DC1 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
2017-2018 |
|
DC10 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
2017-2018 |
|
DC11 |
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems |
2017-2018 |
|
DC12 |
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing |
2017-2018 |
|
DC13 |
A secured resource access management in educational cloud computing environment |
2017-2018 |
|
DC14 |
Dynamic virtualized network function allocation in a multi-cloud environment |
2017-2018 |
|
DC15 |
Efficient SQL adaptive query processing in cloud databases systems |
2017-2018 |
|
DC16 |
Goal-based security components for cloud storage security framework |
2017-2018 |
|
DC17 |
Parallel Execution of Space-Aware Applications in a Cloud Environment |
2017-2018 |
|
DC2 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
2017-2018 |
|
DC3 |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
2017-2018 |
|
DC4 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
2017-2018 |
|
DC5 |
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services |
2017-2018 |
|
DC6 |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
2017-2018 |
|
DC7 |
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage |
2017-2018 |
|
DC8 |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
2017-2018 |
|
DC9 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
2017-2018 |
|
DD1 |
A Novel Recommendation Model Regularized with User Trust and Item Ratings |
2017-2018 |
|
DD10 |
Rating Prediction based on Social Sentiment from Textual Reviews |
2017-2018 |
|
DD11 |
Location Aware Keyword Query Suggestion Based on Document Proximity |
2017-2018 |
|
DD12 |
Quantifying Political Leaning from Tweets, Retweets, and Retweeters |
2017-2018 |
|
DD13 |
Sentiment Embeddings with Applications to Sentiment Analysis |
2017-2018 |
|
DD14 |
TopicSketch: Real-time Bursty Topic Detection from Twitter |
2017-2018 |
|
DD15 |
Network intrusion detection system model based on data mining |
2017-2018 |
|
DD16 |
Opinion mining from student feedback data using supervised learning algorithms |
2017-2018 |
|