Sr. No. |
Paper ID |
Paper Title |
Year |
Domain |
Download |
1. |
GSC00001 |
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
2. |
GSC00002 |
Data Lineage in Malicious Environments |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
3. |
GSC00003 |
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
4. |
GSC00004 |
An Access Control Model for Online Social Networks Using User-to-User Relationships |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
5. |
GSC00005 |
FRoDO: Fraud Resilient Device for Off-line micro-payments |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
6. |
GSC00006 |
Achieving Flatness: Selecting the Honey words from Existing User Passwords |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
7. |
GSC00007 |
Assessing the Effectiveness of Moving Target Defenses using Security Models |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
8. |
GSC00008 |
Group Key Agreement with Local Connectivity |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
9. |
GSC00009 |
Secure Auditing and deduplication Data in Cloud |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
10. |
GSC00010 |
Enabling Fine-grained Multi-Keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
11. |
GSC00011 |
Leveraging Strategic Detection Techniques for Smart Home Pricing Cyberattacks |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
12. |
GSC00012 |
Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
13. |
GSC00013 |
Password Extraction via Reconstructed Wireless Mouse Trajectory |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
14. |
GSC00014 |
Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
15. |
GSC00015 |
A Support Vector Machine-based Framework for Detection of Covert Timing Channels |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
16. |
GSC00016 |
A Provenance-aware Access Control Framework with Typed Provenance |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
17. |
GSC00017 |
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
18. |
GSC00018 |
Cloning your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
19. |
GSC00019 |
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
20. |
GSC00020 |
Malware Detection in Cloud Computing Infrastructures |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
21. |
GSC00021 |
Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Network Sybil’s |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
22. |
GSC00022 |
Privacy Protection for Wireless Medical Sensor Data |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
23. |
GSC00023 |
Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
24. |
GSC00024 |
Designing Secure and Dependable Mobile Sensing Mechanisms with Revenue Guarantees |
2016-17 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
25. |
GSC00025 |
Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
26. |
GSC00026 |
netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
27. |
GSC00027 |
Secure and Robust Multi-Constrained QoS aware Routing Algorithm for VANETs |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
28. |
GSC00028 |
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems |
2015-16 |
SECURE COMPUTING |
|
29. |
GSC00029 |
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing |
2015-16 |
SECURE COMPUTING |
|
30. |
GSC00030 |
PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks |
2015-16 |
SECURE COMPUTING |
|
31. |
GSC00031 |
Top-k Query Result Completeness Verification in Tiered Sensor Networks |
2015-16 |
SECURE COMPUTING |
|
32. |
GSC00032 |
Twitsper: Tweeting Privately. |
2015-16 |
SECURE COMPUTING |
|
33. |
GSC00033 |
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs. |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
34. |
GSC00034 |
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks. |
2015-16 |
SECURE COMPUTING |
|
35. |
GSC00035 |
Personalized QoS-Aware Web Service Recommendation and Visualization. |
2015-16 |
SECURE COMPUTING |
|
36. |
GSC00036 |
Privacy-Enhanced Web Service Composition Whole Test Suite Generation. |
2015-16 |
SECURE COMPUTING |
|
37. |
GSC00037 |
A Decentralized Service Discovery Approach on Peer-to-Peer Networks. |
2015-16 |
SECURE COMPUTING |
|
38. |
GSC00038 |
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream. |
2015-16 |
SECURE COMPUTING |
|
39. |
GSC00039 |
SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems. |
2015-16 |
SECURE COMPUTING |
|
40. |
GSC00040 |
Identity-Based Secure Distributed Data Storage Schemes. |
2015-16 |
SECURE COMPUTING |
|
41. |
GSC00041 |
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. |
2015-16 |
SECURE COMPUTING |
|
42. |
GSC00042 |
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links. |
2015-16 |
SECURE COMPUTING |
|
43. |
GSC00043 |
Privacy Preserving Data Sharing with Anonymous ID Assignment. |
2015-16 |
SECURE COMPUTING |
|
44. |
GSC00044 |
Securing Class Initialization in Java-like Languages. |
2015-16 |
SECURE COMPUTING |
|
45. |
GSC00045 |
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks. |
2015-16 |
SECURE COMPUTING |
|
46. |
GSC00046 |
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links. |
2015-16 |
SECURE COMPUTING |
|
47. |
GSC00047 |
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. |
2015-16 |
SECURE COMPUTING |
|
48. |
GSC00048 |
EAACK—A Secure Intrusion-Detection System for MANETs. |
2015-16 |
SECURE COMPUTING |
|
49. |
GSC00049 |
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. |
2015-16 |
SECURE COMPUTING |
|
50. |
GSC00050 |
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols. |
2015-16 |
SECURE COMPUTING |
|
51. |
GSC00051 |
Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs |
2015-16 |
SECURE COMPUTING |
|
52. |
GSC00052 |
Two tales of privacy in online social networks |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
53. |
GSC00053 |
Extracting Spread-Spectrum Hidden Data from Digital Media |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
54. |
GSC00054 |
Utility-Privacy Tradeoff in Databases : an Information-theoretic Approach |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
55. |
GSC00055 |
TrPF A Trajectory Privacy-Preserving Framework for Participatory Sensing |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
56. |
GSC00056 |
Craigslist Scams and Community Composition Investigating Online Fraud Victimization |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
57. |
GSC00057 |
Securing Online Reputation Systems through Dumpster-Shafer Theory based Trust Model |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
58. |
GSC00058 |
Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
59. |
GSC00059 |
Efficiently Outsourcing Multiparty Computation under Multiple Keys |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
60. |
GSC00060 |
Security Using Colors and Armstrong Numbers |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
61. |
GSC00061 |
On Inference-Proof View Processing of XML Documents |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
62. |
GSC00062 |
A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
63. |
GSC00063 |
Privacy Preserving Data Analytics for Smart Homes |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
64. |
GSC00064 |
Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
65. |
GSC00065 |
Security and Privacy-Enhancing Multi-cloud Architectures |
2015-16 |
SECURE COMPUTING |
|
66. |
GSC00066 |
Non-Cooperative Location Privacy |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
67. |
GSC00067 |
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
68. |
GSC00068 |
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
69. |
GSC00069 |
An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol |
2015-16 |
SECURE COMPUTING |
[sociallocker][/sociallocker] |
For more topics please Call us on 9272150171/8805494880 or Mail us on projectsgoal@gmail.com |