A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment
暂无分享,去创建一个
P. Dhavachelvan | T. Vengattaraman | D. Chandramohan | Dananjayan Sathian | Dayalan Rajaguru | T. Vengattaraman | P. Dhavachelvan | D. Chandramohan | D. Rajaguru | D. Sathian
[1] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[2] Walid I. Khedr. SRFID: A hash-based security scheme for low cost RFID systems , 2013 .
[3] Dhavachelvan Ponnurangam,et al. A survey of keyword spotting techniques for printed document images , 2010, Artificial Intelligence Review.
[4] Li-Chen Fu,et al. Toward Reliable Service Management in Message-Oriented Pervasive Systems , 2011, IEEE Transactions on Services Computing.
[5] P. Dhavachelvan,et al. HPPC-Hierarchical Petri-Net based Privacy nominal model approach for Cloud , 2012, 2012 Annual IEEE India Conference (INDICON).
[6] Xiaohui Liang,et al. A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs , 2012, IEEE Transactions on Intelligent Transportation Systems.
[7] P. Dhavachelvan,et al. Hybrid authentication technique to preserve user privacy and protection as an end point lock for the cloud service digital information , 2013, 2013 International Conference on Green High Performance Computing (ICGHPC).
[8] Mohamed Hashem,et al. Securing DSR with mobile agents in wireless ad hoc networks , 2011 .
[9] Yuguang Fang,et al. An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[10] Kai Hwang,et al. Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.
[11] Qun Li,et al. Snoogle: A Search Engine for Pervasive Environments , 2010, IEEE Transactions on Parallel and Distributed Systems.
[12] Franco Zambonelli,et al. Developing pervasive multi-agent systems with nature-inspired coordination , 2015, Pervasive Mob. Comput..
[13] Ramachandran Baskaran,et al. An application perspective evaluation of multi-agent system in versatile environments , 2011, Expert Syst. Appl..
[14] T. Vengattaraman,et al. MSRCC - Mitigation of Security Risks in Cloud Computing , 2012, ACITY.
[15] Krishna Asawa,et al. A secure and efficient cryptographic hash function based on NewFORK-256 , 2012 .
[16] P. Dhavachelvan,et al. An agent-based personalized E-learning environment: Effort prediction perspective , 2009, 2009 International Conference on Intelligent Agent & Multi-Agent Systems.
[17] P. V. G. D. Prasad Reddy,et al. A Threat Free Architecture for Privacy Assurance in Cloud Computing , 2011, 2011 IEEE World Congress on Services.
[18] Majid Sarrafzadeh,et al. Accelerometer-based on-body sensor localization for health and medical monitoring applications , 2011, Pervasive Mob. Comput..
[19] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[20] Ramachandran Baskaran,et al. Fewss - Framework to Evaluate the Service Suitability and Privacy in a Distributed Web Service Environment , 2014, Int. J. Model. Simul. Sci. Comput..
[21] Mohamed M. Abd-Eldayem. A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine , 2013 .
[22] Ya-Fen Chang,et al. Comments on a Secret-Key-Privacy-Preserving Authentication and Key Agreement Scheme , 2011, 2011 Fifth International Conference on Genetic and Evolutionary Computing.
[23] Zoran Budimac,et al. Radigost: Interoperable web-based multi-agent platform , 2014, J. Syst. Softw..
[24] Reza Azmi,et al. MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach , 2014, Eng. Appl. Artif. Intell..
[25] Andrea Bondavalli,et al. The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems , 2011, IEEE Transactions on Mobile Computing.
[26] Mohammad Abdollahi Azgomi,et al. A privacy preserving clustering technique for horizontally and vertically distributed datasets , 2011, Intell. Data Anal..
[27] Mark Weiser,et al. Some Computer Science Problems in Ubiquitous Computing , 1993 .
[28] Ramachandran Baskaran,et al. QoS enhancements for global replication management in peer to peer networks , 2012, Future Gener. Comput. Syst..
[29] T. Vengattaraman,et al. A Generic Privacy Breach Preventing Methodology for Cloud Based Web Service , 2014, Int. J. Grid High Perform. Comput..
[30] Julian Padget,et al. Effectiveness of qualitative and quantitative security obligations , 2015, J. Inf. Secur. Appl..
[31] Xiaolin Gui,et al. Design of Privacy-Preserving Cloud Storage Framework , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.
[32] T. Vengattaraman,et al. Data privacy breach prevention framework for the cloud service , 2015, Secur. Commun. Networks.
[33] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[34] Stathes Hadjiefthymiades,et al. Information Dissemination between Mobile Nodes for Collaborative Context Awareness , 2011, IEEE Transactions on Mobile Computing.
[35] Ji-Feng Zhang,et al. Distributed practical output tracking of high-order stochastic multi-agent systems with inherent nonlinear drift and diffusion terms , 2014, Autom..
[36] Tarik Taleb,et al. A Novel Middleware Solution to Improve Ubiquitous Healthcare Systems Aided by Affective Information , 2010, IEEE Transactions on Information Technology in Biomedicine.
[37] Ramachandran Baskaran,et al. A Privacy Preserving Representation for Web Service Communicators' in the Cloud , 2013, QSHINE.
[38] Hassan H. Soliman,et al. A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks , 2012 .
[39] Li Cui,et al. EasiTia: A Pervasive Traffic Information Acquisition System Based on Wireless Sensor Networks , 2011, IEEE Transactions on Intelligent Transportation Systems.
[40] Laurence T. Yang,et al. Enhancing Battery Efficiency for Pervasive Health-Monitoring Systems Based on Electronic Textiles , 2010, IEEE Transactions on Information Technology in Biomedicine.
[41] C. Chellappan,et al. Performance analysis of mobile agent failure recovery in e-service applications , 2010, Comput. Stand. Interfaces.