October 25, 2014

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation |FTJ1453

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation : IEEE2014 Abstract: We propose a new decentralized access control scheme for secure […]
October 25, 2014

Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing | FTJ1463

Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing : IEEE 2014 Abstract To improve the accuracy of learning result, in practice multiple parties […]
October 25, 2014

Bandwidth Distributed Denial of Service: Attacks and Defenses |FTJ1452

Bandwidth Distributed Denial of Service: Attacks and Defenses : IEEE2014 Abstract: The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a […]
October 25, 2014

Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme |FTJ1451

Approximate Shortest Distance Computing: A Query- Dependent Local Landmark Scheme : IEEE2014 Abstract: Shortest distance query is a fundamental operation in large-scale networks. Many existing methods […]
October 25, 2014

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | FTJ1462

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks : IEEE 2014 Abstract Link error and malicious packet dropping are two sources […]