1 | -- | 15 | Xiaoqing Tan, Xiaoqian Zhang. Quantum information exchange protocol associated with the quantum cloud |
16 | -- | 30 | Zhengjun Jing, Guoping Jiang, Chunsheng Gu. A novel identity-based anonymous authentication scheme from multilinear maps |
31 | -- | 50 | Qiu-yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang. An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string |
51 | -- | 73 | Ankur Mishra, B. B. Gupta. Intelligent phishing detection system using similarity matching algorithms |
74 | -- | 97 | Syam Kumar Pasupuleti. Effective and secure data storage in multi-cloud storage architectures |
98 | -- | 112 | Yang Jing, Zeng Hui, Huang Jiangping. Grey neural network prediction model based on fruit fly optimisation algorithm and its application |
113 | -- | 130 | Jianhong Zhang, Xubing Zhao, Weina Zhen. 2PAD: secure self-certified public auditing for data integrity in cloud storage and its extension |
131 | -- | 142 | S. Anthoniraj, S. Saraswathi. Frequent failure monitoring and reporting in virtualisation environment using backing algorithm technique |
143 | -- | 161 | Xiaoli Gong, Zhaoyang Shao, Qi Du, Aimin Yu, Jin Zhang. Performance overhead analysis of virtualisation on ARM |
162 | -- | 174 | Hang Yang, Peng Li, Xiaobin Guo, Huajun Chen, Zhiqiang Lin. A review: The effects of imperfect data on incremental decision tree |
175 | -- | 185 | Wei Zhang. The design of strain sensitising of high-sensitivity SAW sensor based on FBG |
186 | -- | 208 | Ali Kanso, Abdelouahed Gherbi, Yves Lemieux. Middleware-managed high availability for cloud applications |
209 | -- | 228 | Guoqiang Gao, Ruixuan Li, Zhiyong Xu. Mimir: a term-distributed retrieval system for secret documents |