Cloud Computing-Java
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
As an effective and efficient way to provide computing resources and services to customers on demand..
A SDN-based QoS Guaranteed Technique For Cloud Applications
Due to the centralized control, network-wide monitoring and flow-level scheduling of Software-Define..
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
Due to the increasing popularity of cloud computing, more and more data owners are motivated to ou..
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
Due to the increasing popularity of cloud computing, more and more data owners are motivated to outs..
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks JAVA
Affording secure and efficient big data aggregation methods is very attractive in the field of wir..
A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
Due to the complexity and volume, outsourcing ciphertexts to a cloud is deemed to be one of the most..
A Secure Easure Based Cloud Storage System with Secure Data Forwarding
Convergent encryption, also known as content hash keying, is a cryptosystem that produces identical ..
A secure remote user mutual authentication scheme using smart cards
Authentication thwarts unauthorised users from accessing resources in insecure network environments..
A Secure Transmission Scheme for Textual Data with Least Overhead
A Secure Transmission Scheme for Textual Data with Least Overhead To fulfill the needs for secur..
A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-Based Cryptography
Nowadays, telemedicine is an emerging healthcare service where the healthcare professionals can dia..
A Sorted Neighborhood Approach to Multidimensional Privacy Preserving Blocking
Privacy Preserving Record Linkage is an emerging field of research which aims to integrate data from..
A Survey of Key Management for Secure Group Communication
In recent years, due to the appealing features of cloud computing, large amount of data have been st..
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing
Never before have data sharing been more convenient with the rapid development and wide adoption o..
A Survey of Task Allocation and Load Balancing in Distributed Systems
In past decades, significant attention has been devoted to the task allocation and load bala..
A System to Filter Unwanted Messages from OSN User Walls
ONLINE Social Networks (OSNs) are today one of the most popular interactive medium to communicate, s..