by admin | Aug 14, 2015 | Uncategorized
Key-Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage ABSTRACT: Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We...
by admin | Aug 14, 2015 | Uncategorized
A Meta-Top-Down Method for Large-Scale Hierarchical Classification ABSTRACT With an increasing number of images that are available in social media, image annotation has emerged as an important research topic due to its application in image matching and retrieval. Most...
by admin | Aug 14, 2015 | Uncategorized
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING ABSTRACT Identity-based encryption (ibe) which simplifies the public key and certificate management at public key infrastructure (pki) is an important alternative to public key encryption....
by admin | Aug 14, 2015 | Uncategorized
Detecting Malicious Facebook Applications Detecting Malicious Facebook Applications Abstract: With 20 million installs a day , third-party apps are a major reason for the popularity and addictiveness of Facebook. Unfortunately, hackers have realized the potential of...
by admin | Aug 14, 2015 | Uncategorized
Energy-aware Load Balancing and Application scaling for the Cloud Ecosystem Abstract: In this paper we introduce an energy-aware operation model used for load balancing and application scaling on a cloud. The basic philosophy of our approach is defining an...
by admin | Aug 14, 2015 | Uncategorized
Detection and Rectification of Distorted Fingerprints Abstract Elastic distortion of fingerprints is one of the major causes for false non-match. While this problem affects all fingerprint recognition applications, it is especially dangerous in negative recognition...