


default search action
Information Sciences, Volume 387
Volume 387, May 2017
- Kang Han Oh, Myungeun Lee
, Yura Lee, Soo-Hyung Kim:
Salient object detection using recursive regional feature clustering. 1-18 - Xiaoan Tang, Chao Fu, Dong-Ling Xu
, Shanlin Yang:
Analysis of fuzzy Hamacher aggregation functions for uncertain multiple attribute decision making. 19-33 - Tao Lei
, Yanning Zhang, Yi Wang
, Shigang Liu, Zhe Guo:
A conditionally invariant mathematical morphological framework for color images. 34-52
- Zheng Yan
, Robert H. Deng
, Vijay Varadharajan
:
Cryptography and Data Security in Cloud Computing. 53-55 - Arcangelo Castiglione
, Alfredo De Santis
, Barbara Masucci, Francesco Palmieri, Xinyi Huang, Aniello Castiglione
:
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme. 56-74 - Kun He, Jing Chen
, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure independent-update concise-expression access control for video on demand in cloud. 75-89 - Muhammad Usman
, Mian Ahmad Jan, Xiangjian He
:
Cryptography-based secure data storage and sharing using HEVC and public clouds. 90-102 - Yibin Li, Keke Gai
, Longfei Qiu, Meikang Qiu, Hui Zhao:
Intelligent cryptography approach for secure distributed big data storage in cloud computing. 103-115 - Kan Yang
, Kuan Zhang
, Xiaohua Jia, M. Anwar Hasan, Xuemin (Sherman) Shen
:
Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. 116-131 - Guiqiang Hu, Di Xiao, Tao Xiang, Sen Bai, Yushu Zhang:
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. 132-145 - Yanguo Peng, Jiangtao Cui, Hui Li, Jianfeng Ma:
A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud. 146-164 - Tao Peng, Qin Liu, Dacheng Meng, Guojun Wang:
Collaborative trajectory privacy preserving scheme in location-based services. 165-179 - En Zhang
, Fenghua Li, Ben Niu, Yanchao Wang:
Server-aided private set intersection based on reputation. 180-194 - Zhihua Xia
, Neal N. Xiong
, Athanasios V. Vasilakos
, Xingming Sun:
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. 195-204 - Fenghua Li, Yuanyuan He, Ben Niu
, Hui Li:
Small-world: Secure friend matching over physical world and social networks. 205-220 - Wei Song, Bing Wang
, Qian Wang
, Zhiyong Peng, Wenjing Lou:
Tell me the truth: Practically public authentication for outsourced databases with multi-user modification. 221-237 - Hui Lin, Jia Hu, Youliang Tian, Li Yang, Li Xu:
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism. 238-253 - Laurence T. Yang
, Gaoyuan Huang, Jun Feng
, Li Xu:
Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing. 254-265 - Ce Yang, Weiming Zhang, Nenghai Yu:
Semi-order preserving encryption. 266-279

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.