The research on privacy protection in cloud, intermediate dataset privacy preserving and Priva-cy-Preserving Data Publishing (PPDP). Currently, encryption is exploited by most existing research to ensure the data privacy in cloud . Although encryption works well for data privacy in these approaches, it is necessary to encrypt and decrypt datasets frequently in many applications. Encryption […]
Archives for February 2014
Autoregressive Moving Average Model
Mobile social networks as emerging social communication platforms have attracted great attention recently, and their mobile applications have been developed and implemented pervasively. In mobile social networking applications, profile matching acts as a critical initial step to help users, especially strangers, initialize conversation with each other in a distributed manner. Introduced a distributed mobile communication […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
Thyristor-controlled series compensator and unified Power-flow controller
Increased demand of bulk power transfer in the modern power network has led to an increased focus on transmission constraints and alleviation. Flexible ac transmission systems (FACTS) devices offer a versatile alternative to conventional reinforcement methods. Among them, the thyristor-controlled series compensator (TCSC) and unified power-flow controller (UPFC) are important FACTS devices, which are used […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
A Fine Grained Privacy Preserving Location Query Protocol
There are several works achieving privacy-preserving location query, which are based on k-anonymity model. The k-anonymity model has been widely used to protect data privacy. The basic idea is to remove some features such that each item is not distinguishable among other k items. The relevant techniques which achieve k-anonymity of data cannot be used […]
Encrypted Information Hiding in the Spatial Domain
The concept of encrypted information hiding has been presented. The use of cryptographic algorithms together with steganography and watermarking methods make it almost impossible for interceptor to recover the encrypted hidden data as this requires the interceptor to detect the existence of the information before attempting to decrypt it. To recover the original data, the […]
Security and Complexity Analysis
Firewalls are critical in securing private networks of businesses, institutions, and home networks. A firewall is often placed at the entrance between a private network and the external network so that it can check each incoming or outgoing packet and decide whether to accept or discard the packet based on its policy. A firewall policy […]
The real mobile computing environment in group key management
In next-generation mobile communication, multicast service will be a key application for supporting a large group of subscribers simultaneously. Because multicast transmits data to the group simultaneously, it reduces the communication cost significantly. Since multicast may be vulnerable to an overhearing attack, this efficiency can be achieved only when security or access control is guaranteed; […]