In today’s era, there is a great deal added to real-time remote sensing Big Data than it seems at first,…
This paper introduces a data structure for k-NN search, the Rank Cover Tree (RCT), whose pruning tests rely solely on…
The Distributed m-healthcare cloud computing system considerably facilitates secure and efficient patient treatment for medical consultation by sharing personal health…
Statistics from security firms, research institutions and government organizations show that the numbers of data-leak instances have grown rapidly in…
ABSTRACT: With data storage and sharing services in the cloud, users can easily modify and share data as a group.…
In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that our…
Malware Propagation in Large-Scale NetworksAbstract—Malware is pervasive in networks, and poses a critical threat to network security. However, we have…
Abstract—This paper proposes a lossless, a reversible, and a combined data hiding schemes for ciphertext images encrypted by public key…
Abstract: Top-k query is an important operation to return a set of interesting points in a potentially huge data space.…
Continuous and Transparent User IdentityVerification for Secure Internet ServicesAndrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, Paolo Lollini,Angelo Marguglio, and Andrea Bondavalli,…