Search
Now showing items 11-18 of 18
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Green operator cooperation for radio frequency transmission minimization
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ...
A new technique for compacting secret key in attribute-based broadcast encryption
(
Springer Verlag
, 2016 , Conference Paper)
Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ...
A novel multi-hop body-To-body routing protocol for disaster and emergency networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ...
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
(
World Scientific Publishing Co. Pte Ltd
, 2016 , Article)
In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
Using block cipher for confidentiality of images in cloud-based systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
Skyline Discovery and Composition of Multi-Cloud Mashup Services
(
Institute of Electrical and Electronics Engineers
, 2016 , Article)
A cloud mashup is composed of multiple services with shared datasets and integrated functionalities. For example, the elastic compute cloud (EC2) provided by Amazon Web Service (AWS), the authentication and authorization ...
FastRNABindR: Fast and Accurate Prediction of Protein-RNA Interface Residues
(
Public Library of Science (PLoS)
, 2016 , Article)
A wide range of biological processes, including regulation of gene expression, protein synthesis, and replication and assembly of many viruses are mediated by RNA-protein interactions. However, experimental determination ...