ºÝºÝߣ
×
Upload
Login
Download free for 30 days
Submit Search
Upload
Download free for 30 days
Login
×
×
×
×
×
×
swathi78
5 Followers
95
ºÝºÝߣShares
5
Followers
Following
Follow
Unblock User
Block User
95
ºÝºÝߣShares
5
Followers
Presentations
Documents
Infographics
Latest
Most Popular
Download
secure mining of association rules in horizontally distributed databases
10 years ago
•
485 Views
Download
Download
a system for denial-of-service attack detection based on multivariate correlation analysis
10 years ago
•
725 Views
Download
Download
web service recommendation via exploiting location and qo s information
10 years ago
•
707 Views
Download
Download
privacy-enhanced web service composition
10 years ago
•
508 Views
Download
Download
optimal distributed malware defense in mobile networks with heterogeneous devices
10 years ago
•
343 Views
Download
Download
friend book a semantic-based friend recommendation system for social networks
10 years ago
•
1257 Views
Download
Download
efficient authentication for mobile and pervasive computing
10 years ago
•
780 Views
Download
Download
cooperative caching for efficient data access in disruption tolerant networks
10 years ago
•
347 Views
Download
Download
an incentive framework for cellular traffic offloading
10 years ago
•
343 Views
Download
Download
secure outsourced attribute-based signatures
10 years ago
•
291 Views
Download
Download
traffic pattern-based content leakage detection for trusted content delivery networks
10 years ago
•
226 Views
Download
Download
the design and evaluation of an information sharing system for human networks
10 years ago
•
328 Views
Download
Download
the client assignment problem for continuous distributed interactive applications analysis, algorithms, and eva
10 years ago
•
406 Views
Download
Download
sos a distributed mobile q&a system based on social networks
10 years ago
•
263 Views
Download
Download
securing broker-less publish subscribe systems using identity-based encryption
10 years ago
•
370 Views
Download
Download
rre a game-theoretic intrusion response and recovery engine
10 years ago
•
266 Views
Download
Download
on false data-injection attacks against power system state estimation modeling and countermeasures
10 years ago
•
228 Views
Download
Download
loca ward a security and privacy aware location-based rewarding system
10 years ago
•
283 Views
Download
Download
exploiting service similarity for privacy in location-based search queries
10 years ago
•
649 Views
Download
Download
enabling trustworthy service evaluation in service-oriented mobile social networks
10 years ago
•
401 Views
Download
1
2
3
4
5