In this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without sacrificing…
Existing social networking services recommend friends to users based on their social graphs, which may not be the most appropriate…
In this paper, we propose an energy efficient virtual network embedding (EEVNE) approach for cloud computing networks, where power savings…
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud DataAbstract—Using cloud computing, individuals can store their data on remote…
In mobile cloud computing, a fundamental application is to outsource the mobile data to external cloud servers for scalable data…
Abstract—Graph-based ranking models have been widely applied in information retrieval area. In this paper, we focus on a wellknown graph-based…
Effective Key Management in DynamicWireless Sensor NetworksAbstract—Recently, wireless sensor networks (WSNs) havebeen deployed for a wide variety of applications, includingmilitary…
The massive proliferation of wireless infrastructures with complementary characteristics prompts the bandwidth aggregation for Concurrent Multipath Transfer (CMT) over heterogeneous…
Abstract: The timing channel is a logical communication channel in which information is encoded in the timing between events. Recently,…
In this paper, we will focus on the security of advanced metering infrastructure (AMI), which is one of the most…
This paper presents a systematic data-driven approach to assisting situational application development. We first propose a technique to extract useful…
Data Collection in Multi-Application SharingWireless Sensor NetworksHong Gao, Xiaolin Fang, Jianzhong Li, and Yingshu LiAbstract—Data sharing for data collection among…
Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenishable energy resources. In…
This paper presents a new approach to index color images using the features extracted from the error diffusion block truncation…
INTRODUCTIONOver the past few years, anywhere, anytime wirelessconnectivity has gradually become a realityand has resulted in remarkably increased mobiletraffic. Mobile…