1

Beyond Proofs of Data Possession: Finding Defective Blocks in Outsourced Storage
CF-inspired privacy-preserving prediction of next location in the cloud
Data storage on the cloud under user control
From Ratings to Trust: an Empirical Study of Implicit Trust in Recommender Systems
Key extraction attack using statical analysis of memory dump data
PrefRank: fair aggregation of subjective user preferences
Privacy preserving trusted social feedback
XOR Network Coding Pollution Prevention Without Homomorphic Functions
Decodability Attacks in XOR Network Coding