Abstract is missing.
- Software Defined Network Routing in Wireless Sensor NetworkJunfeng Wang, Ping Zhai, Yin Zhang, Lei Shi, Gaoxiang Wu, Xiaobo Shi, Ping Zhou. 3-11 [doi]
- Efficient Graph Mining on Heterogeneous Platforms in the CloudTao Zhang, Weiqin Tong, Wenfeng Shen, Junjie Peng, Zhihua Niu. 12-21 [doi]
- Correlation-Aware Virtual Machine Placement in Data Center NetworksTao Chen, Yaoming Zhu, Xiaofeng Gao, Linghe Kong, Guihai Chen, Yongjian Wang. 22-32 [doi]
- Connectivity-Aware Virtual Machine Placement in 60 GHz Wireless Cloud CentersLinghe Kong, Linsheng Ye, Bowen Wang, Xiaofeng Gao, Fan Wu, Guihai Chen, M. Shamim Hossain. 33-43 [doi]
- Ethical Trust in Cloud Computing Using Fuzzy LogicAnkita Sharma, Hema Banati. 44-55 [doi]
- Answer Ranking by Analyzing Characteristic of Tags and Behaviors of UsersQian Wang, Lei Su, Yiyang Li, Junhui Liu. 56-65 [doi]
- Mobile Cloud Platform: Architecture, Deployment and Big Data ApplicationsMengchen Liu, Kai Lin, Jun Yang, Dengming Xiao, Yiming Miao, Lu Wang, Wei Li, Zeru Wei, Jiayi Lu. 66-80 [doi]
- Research on Algorithm and Model of Hand Gestures Recognition Based on HMMJunhui Liu, Yun Liao, Zhenli He, Yu Yang. 81-90 [doi]
- Question Recommendation Based on User Model in CQAJunfeng Wang, Lei Su, Jun Chen, Di Jiang. 91-101 [doi]
- Data Storage Protection of Community Medical Internet of ThingsZiyang Zhang, Fulong Chen 0002, Heping Ye, Junru Zhu, Cheng Zhang, Chao Liu. 102-110 [doi]
- Generalized Format-Preserving Encryption for Character DataYanyu Huang, Bo Li, Shuang Liang, Haoyu Ma, Zheli Liu. 113-122 [doi]
- Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage SystemZhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu. 123-132 [doi]
- Ring Signature Scheme from Multilinear Maps in the Standard ModelHong-zhang Han. 133-144 [doi]
- A Revocable Outsourcing Attribute-Based Encryption SchemeZoe L. Jiang, Ruoqing Zhang, Zechao Liu, S. M. Yiu, Lucas C. K. Hui, Xuan Wang, Junbin Fang. 145-161 [doi]
- Operational-Behavior Auditing in Cloud StorageZhaoyi Chen, Hui Tian 0002, Jing Lu, Yiqiao Cai, Tian Wang 0001, Yonghong Chen. 162-172 [doi]
- Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the CloudLanxiang Chen, Nan Zhang. 173-183 [doi]
- Secure Searchable Public-Key Encryption for Cloud StorageRun Xie, Chanlian He, Yu He, Chunxiang Xu, Kun Liu. 184-195 [doi]
- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG ImagesHao Zhang, Zhaoxia Yin, Xinpeng Zhang, Jianpeng Chen, Ruonan Wang, Bin Luo 0001. 196-203 [doi]
- Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication NetworksRunhua Shi, Shun Zhang. 204-215 [doi]
- DMSD-FPE: Data Masking System for Database Based on Format-Preserving EncryptionMingming Zhang, Guiyang Xie, Shimeng Wei, Pu Song, Zhonghao Guo, Zheli Liu, Zijing Cheng. 216-226 [doi]
- Delay-Tolerant Network Based Secure Transmission System DesignGang Ming, Zhenxiang Chen. 227-231 [doi]
- An Internal Waves Detection Method Based on PCANet for Images Captured from UAVQinghong Dong, Shengke Wang, Muwei Jian, Yujuan Sun, Junyu Dong. 232-237 [doi]