000 | 03470nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-030-00015-8 | ||
003 | DE-He213 | ||
005 | 20240730170236.0 | ||
007 | cr nn 008mamaa | ||
008 | 180912s2018 sz | s |||| 0|eng d | ||
020 |
_a9783030000158 _9978-3-030-00015-8 |
||
024 | 7 |
_a10.1007/978-3-030-00015-8 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aCloud Computing and Security _h[electronic resource] : _b4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV / _cedited by Xingming Sun, Zhaoqing Pan, Elisa Bertino. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXVII, 721 p. 315 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v11066 |
|
505 | 0 | _aCloud Computing -- Encryption -- Information Hiding -- Cloud Security -- IoT Security. | |
520 | _aThis six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics. | ||
650 | 0 |
_aApplication software. _992514 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aImage processing _xDigital techniques. _94145 |
|
650 | 0 |
_aComputer vision. _992515 |
|
650 | 1 | 4 |
_aComputer and Information Systems Applications. _992516 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aCoding and Information Theory. _992517 |
650 | 2 | 4 |
_aComputer Imaging, Vision, Pattern Recognition and Graphics. _931569 |
700 | 1 |
_aSun, Xingming. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992518 |
|
700 | 1 |
_aPan, Zhaoqing. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992519 |
|
700 | 1 |
_aBertino, Elisa. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992520 |
|
710 | 2 |
_aSpringerLink (Online service) _992521 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030000141 |
776 | 0 | 8 |
_iPrinted edition: _z9783030000165 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v11066 _992522 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-00015-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86805 _d86805 |