S.No |
Titles |
1 | Secure Auditing and Deduplicating Data in Cloud |
2 | Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming |
3 | Key - Aggregate Searchable Encryption(KASE) for Group Data Sharing Via Cloud Storage |
4 | FRAPPE:Detecting Malicious Facebook Applications |
5 | A Secure and Dynamic Multi - Keyword Ranked Search Scheme Over Encrypted Cloud Data |
6 | An Exploration of Geographic Authentication Schemes |
7 | Dummy - Based - user location Anonymization under Real - World Constraints |
8 | Privacy - Preserving Location Sharing Services for Social Networks |
9 | STAMP: Enabling Privacy - Preserving Location Proofs for Mobile Users |
10 | PRISM: Privacy - Aware interest sharing and matching in Mobile Social Networks |
11 | A Shoulder Surfing Resistant Graphical Authentication System |
12 | Reversible data Hiding in Encrypted images Based on Progressive Recovery |
13 | Secure Sensitive data Sharing on Bigdata Platform |
14 | A Hybrid Cloud Approach for Secure Authorized Deduplication |
15 | RRW - A Robust and Reversible Water Marking technique for Relational Data |
16 | Steganography Using Reversible Texture Synthesis |
17 | Constructing a Global Social Service Network for Better Quality of web Service Discovery |
18 | Friendbook: A Semantic Based Friend Recommendation System for Social Networks |