October 29, 2014

Attribute-Based Encryption With Verifiable Outsourced Decryption |FTJ1372

Attribute-Based Encryption With Verifiable Outsourced Decryption : IEEE2013 Abstract—Attribute-based encryption (ABE) is a public-key- based one-to-many encryption that allows users to encrypt and decrypt data based […]
October 29, 2014

WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream | FTJ1327

WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream : IEEE 2013 Abstract: Twitter is prone to malicious tweets containing URLs for spam, […]
October 25, 2014

Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage | FTJ1470

Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage : IEEE 2014 Abstract: Remote data integrity checking is of crucial impor­tance in cloud storage. It can make […]
October 25, 2014

Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image Compression |FTJ1459

Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image Compression : IEEE2014 Abstract: This paper presents a new lossless color image compression algorithm, based on […]
October 25, 2014

Improving Network I/O Virtualization for Cloud Computing | FTJ1469

Improving Network I/O Virtualization for Cloud Computing : IEEE 2014 Abstract: Virtualization is a key technology to enable cloud computing. It enhances resource availability and offers […]