ABSTRACT: Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their…
ABSTRACT: In this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without…
ABSTRACT: Existing social networking services recommend friends to users based on their social graphs, which may not be the most…
ABSTRACT: In this paper, we propose an energy efficient virtual network embedding (EEVNE) approach for cloud computing networks, where power…
Abstract—Using cloud computing, individuals can store their data on remote servers and allow data access to public users through the…
ABSTRACT: In mobile cloud computing, a fundamental application is to outsource the mobile data to external cloud servers for scalable…
Abstract—Graph-based ranking models have been widely applied in information retrieval area. In this paper, we focus on a well known…
Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient…
ABSTRACT: The massive proliferation of wireless infrastructures with complementary characteristics prompts the bandwidth aggregation for Concurrent Multipath Transfer (CMT) over…
Abstract: The timing channel is a logical communication channel in which information is encoded in the timing between events. Recently,…
ABSTRACT: In this paper, we will focus on the security of advanced metering infrastructure (AMI), which is one of the…
ABSTRACT: This paper presents a systematic data-driven approach to assisting situational application development. We first propose a technique to extract…
Data sharing for data collection among multiple applications is an efficient way to reduce communication cost for Wireless Sensor Networks…
ABSTRACT: Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenishable energy resources.…
ABSTRACT: This paper presents a new approach to index color images using the features extracted from the error diffusion block…