How to Find a Perfect Data Scientist: A Distance-Metric Learning Approach. | 0 | 0.34 | 2018 |
Towards Virus Scanning as a Service in Mobile Cloud Computing: Energy-Efficient Dispatching Policy Under N-Version Protection. | 1 | 0.37 | 2018 |
ResumeNet: A Learning-Based Framework for Automatic Resume Quality Assessment | 0 | 0.34 | 2018 |
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud | 3 | 0.38 | 2015 |
A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment | 0 | 0.34 | 2014 |
Improved anonymous proxy re-encryption with CCA security | 2 | 0.39 | 2014 |
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms | 1 | 0.37 | 2014 |
Protecting access privacy of cached contents in information centric networks | 17 | 0.68 | 2013 |
Cherub: Fine-grained application protection with on-demand virtualization. | 0 | 0.34 | 2013 |
Lattice-Based Multi-party Concurrent Signatures Scheme | 2 | 0.41 | 2013 |
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud | 2 | 0.41 | 2013 |
Information-centric networking based homenet | 5 | 0.75 | 2013 |
Contextualized information-centric home network | 7 | 0.67 | 2013 |
ACaaS: Access Control as a Service for IaaS Cloud | 5 | 0.57 | 2013 |
Behavioral Attestation for Web Services using access policies | 0 | 0.34 | 2013 |
AppInk: watermarking android apps for repackaging deterrence | 35 | 1.11 | 2013 |
Towards software defined ICN based edge-cloud services | 19 | 0.97 | 2013 |
Remote Attestation with Domain-Based Integrity Model and Policy Analysis | 12 | 0.88 | 2012 |
Enhancing the Trust of Internet Routing With Lightweight Route Attestation | 3 | 0.39 | 2012 |
On-demand security service | 0 | 0.34 | 2012 |
CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud | 30 | 1.06 | 2012 |
Supporting dual-mode forwarding in content-centric network | 2 | 0.39 | 2012 |
Multiparty Cloud Computation | 0 | 0.34 | 2012 |
VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks | 22 | 1.08 | 2012 |
Towards end-to-end secure content storage and delivery with public cloud | 17 | 0.80 | 2012 |
Supporting seamless mobility in named data networking | 23 | 1.27 | 2012 |
An Android runtime security policy enforcement framework | 5 | 0.53 | 2012 |
Chrome Extensions: Threat Analysis and Countermeasures. | 24 | 1.23 | 2012 |
Architectural support of multiple hypervisors over single platform for enhancing cloud computing security | 2 | 0.38 | 2012 |
STC 2012: the seventh ACM workshop on scalable trusted computing | 0 | 0.34 | 2012 |
Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing | 8 | 0.52 | 2011 |
Botnet with Browser Extensions | 2 | 0.38 | 2011 |
Towards name-based trust and security for content-centric network | 37 | 1.91 | 2011 |
Unleashing the Power of Mobile Cloud Computing using ThinkAir | 15 | 0.79 | 2011 |
TGIS: Booting Trust for Secure Information Sharing in Dynamic Group Collaborations. | 2 | 0.39 | 2011 |
xDAuth: a scalable and lightweight framework for cross domain access control and delegation | 15 | 0.74 | 2011 |
Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing | 122 | 4.70 | 2011 |
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services. | 7 | 0.50 | 2011 |
Patient-centric authorization framework for electronic healthcare services | 30 | 1.67 | 2011 |
Taming information-stealing smartphone applications (on Android) | 107 | 9.27 | 2011 |
Runtime Administration of an RBAC Profile for XACML | 3 | 0.43 | 2011 |
SEIP: simple and efficient integrity protection for open mobile platforms | 6 | 0.86 | 2010 |
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication | 73 | 3.29 | 2010 |
Elastic HTML5: Workload Offloading Using Cloud-Based Web Workers and Storages for Mobile Devices. | 7 | 0.57 | 2010 |
Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing | 4 | 0.51 | 2010 |
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms | 13 | 2.02 | 2009 |
Towards Session-Aware RBAC Administration and Enforcement with XACML | 7 | 0.54 | 2009 |