語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cloud Computing, Security, Privacy i...
~
Liao, Xiaofeng.
Cloud Computing, Security, Privacy in New Computing Environments = 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cloud Computing, Security, Privacy in New Computing Environments/ edited by Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu.
其他題名:
7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings /
其他作者:
Wan, Jiafu.
面頁冊數:
XIV, 240 p. 61 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer communication systems. -
電子資源:
https://doi.org/10.1007/978-3-319-69605-8
ISBN:
9783319696058
Cloud Computing, Security, Privacy in New Computing Environments = 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings /
Cloud Computing, Security, Privacy in New Computing Environments
7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings /[electronic resource] :edited by Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu. - 1st ed. 2018. - XIV, 240 p. 61 illus.online resource. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1971867-8211 ;. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,154.
Software Defined Network Routing in Wireless Sensor Network -- Efficient Graph Mining on Heterogeneous Platforms in the Cloud -- Correlation-Aware Virtual Machine Placement in Data Center Networks -- Connectivity-Aware Virtual Machine Placement in 60GHz Wireless Cloud Center -- Ethical Trust in Cloud Computing Using Fuzzy Logic -- Answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users -- Mobile Cloud Platform: Architecture Deployment and Big Data Applications -- Research on Algorithm and Model of Hand Gestures Recognition Based on HMM -- Question Recommendation Based on User Model in CQA -- Data Storage Protection of Community Medical Internet of Things -- Generalized Format-preserving Encryption for Character Data -- Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System -- Ring Signature Scheme from Multilinear Maps in the Standard Model -- A Revocable Outsourcing Attribute-based Encryption Scheme -- Operational-behavior Auditing in Cloud Storage -- Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud -- Secure Searchable Public-Key Encryption for Cloud Storage -- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images -- Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks -- DMSD-FPE: Data masking system for database based on format-preserving encryption -- Delay-tolerant Network Based Secure Transmission System Design -- An Internal Waves Detection Method Based on PCANet for Images Captured from UAV. .
This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016. The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments.
ISBN: 9783319696058
Standard No.: 10.1007/978-3-319-69605-8doiSubjects--Topical Terms:
1115394
Computer communication systems.
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
Cloud Computing, Security, Privacy in New Computing Environments = 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings /
LDR
:04055nam a22004095i 4500
001
990716
003
DE-He213
005
20200702011145.0
007
cr nn 008mamaa
008
201225s2018 gw | s |||| 0|eng d
020
$a
9783319696058
$9
978-3-319-69605-8
024
7
$a
10.1007/978-3-319-69605-8
$2
doi
035
$a
978-3-319-69605-8
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
245
1 0
$a
Cloud Computing, Security, Privacy in New Computing Environments
$h
[electronic resource] :
$b
7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings /
$c
edited by Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu.
250
$a
1st ed. 2018.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
XIV, 240 p. 61 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
197
505
0
$a
Software Defined Network Routing in Wireless Sensor Network -- Efficient Graph Mining on Heterogeneous Platforms in the Cloud -- Correlation-Aware Virtual Machine Placement in Data Center Networks -- Connectivity-Aware Virtual Machine Placement in 60GHz Wireless Cloud Center -- Ethical Trust in Cloud Computing Using Fuzzy Logic -- Answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users -- Mobile Cloud Platform: Architecture Deployment and Big Data Applications -- Research on Algorithm and Model of Hand Gestures Recognition Based on HMM -- Question Recommendation Based on User Model in CQA -- Data Storage Protection of Community Medical Internet of Things -- Generalized Format-preserving Encryption for Character Data -- Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System -- Ring Signature Scheme from Multilinear Maps in the Standard Model -- A Revocable Outsourcing Attribute-based Encryption Scheme -- Operational-behavior Auditing in Cloud Storage -- Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud -- Secure Searchable Public-Key Encryption for Cloud Storage -- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images -- Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks -- DMSD-FPE: Data masking system for database based on format-preserving encryption -- Delay-tolerant Network Based Secure Transmission System Design -- An Internal Waves Detection Method Based on PCANet for Images Captured from UAV. .
520
$a
This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016. The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments.
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Application software.
$3
528147
650
0
$a
Computer security.
$3
557122
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Data protection.
$3
557764
650
0
$a
Artificial intelligence.
$3
559380
650
1 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Security.
$3
1114130
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
Wan, Jiafu.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1112339
700
1
$a
Lin, Kai.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1282399
700
1
$a
Zeng, Delu.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1282400
700
1
$a
Li, Jin.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1211623
700
1
$a
Xiang, Yang.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
815616
700
1
$a
Liao, Xiaofeng.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
674980
700
1
$a
Huang, Jiwu.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1282401
700
1
$a
Liu, Zheli.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1227999
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319696041
776
0 8
$i
Printed edition:
$z
9783319696065
830
0
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
154
$3
1253880
856
4 0
$u
https://doi.org/10.1007/978-3-319-69605-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入