0824 4233176


RG Patil


1 Mitigating Cross-Site Scripting Attacks with a Content Security Policy 2016 SECURE COMPUTING
2 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 CLOUD COMPUTING
3 Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing 2016 CLOUD COMPUTING
4 Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds 2016 CLOUD COMPUTING
5 Personalized Travel Sequence Recommendation on Multi-Source Big Social Media 2016 DATA MINING
6 Text Mining the Contributors to Rail Accidents 2016 DATA MINING
7 User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors 2016 DATA MINING
8 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users 2016 NETWORKING
9 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 2016 MOBILE COMPUTING
10 Detecting Malicious Facebook Applications 2016 SECURE COMPUTING