Captcha As Graphical Passwords—A New Security Primitive Based On Hard Ai Problems
Cloud data security against Keylogging-resistant Visual Authentication Protocols
A hybrid approach for effective travel package recommendation system
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Nymble: Blocking Misbehaving Users In Anonymizing Networks
Data Leakage Detection
A Web Search Engine-Based Approach To Measure Semantic Similarity Between Words
Efficient Techniques For Online Record Linkage
Channel-Aware Routing In MANET’s With Route Handoff
Security Games For Vehicular Networks
Shiftflow:Dense Correspondance Across Scenes And Its Applications
Cloudtps: Scalable Transactions For Web Applications In The Cloud
Enabling Public Auditability And Data Dynamics
For Storage Security In Cloud Computing
Software Module Clustering As A Multi-Objective Search Problem
Scheduling Grid Tasks In Face Of Uncertain Communication Demands
Compressing Network Access Control Lists
Fast And Cost-Effective Online Load-Balancing In Distributed Range- Queriable Systems
Flexible Robust Group Key Agreement
Symmetric Key Approaches To Securing BGP-A Little Bit Trust Is Enough
Replica Placement For Route Diversity In Tree-Based Routing Distributed Hash Tables
Ritas: Services For Randomized Intrusion Tolerance
Prime Byzantine Replication Under Attack
A New Steganographic Method Based On Information Sharing Via PNG Images
Blind Authentication: A Secure Crypto-Biometric Verification Protocol
A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory
Step Construction Of Visual Cryptography Schemes
The Design Of A Generic Intrusion Tolerant Architecture For Web Servers
Mining Group Movement Patterns For Tracking Moving Objects Efficiently
Optimizing Resource Conflicts In Workflow Management Systems
Extended Xml Tree Pattern Matching: Theories And Algorithms
Improving Application Placement For Cluster Based Web Application
Harvesting Image Databases From The Web
Record Matching Over Query Result From Multiple Web Databases
Fivatech: Page-Level Web Data Extraction From Template Pages
Fast Query Point Movement Techniques For Large Cbir Systems
A Policy Enforcing Mechanism For Trusted Ad Hoc Networks
Mabs: Multicast Authentication Based On Batch Signature
PSF Estimation Via Gradient Domain Correlation
Generic Lossless Visible Watermarking—A New Approach
Educloud: Paas Versus Iaas Cloud Usage For An Advanced Computer Science Course
Optimal Service Pricing For A Cloud Cache
Abacs: An Attribute Based Access Control System For Emergency Services Over Vehicular Ad Hoc Networks
Enhancing Privacy And Authorization Control Scalability In The Grid Through Ontologies
Adaptive Task Checkpointing And Replication: Toward Efficient Fault-Tolerant Grids
Self-Reconfigurable Wireless Mesh Networks
+ more than 100 IEEE 2019 Titles