1.Effect of interface path selection on video-QOE analysis and improvements |
|
2.Group key agreement with local connectivity |
|
3.Dynamic Network Control for Confidential Multi-Hop communications |
|
4.Detecting venomous in online social networks |
|
5.Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation |
|
6.Secure Auditing and De duplicating Data in Cloud |
|
7.A Secure and Dynamic Multi-keyword Ranked |
|
8.A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the cloud |
|
9.Secure Distributed Deduplication Systems with
Improved Reliability |
|
10.Keyless Authentication in a Noisy Model |
|