Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud DataAbstract—Using cloud computing, individuals can store their data on remote…
In mobile cloud computing, a fundamental application is to outsource the mobile data to external cloud servers for scalable data…
Abstract—Graph-based ranking models have been widely applied in information retrieval area. In this paper, we focus on a wellknown graph-based…
Effective Key Management in DynamicWireless Sensor NetworksAbstract—Recently, wireless sensor networks (WSNs) havebeen deployed for a wide variety of applications, includingmilitary…
The massive proliferation of wireless infrastructures with complementary characteristics prompts the bandwidth aggregation for Concurrent Multipath Transfer (CMT) over heterogeneous…
Abstract: The timing channel is a logical communication channel in which information is encoded in the timing between events. Recently,…
In this paper, we will focus on the security of advanced metering infrastructure (AMI), which is one of the most…
This paper presents a systematic data-driven approach to assisting situational application development. We first propose a technique to extract useful…
Data Collection in Multi-Application SharingWireless Sensor NetworksHong Gao, Xiaolin Fang, Jianzhong Li, and Yingshu LiAbstract—Data sharing for data collection among…
Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenishable energy resources. In…
This paper presents a new approach to index color images using the features extracted from the error diffusion block truncation…
INTRODUCTIONOver the past few years, anywhere, anytime wirelessconnectivity has gradually become a realityand has resulted in remarkably increased mobiletraffic. Mobile…
Authenticated Key Exchange Protocols for ParallelNetwork File SystemsHoon Wei Lim Guomin YangAbstract—We study the problem of key establishment for securemany-to-many…
AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF THINGS ABSTRACT: The Internet of Things (IoT) is becoming an attractive…
1.1 ABSTRACT: Big sensor data is prevalent in both industry and scientific research applications where the data is generated with…