18 March 2014

Special issue published: "Network Computing and its Security"

International Journal of High Performance Systems Architecture 5(1) 2014

Expanded versions of papers presented at the 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS2013) and 4th International Conference on Emerging Intelligent Data and Web Technologies (EIDWT2013).
  • Private mutual authentications with fuzzy matching
  • Computing the PUE of data centres by leveraging workload fluctuation
  • On provably secure code-based multiple grade proxy signature scheme
  • Public-key searchable encryption from lattices
  • A novel approach to generate and extract audio watermark
  • Research on born-digital image text extraction based on conditional random field
  • Enhancing the search ability of differential evolution through competent leader
  • STSHC: secure and trusted scheme for Hadoop cluster

No comments: