Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II / [electronic resource] :
edited by Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino.
- 1st ed. 2017.
- XXII, 879 p. 281 illus. online resource.
- Information Systems and Applications, incl. Internet/Web, and HCI, 10603 2946-1642 ; .
- Information Systems and Applications, incl. Internet/Web, and HCI, 10603 .
Information hiding -- Cloud computing.- IOT applications -- Information security -- Multimedia applications.-Optimization and classification.
This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017. The 116 full papers and 11 short papers of these volumes were carefully reviewed and selected from 391 submissions. The papers are organized in topical sections such as: information hiding; cloud computing; IOT applications; information security; multimedia applications; optimization and classification.
9783319685427
10.1007/978-3-319-68542-7 doi
Application software.
Computer networks .
Algorithms.
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Computer and Information Systems Applications.
Computer Communication Networks.
Algorithms.
IT Operations.
Cryptology.
Computers and Society.
QA76.76.A65
005.3
Information hiding -- Cloud computing.- IOT applications -- Information security -- Multimedia applications.-Optimization and classification.
This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017. The 116 full papers and 11 short papers of these volumes were carefully reviewed and selected from 391 submissions. The papers are organized in topical sections such as: information hiding; cloud computing; IOT applications; information security; multimedia applications; optimization and classification.
9783319685427
10.1007/978-3-319-68542-7 doi
Application software.
Computer networks .
Algorithms.
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Computer and Information Systems Applications.
Computer Communication Networks.
Algorithms.
IT Operations.
Cryptology.
Computers and Society.
QA76.76.A65
005.3