Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 4. A Multilevel Access Control Scheme for Data Security in Transparent Computing 5. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage 6. A robust reputation management mechanism in the federated cloud 7. Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data 8. Attribute-Based Storage Supporting Secure De-duplication of Encrypted Data in Cloud 9. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing 10. Collaborative Filtering-Based Recommendation of Online Social Voting 11. Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data SECURE 12. Dynamic Facet Ordering for Faceted Product Search Engines
13. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage 14. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud 15. Efficient Keyword-aware Representative Travel Route Recommendation 16. Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data 17. Fast Phrase Search for Encrypted Cloud Storage 18. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems 19. Generating Query Facets using Knowledge Bases 20. Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud 21. iask: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence 22. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds 23. Identity-Based Encryption with Cloud Revocation Authority and Its Applications 24. Identity-Based Private Matching over Outsourced Encrypted Datasets 25. Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage
26. Keyword Search with Access Control over Encrypted Cloud Data 27. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection 28. My Privacy My Decision: Control of Photo Sharing on Online Social Networks 29. Network Capability in Localizing Node Failures via End-to-End Path Measurements 30. On the Security of Data Access Control for Multi-authority Cloud Storage Systems 31. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories 32. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing 33. Privacy Protection based Access Control Scheme in Cloud-based Services 34. Privacy-Preserving Multikeyword Top-k Similarity Search Over Outsourced Cloud Data 35. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data 36. ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions 37. Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud SECURE NETWORKIN G NETWORKIN G
38. QoS Recommendation in Cloud Services 39. Quantifying Interdependent Privacy Risks with Location Data 40. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage 41. RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem 42. Secure Data Sharing in Cloud Computing Using Revocable- Storage Identity-Based Encryption 43. Securing Cloud Data under Key Exposure 44. SeDaSC: Secure Data Sharing in Clouds 45. SocialQ&A: An Online Social Network Based Question and Answer System 46. SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors 47. SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud 48. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage 49. SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks 50. TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud SECURE MOBILE
51. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud 52. Towards Real-Time, Country-Level Location Classification of Worldwide Tweets 53. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving 54. User Differentiated Verifiable File Search on the Cloud 55. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective 56. VPSearch: Achieving Verifiability for Privacy-Preserving Multi- Keyword Search over Encrypted Cloud Data 57. A Mixed Generative-Discriminative Based Hashing Method 58. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 59. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 60. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 61. Active Trust :Secure and Trustable Routing in Wireless Sensor Networks 62. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Networking
63. An Efficient Privacy-Preserving Ranked Keyword Search Method 64. Automatically Mining Facets for Queries from Their Search Results 65. Circuit Cipher text-policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 66. Cloud Armor: Supporting Reputation-Based Trust Management for Cloud Services 67. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 68. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Micro blogging Information 69. Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts 70. Crowd sourcing for Top-K Query Processing over Uncertain Data 71. Cyber bullying Detection based on Semantic-Enhanced Marginalized De noising Auto-Encoder 72. Data Lineage in Malicious Environments 73. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments Information Security
74. DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud 75. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 76. Dynamic and Public Auditing with Fair Arbitration for Cloud Data 77. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 78. Enabling Fine-Grained Multi-Keyword Search Supporting Classified SubDictionaries over Encrypted Cloud Data 79. EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 80. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 81. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing 82. Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions 83. ID2S Password-Authenticated Key Exchange Protocols 84. Identity-Based Encryption with Cloud Revocation Authority and Its Applications Information Security Information security Networking
85. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 86. ipath: Path Inference in Wireless Sensor Networks 87. KSF-OABE Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage 88. Location Aware Keyword Query Suggestion Based on Document Proximity 89. Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine Grained Owner-Enforced Search Authorization in the Cloud 90. Secure Data Sharing in Cloud Computing Using Revocable- Storage Identity-Based Encryptio 91. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Networking 92. Audit-Free Cloud Storage via Deniable Attribute-based Encryption 93. Identity-Based Encryption with Outsourced Revocation in Cloud Computing 94. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage 95. Privacy Preserving Ranked Multi-Keyword Search for Multiple
Data Owners in Cloud Computing 96. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 97. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 98. Secure Distributed Deduplication Systems with Improved Reliability 99. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability Information Secuirty 100. Secure Auditing and Deduplicating Data in Cloud 101. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 102. Scalable Constrained Spectral Clustering 103. Cloud Key Bank: Privacy and Owner Authorization Enforced Key Management Framework 104. An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration 105. Enabling Fine-grained Multi-keyword Search Supporting Classified Subdictionaries over Encrypted Cloud Data
106. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 107. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption 108. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 109. Provable Multi copy Dynamic Data Possession in Cloud Computing Systems 110. Enabling Cloud Storage Auditing With Key-Exposure Resistance 111. On the Security of Data Access Control for Multi authority Cloud Storage Systems 112. Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services 113. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services 114. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage 115. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds 116. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
117. A Hybrid Cloud Approach for Secure Authorized Deduplication 118. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data 119. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 120. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 121. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 122. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage 123. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems 124. Fast Nearest Neighbor Search with Keywords 125. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 126. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 127. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Information Security Networking Networking
128. Privacy-Preserving and Content-Protecting Location Based Queries 129. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Information Security