|
IEEE Transactions on Security Computing |
1. Modeling and Verification of Online Shopping Business Processes |
|
|
|
2. User Preference Learning for Online Social Recommendation |
|
|
|
3. Steganalysis Features for Content-Adaptive JPEG Steganography |
|
|
|
4. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance |
|
|
|
5. PiCode: a New Picture-Embedding 2D Barcode |
|
|
|
6. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases |
|
|
|
7. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation |
|
|
|
8. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection |
|
|
|
9. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
|
|
|
10. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services |
|
|
|
|
|
|
|
|