1 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks. Dotnet/Java
2 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs. Dotnet/Java
3 EAACK—A Secure Intrusion-Detection System for MANETs. Dotnet/Java
4 Multitouch Gesture-Based Authentication. Dotnet/Java
5 A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers. Dotnet/Java
6 Security evaluation of pattern classifiers under attack Dotnet/Java
7 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds. Dotnet/Java
8 Security evaluation of pattern classifiers under attack. Dotnet/Java
9 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. Dotnet/Java
10 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks. Dotnet/Java
11 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks. Dotnet/Java
12 Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism. Dotnet/Java
13 Image Fusion with Guided Filtering. Dotnet/Java
14 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases. Dotnet/Java
15 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds. Dotnet/Java
16 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. Dotnet/Java
17 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption. Dotnet/Java
18 Revisiting Defenses against Large-Scale Online Password Guessing Attacks. Dotnet/Java
19 oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attack. Dotnet/Java
20 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks. Dotnet/Java
21 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques. Dotnet/Java
22 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis. Dotnet/Java
23 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems. Dotnet/Java
24 A Novel Anti Phishing Framework based on Visual Cryptography. Dotnet/Java
25 Resilient Identity Crime Detection. Dotnet/Java
26 AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments Dotnet/Java
27 Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition Dotnet/Java
28 Harvesting Image Database From Web. Dotnet/Java
29 A Business Model for cloud computing Based on a Separate Encryption and Decryption Services. Dotnet/Java
30 One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases. Dotnet/Java
31 PMSE: A Personalized Mobile Search Engine Dotnet/Java
32 An Empirical Performance Evaluation of Relational Keyword Search Techniques Dotnet/Java
33 Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme Dotnet/Java
34 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality Dotnet/Java
35 Teaching RFID Information Systems Security. Dotnet/Java
36 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Dotnet/Java
37 Secure Continuous Aggregation in Wireless Sensor Networks Dotnet/Java
38 Privacy-Preserving Authenticated Key-Exchange Over Internet. Dotnet/Java
39 Customer Relationship Management System based on Data mining Technique. Dotnet/Java