559 results on '"Ali Miri"'
Search Results
52. A Sybil Resistant IoT Trust Model Using Blockchains.
53. Integrated Random Projection and Dimensionality Reduction by Propagating Light in Photonic Lattices.
54. Fast Phrase Search for Encrypted Cloud Storage.
55. A New Gradual Secret Sharing Scheme with Diverse Access Structure.
56. Association of the ESR1 (rs9340799), OLR1 (rs3736234), LIPC (rs2070895), VDR (rs2228570), and CETP (rs708272) Polymorphisms With Risk of Coronary Artery Disease in Iranian Patients.
57. Mapping the XY Hamiltonian onto a Network of Coupled Lasers.
58. An IoT trust and reputation model based on recommender systems.
59. Secure image data deduplication through compressive sensing.
60. A Combined Solution for Conjunctive Keyword Search, Phrase Search and Auditing for Encrypted Cloud Storage.
61. Scanning for Viruses on Encrypted Cloud Storage.
62. Anonymous Authentication with a Bi-directional Identity Federation in the Cloud.
63. Energy-Efficient Resource Allocation for Cloud Data Centres Using a Multi-way Data Analysis Technique.
64. Multivariate Time Series ELM for Cloud Data Centre Workload Prediction.
65. Privacy Preserving Predictive Analytics with Smart Meters.
66. Determination of cadmium in rice samples using amino-functionalized metal-organic framework by a pipette tip solid phase extraction
67. An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network.
68. End-to-End Performance Prediction for Selecting Cloud Services Solutions.
69. A Low Storage Phase Search Scheme Based on Bloom Filters for Encrypted Cloud Services.
70. Using ELM Techniques to Predict Data Centre VM Requests.
71. An Extreme Learning Machine (ELM) Predictor for Electric Arc Furnaces' v-i Characteristics.
72. Open Source Cloud Management Platforms: A Review.
73. Similarity Measure Based on Low-Rank Approximation for Highly Scalable Recommender Systems.
74. An Efficient Conjunctive Keyword and Phase Search Scheme for Encrypted Cloud Storage Systems.
75. End-to-End QoS Prediction of Vertical Service Composition in the Cloud.
76. A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression.
77. Index Selection on MapReduce Relational-Databases.
78. Computation and Search over Encrypted XML Documents.
79. Proof of Storage for Video Deduplication in the Cloud.
80. End-to-End QoS Prediction Model of Vertically Composed Cloud Services via Tensor Factorization.
81. Output and Input Data Perturbations for Differentially Private Databases.
82. A Systematic Cloud Workload Clustering Technique in Large Scale Data Centers.
83. Arrayed waveguide lens for beam steering
84. On Defending Against Label Flipping Attacks on Malware Detection Systems.
85. Incorporating service and user information and latent features to predict QoS for selecting and recommending cloud service compositions.
86. Secure image deduplication through image compression.
87. Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression.
88. End-to-end QoS mapping and aggregation for selecting cloud services.
89. Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication.
90. Efficient pairing-free, certificateless two-party authenticated key agreement protocol for grid computing.
91. Proof of retrieval and ownership protocols for enterprise-level data deduplication.
92. Secure Enterprise Data Deduplication in the Cloud.
93. An End-to-End QoS Mapping Approach for Cloud Service Selection.
94. A secure data deduplication framework for cloud environments.
95. COMPASS: Authenticated Group Key Agreement from Signcryption.
96. A new image encryption algorithm based on a chaotic DNA substitution method.
97. Lightweight mutual RFID authentication.
98. On the hardware design and implementation of a chaos-based RFID authentication and watermarking scheme.
99. On efficient decoding for the Fuzzy Vault scheme.
100. Forward secure identity-based key agreement for dynamic groups.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.