Projection Method for Image Watermarking
Query Planning for Continuous Aggregation Queries
Latency Equalization as a New Network Service Primitive
Gibraltar Prototype for Detection of Kernel Level Rootkits (Abstract)
Analysis and Implementation of a Novel.docx
Robust Face-Name Graph Matching for Movie Character Identification
Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
Automatic Reconfiguration for Large-Scale Reliable Storage Systems
AMPLE an Adaptive Traffic Engineering System Based on Virtual Routing Topologies
A New Cell-Counting-Based Attack Against Tor
Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points
Fair Torrent a Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-To-Peer Systems
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA IEEE PROJECTS 2015
COMBINING EFFICIENCY, FIDELITY, AND FLEXIBILITY IN RESOURCE INFORMATION SERVICES IEEE PROJECT 2015 2016 MICANS INFOTECH
BASE PAPER (7).pdf
Web Image Re Ranking Using Query Specific Semantic Signatures - IEEE Project 2014-2015
Building Confidential and Efficient Query Services in the Cloud With RASP Data Perturbation - IEEE Project 2014-2015
Secure Mining of Association Rules in Horizontally Distributed Databases - IEEE Project 2014-2015