scheme in cloud computing View
93 Authenticated key exchange protocols for parallel network file systems View
94 Circuit cipher text-policy attribute-based hybrid encryption with verifiable View
95 Cloud workflow scheduling with deadline and time slot algorithm View
96 Cloudarmor-supporting-reputation-based-trust-management-forcloud-services View
97 Collective data-sanitization for preventing sensitive information inference attacks in social networks View
98 Conditional identity-based broadcast proxy re-encryption and its application to cloud email View
99 Discovery of ranking fraud for mobile View
100 Efficient multipath communication for time-critical applications in underwater acoustic sensor networks View
101 Fine-grained two-factor access control for cloud computing services View