|
|
|
|
LEADER |
05792nam a2200661 4500 |
001 |
978-3-319-69605-8 |
003 |
DE-He213 |
005 |
20191024121631.0 |
007 |
cr nn 008mamaa |
008 |
171111s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319696058
|9 978-3-319-69605-8
|
024 |
7 |
|
|a 10.1007/978-3-319-69605-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Cloud Computing, Security, Privacy in New Computing Environments
|h [electronic resource] :
|b 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings /
|c edited by Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XIV, 240 p. 61 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 197
|
505 |
0 |
|
|a Software Defined Network Routing in Wireless Sensor Network -- Efficient Graph Mining on Heterogeneous Platforms in the Cloud -- Correlation-Aware Virtual Machine Placement in Data Center Networks -- Connectivity-Aware Virtual Machine Placement in 60GHz Wireless Cloud Center -- Ethical Trust in Cloud Computing Using Fuzzy Logic -- Answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users -- Mobile Cloud Platform: Architecture Deployment and Big Data Applications -- Research on Algorithm and Model of Hand Gestures Recognition Based on HMM -- Question Recommendation Based on User Model in CQA -- Data Storage Protection of Community Medical Internet of Things -- Generalized Format-preserving Encryption for Character Data -- Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System -- Ring Signature Scheme from Multilinear Maps in the Standard Model -- A Revocable Outsourcing Attribute-based Encryption Scheme -- Operational-behavior Auditing in Cloud Storage -- Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud -- Secure Searchable Public-Key Encryption for Cloud Storage -- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images -- Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks -- DMSD-FPE: Data masking system for database based on format-preserving encryption -- Delay-tolerant Network Based Secure Transmission System Design -- An Internal Waves Detection Method Based on PCANet for Images Captured from UAV. .
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016. The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|0 http://scigraph.springernature.com/things/product-market-codes/I18040
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
700 |
1 |
|
|a Wan, Jiafu.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Lin, Kai.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Zeng, Delu.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Li, Jin.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Xiang, Yang.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Liao, Xiaofeng.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Huang, Jiwu.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Liu, Zheli.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319696041
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319696065
|
830 |
|
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 197
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-69605-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNS
|
950 |
|
|
|a Computer Science (Springer-11645)
|