In this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without sacrificing…
Existing social networking services recommend friends to users based on their social graphs, which may not be the most appropriate…
In this paper, we propose an energy efficient virtual network embedding (EEVNE) approach for cloud computing networks, where power savings…
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud DataAbstract—Using cloud computing, individuals can store their data on remote…
In mobile cloud computing, a fundamental application is to outsource the mobile data to external cloud servers for scalable data…
Abstract—Graph-based ranking models have been widely applied in information retrieval area. In this paper, we focus on a wellknown graph-based…
Effective Key Management in DynamicWireless Sensor NetworksAbstract—Recently, wireless sensor networks (WSNs) havebeen deployed for a wide variety of applications, includingmilitary…
The massive proliferation of wireless infrastructures with complementary characteristics prompts the bandwidth aggregation for Concurrent Multipath Transfer (CMT) over heterogeneous…
Abstract: The timing channel is a logical communication channel in which information is encoded in the timing between events. Recently,…
In this paper, we will focus on the security of advanced metering infrastructure (AMI), which is one of the most…